Search results for: energy security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10897

Search results for: energy security

9907 The Challenges of Security Sector Governance in West African Democracies-The Ecowas Response Mechanism

Authors: Adamu Buba

Abstract:

As West Africa gradually recovers from the cost of more than a decade of civil conflicts in Liberia, Sierra Leone and Côte d’Ivoire, ECOWAS has continued to place prominence on peace consolidation and the prevention of conflict in the West African Sub-Region. Of particular interest is the recent political uprising in Mali and in this regard, ECOWAS has been repositioning their existing machineries to manage this dispensation more effectively by improving their early warning and mediation capabilities. This paper firstly seeks among other things to provide a conceptual understanding of what security sector governance is, and also highlight the overview of ECOWAS and to closely examine the benchmark for assessing progress in the promotion of democracy and political governance within the sub-region as well as conflict prevention techniques. The views and analysis expressed in this paper is based on secondary method of data collection alone and do not in any way represent the views of the institutions or their representatives involved in this assignment in one way or the other.

Keywords: challenges, security, governance, ecowas, response

Procedia PDF Downloads 251
9906 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network

Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad

Abstract:

Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.

Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway

Procedia PDF Downloads 479
9905 Rotational Energy Recovery System

Authors: Vijayendra Anil Menon, Ashwath Narayan Murali

Abstract:

The present day vehicles do not reuse the energy expelled in running the vehicle. The energy used to run the vehicle is expelled immediately.This has remained a constant for many decades. With all the vehicles running on non-renewable resources like fossil fuels, there is an urgent need to improve efficiency of the vehicles until a reliable replacement for fossil fuels is found.Our design is based on the concept of Kinetic energy recovery systems. Though our design lies in principle with the KERS, our design can be used in day-to-day driving. With our design, efficiency of vehicles increases and fuel conservation is possible thereby reducing the carbon footprint.

Keywords: KERS, Battery, Wheels, Efficiency.

Procedia PDF Downloads 391
9904 Providing Energy Management of a Fuel Cell-Battery Hybrid Electric Vehicle

Authors: Fatma Keskin Arabul, Ibrahim Senol, Ahmet Yigit Arabul, Ali Rifat Boynuegri

Abstract:

On account of the concern of the fossil fuel is depleting and its negative effects on the environment, interest in alternative energy sources is increasing day by day. However, considering the importance of transportation in human life, instead of oil and its derivatives fueled vehicles with internal combustion engines, electric vehicles which are sensitive to the environment and working with electrical energy has begun to develop. In this study, simulation was carried out for providing energy management and recovering regenerative braking in fuel cell-battery hybrid electric vehicle. The main power supply of the vehicle is fuel cell on the other hand not only instantaneous power is supplied by the battery but also the energy generated due to regenerative breaking is stored in the battery. Obtained results of the simulation is analyzed and discussed.

Keywords: electric vehicles, fuel cell, battery, regenerative braking, energy management

Procedia PDF Downloads 712
9903 Assessment of Households' Food Security and Hunger Level across Communities in Ile-Ife, Southwestern Nigeria

Authors: Adebayo-Victoria Tobi Dada, Dada Emmanuel

Abstract:

This study assessed households’ food security and hunger levels among different communities with varying educational and economic background in Ile-Ife, Nigeria, and its environment. It also examined the impacts of varying demography on the household food security level in the area. This was with a view to providing information on the food security status of the subjects within the study area. Ten different communities with varying demography (Parakin, Mokuro, Ilare, Obafemi Awolowo University (OAU) Staff Quarters, Ibadan Road, Aba-Iya Gani, Eleweran, Iraye, Boosa, and Eku-Isobo) were identified within the study area. Fieldwork was then carried out from 7th to 14th of March, 2016 in each of these communities through survey of market prices of food stuff, diet, and nutrition, social well-being, food accessibility and affordability as well as price fluctuation and variation in household’s social background. Selection of households for the survey was done using stratified random sampling method. Key informants included community heads, landlords, tenants, and household heads. Similarly, information on food security levels with respect to demographic backgrounds was obtained from the use of modified Food and Hunger Insecurity Module (FHIM) structured questionnaire. The questionnaire was administered to one percent of the households’ population per community. The results showed that communities such as Parakin and OAU Senior Staff Quarters were dominated by civil servants, while community such as Boosa was dominated by artisans. Respondents earning between ₦11,000 and ₦20,000 per month, during the study period, had the highest percentage across the selected communities. The household food security indices showed that about 41% of the investigated respondents could not guarantee their household food for a month, while 18% reduced or skipped meals. There were positive significant relationships between monthly income (F-value = 132.04), educational status (F-value = 102.30), occupation (F-value = 104.05) and food budget (F-value = 122.09), all at p < 0.05. However, there was no significant relationship between the monthly food budget and household sizes (t-value = -1.4074, p > 0.05). Food secured households’ had the household heads with a higher level of educational attainment. The study concluded that large variations which existed between socio-economic and educational background among the communities had significant effects on households’ food security level in the study area.

