Search results for: Energy security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10728

Search results for: Energy security

9708 Hybrid Wavelet-Adaptive Neuro-Fuzzy Inference System Model for a Greenhouse Energy Demand Prediction

Authors: Azzedine Hamza, Chouaib Chakour, Messaoud Ramdani

Abstract:

Energy demand prediction plays a crucial role in achieving next-generation power systems for agricultural greenhouses. As a result, high prediction quality is required for efficient smart grid management and therefore low-cost energy consumption. The aim of this paper is to investigate the effectiveness of a hybrid data-driven model in day-ahead energy demand prediction. The proposed model consists of Discrete Wavelet Transform (DWT), and Adaptive Neuro-Fuzzy Inference System (ANFIS). The DWT is employed to decompose the original signal in a set of subseries and then an ANFIS is used to generate the forecast for each subseries. The proposed hybrid method (DWT-ANFIS) was evaluated using a greenhouse energy demand data for a week and compared with ANFIS. The performances of the different models were evaluated by comparing the corresponding values of Mean Absolute Percentage Error (MAPE). It was demonstrated that discret wavelet transform can improve agricultural greenhouse energy demand modeling.

Keywords: wavelet transform, ANFIS, energy consumption prediction, greenhouse

Procedia PDF Downloads 79
9707 Large Eddy Simulation with Energy-Conserving Schemes: Understanding Wind Farm Aerodynamics

Authors: Dhruv Mehta, Alexander van Zuijlen, Hester Bijl

Abstract:

Large Eddy Simulation (LES) numerically resolves the large energy-containing eddies of a turbulent flow, while modelling the small dissipative eddies. On a wind farm, these large scales carry the energy wind turbines extracts and are also responsible for transporting the turbines’ wakes, which may interact with downstream turbines and certainly with the atmospheric boundary layer (ABL). In this situation, it is important to conserve the energy that these wake’s carry and which could be altered artificially through numerical dissipation brought about by the schemes used for the spatial discretisation and temporal integration. Numerical dissipation has been reported to cause the premature recovery of turbine wakes, leading to an over prediction in the power produced by wind farms.An energy-conserving scheme is free from numerical dissipation and ensures that the energy of the wakes is increased or decreased only by the action of molecular viscosity or the action of wind turbines (body forces). The aim is to create an LES package with energy-conserving schemes to simulate wind turbine wakes correctly to gain insight into power-production, wake meandering etc. Such knowledge will be useful in designing more efficient wind farms with minimal wake interaction, which if unchecked could lead to major losses in energy production per unit area of the wind farm. For their research, the authors intend to use the Energy-Conserving Navier-Stokes code developed by the Energy Research Centre of the Netherlands.

Keywords: energy-conserving schemes, modelling turbulence, Large Eddy Simulation, atmospheric boundary layer

Procedia PDF Downloads 460
9706 Evaluation of Food Safety and Security Practices in Midday Meal Programmes in Rural Areas of Beed District

Authors: Nuzhat Sultana M. B.

Abstract:

Children are high-risk population in terms of food born illnesses. Food safety and security are the most important aspect of the success of midday meal programmes. Improper holding temperatures, cross-contamination and poor personal hygiene of food handlers are the main causes for the prevalence of pathogenic microbes in the food servicing areas. Two hundred and fifty preschool children in the age of 3 to 6 years from urban and rural anganwadies (pre school center) of Beed district were selected. Nutritional status of preschool children were assessed by anthropometrical and clinical measurement. The study assessed the food safety and security with the help of personal hygiene and other safety measures maintained by the food personnel working for midday meal programme, supplying mid meals to children in govt. anganwadies (pre school center). The hygiene level, sanitary condition and microbial quality of food and water, pathological health examination of food handlers were assessed with the help of checklist. A questionnaire was designed to evaluate knowledge, attitude, and practices of food handlers. Results of the study show that the nutritional and health status of rural and urban preschool children was very poor. Many of the food handlers were not aware of general knowledge and hygiene practices to be followed during food preparation areas. An intervention programme of education and importing training at workplaces has shown a positive impact on the outcome of safety and security practices and safe, hygienic practices of food handlers at workplace.

Keywords: food, health, preschool children, safety, security

Procedia PDF Downloads 197
9705 3D Simulation for Design and Predicting Performance of a Thermal Heat Storage Facility using Sand

Authors: Nadjiba Mahfoudi, Abdelhafid Moummi , Mohammed El Ganaoui

Abstract:

Thermal applications are drawing increasing attention in the solar energy research field, due to their high performance in energy storage density and energy conversion efficiency. In these applications, solar collectors and thermal energy storage systems are the two core components. This paper presents a thermal analysis of the transient behavior and storage capability of a sensible heat storage device in which sand is used as a storage media. The TES unit with embedded charging tubes is connected to a solar air collector. To investigate it storage characteristics a 3D-model using no linear coupled partial differential equations for both temperature of storage medium and heat transfer fluid (HTF), has been developed. Performances of thermal storage bed of capacity of 17 MJ (including bed temperature, charging time, energy storage rate, charging energy efficiency) have been evaluated. The effect of the number of charging tubes (3 configurations) is presented.

Keywords: design, thermal modeling, heat transfer enhancement, sand, sensible heat storage

Procedia PDF Downloads 553
9704 Combustion Chamber Sizing for Energy Recovery from Furnace Process Gas: Waste to Energy

Authors: Balram Panjwani, Bernd Wittgens, Jan Erik Olsen, Stein Tore Johansen

Abstract:

The Norwegian ferroalloy industry is a world leader in sustainable production of ferrosilicon, silicon and manganese alloys with the lowest global specific energy consumption. One of the byproducts during the metal reduction process is energy rich off-gas and usually this energy is not harnessed. A novel concept for sustainable energy recovery from ferroalloy off-gas is discussed. The concept is founded on the idea of introducing a combustion chamber in the off-gas section in which energy rich off-gas mainly consisting of CO will be combusted. This will provide an additional degree of freedom for optimizing energy recovery. A well-controlled and high off-gas temperature will assure a significant increase in energy recovery and reduction of emissions to the atmosphere. Design and operation of the combustion chamber depend on many parameters, including the total power capacity of the combustion chamber, sufficient residence time for combusting the complex Poly Aromatic Hydrocarbon (PAH), NOx, as well as converting other potential pollutants. The design criteria for the combustion chamber have been identified and discussed and sizing of the combustion chamber has been carried out considering these design criteria. Computational Fluid Dynamics (CFD) has been utilized extensively for sizing the combustion chamber. The results from our CFD simulations of the flow in the combustion chamber and exploring different off-gas fuel composition are presented. In brief, the paper covers all aspect which impacts the sizing of the combustion chamber, including insulation thickness, choice of insulating material, heat transfer through extended surfaces, multi-staging and secondary air injection.

Keywords: CFD, combustion chamber, arc furnace, energy recovery

Procedia PDF Downloads 314
9703 Optimising Urban Climate at Mesoscale: The Case of Floor-Area-Ratio Modelling and Energy Planning Integration

Authors: Ali Cheshmehzangi, Ayotunde Dawodu

Abstract:

In urban planning, Floor Area Ratio (FAR) of the site plays a major role in the multiplicity of performances, from humane living environments to energy performance. When one considers the astounding volume of new housing that is going to be constructed across the globe during the next few decades due to growing urbanisation (e.g. particularly in developing world), it is imperative that we have an empirically grounded grasp of which building configurations are more energy efficient. As a common planning metric, it would be helpful to know exactly how managing FAR connects with energy efficiency. Hence, this study puts together a set of modelling of various FARs for a typical residential compound and address the considerations of energy planning integration in the practice of building configuration and urban planning. Such decision makings at the planning and design stage enable us to provide pathways of optimising urban climate at mesoscale of the built environment, i.e. the neighbourhood or community level. In this study, a comparative study is conducted using Eco-Tect Software, using a case study in the City of Ningbo, China. Findings of the study contribute to identifying scenarios of various FAR use and energy planning at mesoscale. The final results contribute to studies in urban climate, from the perspectives of urban planning, energy planning, and urban modelling.