Keywords: food security, households, hunger level, market prices

Procedia PDF Downloads 208
9902 Examining Renewable Energy Policy Implementation for Sustainable Development in Kenya

Authors: Eliud Kiprop, Kenichi Matsui, Joseph Karanja, Hesborn Ondiba

Abstract:

To double the share of renewable energy in the global energy mix by 2030 as part of actions for the Paris Agreement, policymakers in each ratifying country must accelerate their efforts within the next few years by implementing their own renewable energy strategies. Kenya has increased its funding for research and development in renewable energy sources largely because it intends to reduce greenhouse gas GHG emissions by 30% from business as usual (BAU) levels (143 MtCO₂eq) by 2030. In 2013, the Kenyan government launched an ambitious plan to increase the installed power generation capacity from 1,768MW to more than 5,000MW by the end of 2017. This paper examines the formulation and implementation process of this plan and shows how this plan will affect Kenya’s renewable energy industry and national policy implementation in general. Results demonstrate that, despite having a well- documented policy in place, the Kenyan government cannot meet its target of 5000MW by the end of 2017. Among other factors, we find that the main reason is attributable to the failure in adhering to the main principles of the policy plan. We also find that the government has failed to consider the future energy demand. Had the policy been implemented on time, we argue that there would have been excess power.

Keywords: policy implementation, policy plan, renewable energy, sustainable development

Procedia PDF Downloads 216
9901 Architecture Performance-Related Design Based on Graphic Parameterization

Authors: Wenzhe Li, Xiaoyu Ying, Grace Ding

Abstract:

Architecture plane form is an important consideration in the design of green buildings due to its significant impact on energy performance. The most effective method to consider energy performance in the early design stages is parametric modelling. This paper presents a methodology to program plane forms using MATLAB language, generating 16 kinds of plane forms by changing four designed parameters. DesignBuilder (an energy consumption simulation software) was proposed to simulate the energy consumption of the generated planes. A regression mathematical model was established to study the relationship between the plane forms and their energy consumption. The main finding of the study suggested that there was a cubic function relationship between the depth-ratio of U-shaped buildings and energy consumption, and there is also a cubic function relationship between the width-ratio and energy consumption. In the design, the depth-ratio of U-shaped buildings should not be less than 2.5, and the width-ratio should not be less than 2.

Keywords: graphic parameterization, green building design, mathematical model, plane form

Procedia PDF Downloads 151
9900 Challenges in E-Government: Conceptual Views and Solutions

Authors: Rasim Alguliev, Farhad Yusifov

Abstract:

Considering the international experience, conceptual and architectural principles of forming of electron government are researched and some suggestions were made. The assessment of monitoring of forming processes of electron government, intellectual analysis of web-resources, provision of information security, electron democracy problems were researched, conceptual approaches were suggested. By taking into consideration main principles of electron government theory, important research directions were specified.

Keywords: electron government, public administration, information security, web-analytics, social networks, data mining

Procedia PDF Downloads 472
9899 Material Mechanical Property for Improving the Energy Density of Lithium-Ion Battery

Authors: Collins Chike Kwasi-Effah, Timon Rabczuk, Osarobo O. Ighodaro

Abstract:

The energy density of various battery technologies used in the electric vehicle industry still ranges between 250 Wh/kg to 650 Wh/kg, thus limiting their distance range compared to the conventional internal combustion engine vehicle. In order to overcome this limitation, a new material technology is necessary to overcome this limitation. The proposed sole lithium-air battery seems to be far behind in terms of practical implementation. In this paper, experimental analysis using COMSOL multiphysics has been conducted to predict the performance of lithium ion battery with variation in the elastic property of five different cathode materials including; LiMn2O4, LiFePO4, LiCoO2, LiV6O13, and LiTiS2. Combining LiCoO2, and aqueous lithium showed great improvement in the energy density. Thus, the material combination of LiCoO2/aqueous lithium-air could give a practical solution in achieving high energy density for application in the electric vehicle industry.

Keywords: battery energy, energy density, lithium-ion, mechanical property

Procedia PDF Downloads 160
9898 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: cloud storage security, sharing storage, attributes, Hash algorithm

Procedia PDF Downloads 388
9897 FESA: Fuzzy-Controlled Energy-Efficient Selective Allocation and Reallocation of Tasks Among Mobile Robots

Authors: Anuradha Banerjee

Abstract:

Energy aware operation is one of the visionary goals in the area of robotics because operability of robots is greatly dependent upon their residual energy. Practically, the tasks allocated to robots carry different priority and often an upper limit of time stamp is imposed within which the task needs to be completed. If a robot is unable to complete one particular task given to it the task is reallocated to some other robot. The collection of robots is controlled by a Central Monitoring Unit (CMU). Selection of the new robot is performed by a fuzzy controller called Task Reallocator (TRAC). It accepts the parameters like residual energy of robots, possibility that the task will be successfully completed by the new robot within stipulated time, distance of the new robot (where the task is reallocated) from distance of the old one (where the task was going on) etc. The proposed methodology increases the probability of completing globally assigned tasks and saves huge amount of energy as far as the collection of robots is concerned.

Keywords: energy-efficiency, fuzzy-controller, priority, reallocation, task

Procedia PDF Downloads 311
9896 Towards the Development of Uncertainties Resilient Business Model for Driving the Solar Panel Industry in Nigeria Power Sector

Authors: Balarabe Z. Ahmad, Anne-Lorène Vernay

Abstract:

The emergence of electricity in Nigeria was dated back to 1896. The power plants have the potential to generate 12,522 MW of electric power. Whereas current dispatch is about 4,000 MW, access to electrification is about 60%, with consumption at 0.14 MWh/capita. The government embarked on energy reforms to mitigate energy poverty. The reform targeted the provision of electricity access to 75% of the population by 2020 and 90% by 2030. Growth of total electricity demand by a factor of 5 by 2035 had been projected. This means that Nigeria will require almost 530 TWh of electricity which can be delivered through generators with a capacity of 65 GW. Analogously, the geographical location of Nigeria has placed it in an advantageous position as the source of solar energy; the availability of a high sunshine belt is obvious in the country. The implication is that the far North, where energy poverty is high, equally has about twice the solar radiation as against southern Nigeria. Hence, the chance of generating solar electricity is 66% possible at 11850 x 103 GWh per year, which is one hundred times the current electricity consumption rate in the country. Harvesting these huge potentials may be a mirage if the entrepreneurs in the solar panel business are left with the conventional business models that are not uncertainty resilient. Currently, business entities in RE in Nigeria are uncertain of; accessing the national grid, purchasing potentials of cooperating organizations, currency fluctuation and interest rate increases. Uncertainties such as the security of projects and government policy are issues entrepreneurs must navigate to remain sustainable in the solar panel industry in Nigeria. The aim of this paper is to identify how entrepreneurial firms consider uncertainties in developing workable business models for commercializing solar energy projects in Nigeria. In an attempt to develop a novel business model, the paper investigated how entrepreneurial firms assess and navigate uncertainties. The roles of key stakeholders in helping entrepreneurs to manage uncertainties in the Nigeria RE sector were probed in the ongoing study. The study explored empirical uncertainties that are peculiar to RE entrepreneurs in Nigeria. A mixed-mode of research was embraced using qualitative data from face-to-face interviews conducted on the Solar Energy Entrepreneurs and the experts drawn from key stakeholders. Content analysis of the interview was done using Atlas. It is a nine qualitative tool. The result suggested that all stakeholders are required to synergize in developing an uncertainty resilient business model. It was opined that the RE entrepreneurs need modifications in the business recommendations encapsulated in the energy policy in Nigeria to strengthen their capability in delivering solar energy solutions to the yawning Nigerians.

Keywords: uncertainties, entrepreneurial, business model, solar-panel

Procedia PDF Downloads 147
9895 Secure Mobile E-Business Applications

Authors: Hala A. Alrumaih

Abstract:

It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.

Keywords: e-business, mobile applications, risk mitigations, security assurance

Procedia PDF Downloads 293
9894 Household Energy Usage and Practices in the Rural Areas of Northern Part of Mindanao Island, Philippines

Authors: Odinah Cuartero-Enteria, Aive Pecasales, Jhadly Philip Buniel, Christian Joy Vega, Shiela Estubo

Abstract:

In the Philippines, Mindanao Island has the cheapest electricity because of the hydroelectric plants. Due to the rapid increase of the electricity consumption which the sources of electricity cannot support, it causes rotating brownout during summer season. This study investigated the household energy usage and practices in the rural areas of northern part of the Mindanao Island, Philippines. The questionnaire that includes the respondents’ profile and their common practices in energy consumptions was used as a tool in gathering the data. Several households were subjected to the survey. Results show energy consumption is not dependent on the profile of the respondents. It was observed that most of the families prefer to use energy saving methods of reducing electricity consumption. The main energy saving methods are unplugging unused home appliances, using of compact fluorescent bulb and energy-efficient gadgets, and using high electricity consumption appliances by schedule. Based on the results, the households in the rural areas know the practices of reducing electricity consumption. However, it is highly recommended that concern agencies should initiate information dissemination and strict implementation of well-formulated energy conservation practices all over the areas in Mindanao.

Keywords: Philippines, Mindanao island, rural areas, households, energy usages, practices

Procedia PDF Downloads 379
9893 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)

Authors: Reham Al-Zahrani, Noura Aleisa

Abstract:

The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.

Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols

Procedia PDF Downloads 63
9892 Evaluation of Food Safety and Security Practices in Midday Meal Programmes in Rural Areas of Beed District

Authors: Nuzhat Sultana M. B.

Abstract:

Children are high-risk population in terms of food born illnesses. Food safety and security are the most important aspect of the success of midday meal programmes. Improper holding temperatures, cross-contamination and poor personal hygiene of food handlers are the main causes for the prevalence of pathogenic microbes in the food servicing areas. Two hundred and fifty preschool children in the age of 3 to 6 years from urban and rural anganwadies (pre school center) of Beed district were selected. Nutritional status of preschool children were assessed by anthropometrical and clinical measurement. The study assessed the food safety and security with the help of personal hygiene and other safety measures maintained by the food personnel working for midday meal programme, supplying mid meals to children in govt. anganwadies (pre school center). The hygiene level, sanitary condition and microbial quality of food and water, pathological health examination of food handlers were assessed with the help of checklist. A questionnaire was designed to evaluate knowledge, attitude, and practices of food handlers. Results of the study show that the nutritional and health status of rural and urban preschool children was very poor. Many of the food handlers were not aware of general knowledge and hygiene practices to be followed during food preparation areas. An intervention programme of education and importing training at workplaces has shown a positive impact on the outcome of safety and security practices and safe, hygienic practices of food handlers at workplace.

Keywords: food, health, preschool children, safety, security

Procedia PDF Downloads 201
9891 Compression and Air Storage Systems for Small Size CAES Plants: Design and Off-Design Analysis

Authors: Coriolano Salvini, Ambra Giovannelli

Abstract:

The use of renewable energy sources for electric power production leads to reduced CO2 emissions and contributes to improving the domestic energy security. On the other hand, the intermittency and unpredictability of their availability poses relevant problems in fulfilling safely and in a cost efficient way the load demand along the time. Significant benefits in terms of “grid system applications”, “end-use applications” and “renewable applications” can be achieved by introducing energy storage systems. Among the currently available solutions, CAES (Compressed Air Energy Storage) shows favorable features. Small-medium size plants equipped with artificial air reservoirs can constitute an interesting option to get efficient and cost-effective distributed energy storage systems. The present paper is addressed to the design and off-design analysis of the compression system of small size CAES plants suited to absorb electric power in the range of hundreds of kilowatt. The system of interest is constituted by an intercooled (in case aftercooled) multi-stage reciprocating compressor and a man-made reservoir obtained by connecting large diameter steel pipe sections. A specific methodology for the system preliminary sizing and off-design modeling has been developed. Since during the charging phase the electric power absorbed along the time has to change according to the peculiar CAES requirements and the pressure ratio increases continuously during the filling of the reservoir, the compressor has to work at variable mass flow rate. In order to ensure an appropriately wide range of operations, particular attention has been paid to the selection of the most suitable compressor capacity control device. Given the capacity regulation margin of the compressor and the actual level of charge of the reservoir, the proposed approach allows the instant-by-instant evaluation of minimum and maximum electric power absorbable from the grid. The developed tool gives useful information to appropriately size the compression system and to manage it in the most effective way. Various cases characterized by different system requirements are analysed. Results are given and widely discussed.

Keywords: artificial air storage reservoir, compressed air energy storage (CAES), compressor design, compression system management.

Procedia PDF Downloads 226
9890 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 142
9889 Cryptography Based Authentication Methods

Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf

Abstract:

This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.

Keywords: information security, cryptography, system access control, authentication, network security

Procedia PDF Downloads 468
9888 Performance Analysis of the Time-Based and Periodogram-Based Energy Detector for Spectrum Sensing

Authors: Sadaf Nawaz, Adnan Ahmed Khan, Asad Mahmood, Chaudhary Farrukh Javed

Abstract:

Classically, an energy detector is implemented in time domain (TD). However, frequency domain (FD) based energy detector has demonstrated an improved performance. This paper presents a comparison between the two approaches as to analyze their pros and cons. A detailed performance analysis of the classical TD energy-detector and the periodogram based detector is performed. Exact and approximate mathematical expressions for probability of false alarm (Pf) and probability of detection (Pd) are derived for both approaches. The derived expressions naturally lead to an analytical as well as intuitive reasoning for the improved performance of (Pf) and (Pd) in different scenarios. Our analysis suggests the dependence improvement on buffer sizes. Pf is improved in FD, whereas Pd is enhanced in TD based energy detectors. Finally, Monte Carlo simulations results demonstrate the analysis reached by the derived expressions.

Keywords: cognitive radio, energy detector, periodogram, spectrum sensing

Procedia PDF Downloads 375
9887 Influence of Coatings on Energy Conservation in Construction Industry

Authors: Nancy Sakr, Mohamed Abou-Zeid

Abstract:

World energy consumption has increased rapidly in the past few years. Due to population growth, total energy consumption is increasing; a large amount of energy is wasted on the cooling and heating processes in buildings. However, using thermal heating management can minimize costs, heat consumption and create a management system for the heat insulation for buildings. This concept is being implemented through different approaches. Based on analysis and research, there is evidence in the energy consumption before and after testing and applying construction approaches for thermal heating management in building units. This investigation addresses the evaluation of the influence of external coatings on energy consumption. Coatings are considered one of the smart effective available approaches for energy efficiency. Unfortunately, this approach is not widely applied in the construction industry. It needs more data to prove effectiveness and credibility between people to use it as a smart thermal insulation approach. Two precedents have been analyzed in order to monitor buildings’ heat exposure, and how the buildings will be affected by thermal insulation materials. Data sheets from chemical companies which produce similar coatings are compared with the usual products and the protective thermal products.

Keywords: energy consumption, building envelope, thermal insulation, protective coatings

Procedia PDF Downloads 141
9886 Energy Conservation Strategies of Buildings in Hot, Arid Region: Al-Khobar, Saudi Arabia

Authors: M. H. Shwehdi, S. Raja Mohammad

Abstract:

Recently energy savings have become more pronounced as a result of the world financial crises as well the unstable oil prices. Certainly all entities needs to adapt Energy Conservation and Management Strategies due to high monthly consumption of their spread locations and advancements of its telecom systems. These system improvements necessitate the establishment of more exchange centers as well provide energy savings. This paper investigates the impact of HVAC System Characteristics, Operational Strategies, the impact of Envelope Thermal Characteristics, and energy conservation measures. These are classified under three types of measures i.e. Zero-Investment; Low-Investment and High-Investment Energy Conservation Measures. The study shows that the Energy Conservation Measures (ECMs) pertaining to the HVAC system characteristics and operation represent the highest potential for energy reduction, attention should be given to window thermal and solar radiation characteristics when large window areas are used. The type of glazing system needs to be carefully considered in the early design phase of future buildings. Paper will present the thermal optimization of different size centers in the two hot-dry and hot-humid Saudi Arabian city of Al Khobar, East province.

Keywords: energy conservation, optimization, thermal design, intermittent operation, exchange centers, hot-humid climate, Saudi Arabia

Procedia PDF Downloads 448
9885 Effect of Defect Dipoles And Microstructure Engineering in Energy Storage Performance of Co-doped Barium Titanate Ceramics

Authors: Mahmoud Saleh Mohammed Alkathy

Abstract:

Electricity generated from renewable resources may help the transition to clean energy. A reliable energy storage system is required to use this energy properly. To do this, a high breakdown strength (Eb) and a significant difference between spontaneous polarization (Pmax) and remnant polarization (Pr) are required. To achieve this, the defect dipoles in lead free BaTiO3 ferroelectric ceramics are created using Mg2+ and Ni2+ ions as acceptor co-doping in the Ti site. According to the structural analyses, the co-dopant ions were effectively incorporated into the BTO unit cell. According to the ferroelectric study, the co-doped samples display a double hysteresis loop, stronger polarization, and high breakdown strength. The formation of oxygen vacancies and defect dipoles prevent domains' movement, resulting in hysteresis loop pinching. This results in increased energy storage density and efficiency. The defect dipoles mechanism effect can be considered a fascinating technology that can guide the researcher working on developing energy storage for next-generation applications.

Keywords: microstructure, defect, energy storage, effciency

Procedia PDF Downloads 93
9884 Methodological Approach for Historical Building Retrofit Based on Energy and Cost Analysis in the Different Climatic Zones

Authors: Selin Guleroglu, Ilker Kahraman, E. Selahattin Umdu

Abstract:

In today’s world, the building sector has a significant impact on primary energy consumption and CO₂ emissions. While new buildings must have high energy performance as indicated by the Energy Performance Directive in Buildings (EPBD), published by the European Union (EU), the energy performance of the existing buildings must also be enhanced with cost-efficient methods. Turkey has a high historical building density similar to south European countries, and the high energy consumption is the main contributor in the energy consumptioın of Turkey, which is rather higher than European counterparts. Historic buildings spread around Turkey for four main climate zones covering very similar climate characteristics to both the north and south European countries. The case study building is determined as the most common building type in Turkey. This study aims to investigate energy retrofit measures covering but not limited to passive and active measures to improve the energy performance of the historical buildings located in different climatic zones within the limits of preservation of the historical value of the building as a crucial constraint. Passive measures include wall, window, and roof construction elements, and active measures HVAC systems in retrofit scenarios. The proposed methodology can help to reach up to 30% energy saving based on primary energy consumption. DesignBuilder, an energy simulation tool, is used to determine the energy performance of buildings with suggested retrofit measures, and the Net Present Value (NPV) method is used for cost analysis of them. Finally, the most efficient energy retrofit measures for all buildings are determined by analyzing primary energy consumption and the cost performance of them. Results show that heat insulation, glazing type, and HVAC system has an important role in energy saving. Also, it found that these parameters have a different positive or negative effect on building energy consumption in different climate zones. For instance, low e glazing has a positive impact on the energy performance of the building in the first zone, while it has a negative effect on the building in the forth zone. Another important result is applying heat insulation has minimum impact on building energy performance compared to other zones.

Keywords: energy performance, climatic zones, historic building, energy retrofit measures, NPV

Procedia PDF Downloads 170
9883 Highlighting of the Factors and Policies affecting CO2 Emissions level in Malaysian Transportation Sector

Authors: Siti Indati Mustapa, Hussain Ali Bekhet

Abstract:

Global CO2 emission and increasing fuel consumption to meet energy demand requirement has become a threat in recent decades. Effort to reduce the CO2 emission is now a matter of priority in most countries of the world including Malaysia. Transportation has been identified as the most intensive sector of carbon-based fuels and achievement of the voluntary target to meet 40% carbon intensity reduction set at the 15th Conference of the Parties (COP15) means that the emission from the transport sector must be reduced accordingly. This posed a great challenge to Malaysia and effort has to be made to embrace suitable and appropriate energy policy for sustainable energy and emission reduction of this sector. The focus of this paper is to analyse the trends of Malaysia’s energy consumption and emission of four different transport sub-sectors (road, rail, aviation and maritime). Underlying factors influencing the growth of energy consumption and emission trends are discussed. Besides, technology status towards energy efficiency in transportation sub-sectors is presented. By reviewing the existing policies and trends of energy used, the paper highlights prospective policy options towards achieving emission reduction in the transportation sector.

Keywords: CO2 emissions, transportation sector, fuel consumption, energy policy, Malaysia

Procedia PDF Downloads 465
9882 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 139
9881 Relay-Augmented Bottleneck Throughput Maximization for Correlated Data Routing: A Game Theoretic Perspective

Authors: Isra Elfatih Salih Edrees, Mehmet Serdar Ufuk Türeli

Abstract:

In this paper, an energy-aware method is presented, integrating energy-efficient relay-augmented techniques for correlated data routing with the goal of optimizing bottleneck throughput in wireless sensor networks. The system tackles the dual challenge of throughput optimization while considering sensor network energy consumption. A unique routing metric has been developed to enable throughput maximization while minimizing energy consumption by utilizing data correlation patterns. The paper introduces a game theoretic framework to address the NP-complete optimization problem inherent in throughput-maximizing correlation-aware routing with energy limitations. By creating an algorithm that blends energy-aware route selection strategies with the best reaction dynamics, this framework provides a local solution. The suggested technique considerably raises the bottleneck throughput for each source in the network while reducing energy consumption by choosing the best routes that strike a compromise between throughput enhancement and energy efficiency. Extensive numerical analyses verify the efficiency of the method. The outcomes demonstrate the significant decrease in energy consumption attained by the energy-efficient relay-augmented bottleneck throughput maximization technique, in addition to confirming the anticipated throughput benefits.

Keywords: correlated data aggregation, energy efficiency, game theory, relay-augmented routing, throughput maximization, wireless sensor networks

Procedia PDF Downloads 81
9880 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme

Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe

Abstract:

The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.

Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code

Procedia PDF Downloads 41
9879 Development and Analysis of Multigeneration System by Using Combined Solar and Geothermal Energy Resources

Authors: Muhammad Umar Khan, Mahesh Kumar, Faraz Neakakhtar

Abstract:

Although industrialization marks to the economy of a country yet it increases the pollution and temperature of the environment. The world is now shifting towards green energy because the utilization of fossil fuels is resulting in global warming. So we need to develop systems that can operate on renewable energy resources and have low heat losses. The combined solar and geothermal multigeneration system can solve this issue. Rather than making rankine cycle purely a solar-driven, heat from solar is used to drive vapour absorption cycle and reheated to generate power using geothermal reservoir. The results are displayed by using Engineering Equation Solver software, where inputs are varied to optimize the energy and exergy efficiencies of the system. The cooling effect is 348.2 KW, while the network output is 23.8 MW and reducing resultant emission of 105553 tons of CO₂ per year. This eco-friendly multigeneration system is capable of eliminating the use of fossil fuels and increasing the geothermal energy efficiency.

Keywords: cooling effect, eco-friendly, green energy, heat loses, multigeneration system, renewable energy, work output

Procedia PDF Downloads 263
9878 Feasibility of Two Positive-Energy Schools in a Hot-Humid Tropical Climate: A Methodological Approach

Authors: Shashwat, Sandra G. L. Persiani, Yew Wah Wong, Pramod S. Kamath, Avinash H. Anantharam, Hui Ling Aw, Yann Grynberg

Abstract:

Achieving zero-energy targets in existing buildings is known to be a difficult task, hence targets are addressed at new buildings almost exclusively. Although these ultra-efficient case-studies remain essential to develop future technologies and drive the concepts of Zero-energy, the immediate need to cut the consumption of the existing building stock remains unaddressed. This work aims to present a reliable and straightforward methodology for assessing the potential of energy-efficient upgrading in existing buildings. Public Singaporean school buildings, characterized by low energy use intensity and large roof areas, were identified as potential objects for conversion to highly-efficient buildings with a positive energy balance. A first study phase included the development of a detailed energy model for two case studies (a primary and a secondary school), based on the architectural drawings provided, site-visits and calibrated using measured end-use power consumption of different spaces. The energy model was used to demonstrate compliances or predict energy consumption of proposed changes in the two buildings. As complete energy monitoring is difficult and substantially time-consuming, short-term energy data was collected in the schools by taking spot measurements of power, voltage, and current for all the blocks of school. The figures revealed that the bulk of the consumption is attributed in decreasing order of magnitude to air-conditioning, plug loads, and lighting. In a second study-phase, a number of energy-efficient technologies and strategies were evaluated through energy-modeling to identify the alternatives giving the highest energy saving potential, achieving a reduction in energy use intensity down to 19.71 kWh/m²/y and 28.46 kWh/m²/y for the primary and the secondary schools respectively. This exercise of field evaluation and computer simulation of energy saving potential aims at a preliminary assessment of the positive-energy feasibility enabling future implementation of the technologies on the buildings studied, in anticipation of a broader and more widespread adoption in Singaporean schools.

Keywords: energy simulation, school building, tropical climate, zero energy buildings, positive energy

Procedia PDF Downloads 148