Keywords: China, energy planning, FAR, floor-area-ratio, mesoscale, urban climate, urban modelling

Procedia PDF Downloads 159
9702 Designing a Smart City Relying on Renewable Energies: A Solution in the Concept of Sustainable Development

Authors: Mina Bakhshi

Abstract:

Nowadays, issues such as various types of pollution, problems caused by energy consumption, population density, social activities, difficulties related to urban access and communication, transportation, etc., have challenged different communities and become the subject of their discussions. In response to this issue, theories and movements have emerged to achieve sustainable urban development, including the smart growth movement. This theory emphasizes that the physical growth and expansion of cities should serve the community and the environment, aiming to improve the quality of life and promote the use of renewable energy resources for sustainability. The smart city network system not only improves the economic situation of the society and benefits the environment but also enables the achievement of important issues such as sustainable development, continuity, and diversity of energy resources. In this article, we investigate the impact of using renewable energy sources on optimizing energy consumption and reducing pollution caused by fossil fuels with the help of smart city development. The aim of this article is to introduce renewable energy sources and their utilization as a solution to address the energy crisis and reduce environmental pollution. This research has attempted to introduce the smart city and the use of renewable energy sources as a method for solving many urban problems and achieving efficient urban control and management.

Keywords: smart city, renewable energy sources, sustainable development, sustainable city

Procedia PDF Downloads 62
9701 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 137
9700 Cryptography Based Authentication Methods

Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf

Abstract:

This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.

Keywords: information security, cryptography, system access control, authentication, network security

Procedia PDF Downloads 462
9699 Photovoltaic Maximum Power-Point Tracking Using Artificial Neural Network

Authors: Abdelazziz Aouiche, El Moundher Aouiche, Mouhamed Salah Soudani

Abstract:

Renewable energy sources now significantly contribute to the replacement of traditional fossil fuel energy sources. One of the most potent types of renewable energy that has developed quickly in recent years is photovoltaic energy. We all know that solar energy, which is sustainable and non-depleting, is the best knowledge form of energy that we have at our disposal. Due to changing weather conditions, the primary drawback of conventional solar PV cells is their inability to track their maximum power point. In this study, we apply artificial neural networks (ANN) to automatically track and measure the maximum power point (MPP) of solar panels. In MATLAB, the complete system is simulated, and the results are adjusted for the external environment. The results are better performance than traditional MPPT methods and the results demonstrate the advantages of using neural networks in solar PV systems.

Keywords: modeling, photovoltaic panel, artificial neural networks, maximum power point tracking

Procedia PDF Downloads 80
9698 Centralized Peak Consumption Smoothing Revisited for Habitat Energy Scheduling

Authors: M. Benbouzid, Q. Bresson, A. Duclos, K. Longo, Q. Morel

Abstract:

Currently, electricity suppliers must predict the consumption of their customers in order to deduce the power they need to produce. It is, then, important in a first step to optimize household consumption to obtain more constant curves by limiting peaks in energy consumption. Here centralized real time scheduling is proposed to manage the equipment's starting in parallel. The aim is not to exceed a certain limit while optimizing the power consumption across a habitat. The Raspberry Pi is used as a box; this scheduler interacts with the various sensors in 6LoWPAN. At the scale of a single dwelling, household consumption decreases, particularly at times corresponding to the peaks. However, it would be wiser to consider the use of a residential complex so that the result would be more significant. So, the ceiling would no longer be fixed. The scheduling would be done on two scales, firstly, per dwelling, and secondly, at the level of a residential complex.

Keywords: smart grid, energy box, scheduling, Gang Model, energy consumption, energy management system, wireless sensor network

Procedia PDF Downloads 308
9697 Energy Transition in the Netherlands - the Best Way to Motivate Citizens

Authors: Nayden Takev, Remy van Leeuwen, Shiva Chotoe, Hani Alers, Xiao Peng

Abstract:

Citizens, businesses, and public authorities all around the world are becoming aware of the impact that they have on the environment. Currently, climate change is an apparent cause to urge everyone to act and move to sustainable energy solutions. After the Paris Climate Agreement, every country has thought of a way to cut down carbon emissions. The Netherlands formulated the National Climate Agreement. “The government’s central goal with the National Climate Agreement is to reduce greenhouse gas emissions in the Netherlands by 49% compared to 1990 levels. At a European level, the government is advocating a 55% reduction of greenhouse gas emissions by 2030.” [5]. From a survey of the CBS, it is apparent that citizens are not putting in as much effort into the transition to sustainable energy as the government would like them to. After analysing the data, it became clear that the citizens miss the motivation to switch to sustainable energy because they do not believe it is urgent at this point and it is too expensive for them [2]. This needs to be changed. The citizens need to be aware of their impact on the climate and the advantages that this process will bring them. For example, the implementation of smart home displays 4 for real time energy measuring will give the citizens an overview of their energy usage so they are aware of the impact they have. Researchers have also found that the citizens must be included in the decision-making aimed at changing their behaviour [4, 3, 1]. In the future, the government will need to include the citizens when they create campaigns, strategies or introduce new policies [7, 6]. By including and informing the citizens about the policies it will be more attractive for them to choose sustainable energy. However, is all of this enough to motivate the citizens towards energy transition? Or are there other and better ways to do it?

Keywords: Awereness, Energy Transition, Netherlands, citizens

Procedia PDF Downloads 67
9696 Effects of Thermal Properties of Aggregate Materials on Energy Consumption and Ghg Emissions of Transportation Infrastructure Assets Construction: Case Study for Japan

Authors: Ali Jamshidi, Kiyofumi Kurumisawa, Toyoharu Nawa

Abstract:

Transportation infrastructure assets can be considered as backbone of transportation system. They are routinely developed and or maintained which can be used effectively for movement of passengers, commodities and providing vital services. However, the infrastructure assets construction, maintenance and rehabilitation significantly depend on non-renewable natural resources, such as carbon-based energy carriers and aggregate materials. In this study, effects of thermal properties of aggregate materials were characterized for production of hot-mix asphalt in Japan, as a case study. The results indicated that incorporation of the aggregate with lower required heat energy significantly reduces fuel consumption greenhouse gas emission, irrespective of physical property of aggregate. The results also clearly showed that as 75% high-energy limestone is replaced with low-energy limestone in producing an asphalt mixture at 180 °C, 97,879 Japanese households would be energized per annum using the saved energy without any modification in the current asphalt mixing plants.

Keywords: zero energy infrastructure, sustainable development, greenhouse gas emission, asphalt pavement

Procedia PDF Downloads 238
9695 ZigBee Wireless Sensor Nodes with Hybrid Energy Storage System Based on Li-Ion Battery and Solar Energy Supply

Authors: Chia-Chi Chang, Chuan-Bi Lin, Chia-Min Chan

Abstract:

Most ZigBee sensor networks to date make use of nodes with limited processing, communication, and energy capabilities. Energy consumption is of great importance in wireless sensor applications as their nodes are commonly battery-driven. Once ZigBee nodes are deployed outdoors, limited power may make a sensor network useless before its purpose is complete. At present, there are two strategies for long node and network lifetime. The first strategy is saving energy as much as possible. The energy consumption will be minimized through switching the node from active mode to sleep mode and routing protocol with ultra-low energy consumption. The second strategy is to evaluate the energy consumption of sensor applications as accurately as possible. Erroneous energy model may render a ZigBee sensor network useless before changing batteries. In this paper, we present a ZigBee wireless sensor node with four key modules: a processing and radio unit, an energy harvesting unit, an energy storage unit, and a sensor unit. The processing unit uses CC2530 for controlling the sensor, carrying out routing protocol, and performing wireless communication with other nodes. The harvesting unit uses a 2W solar panel to provide lasting energy for the node. The storage unit consists of a rechargeable 1200 mAh Li-ion battery and a battery charger using a constant-current/constant-voltage algorithm. Our solution to extend node lifetime is implemented. Finally, a long-term sensor network test is used to exhibit the functionality of the solar powered system.

Keywords: ZigBee, Li-ion battery, solar panel, CC2530

Procedia PDF Downloads 371
9694 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 131
9693 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme

Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe

Abstract:

The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.

Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code

Procedia PDF Downloads 34
9692 Relation between Energy Absorption and Box Dimension of Rock Fragments under Impact Loading

Authors: Li Hung-Hui, Chen Chi-Chieh, Yang Zon-Yee

Abstract:

This study aims to explore the impact energy absorption in the fragmented processes of rock samples during the split-Hopkinson-pressure-bar tests. Three kinds of rock samples including granite, marble and sandstone were tested. The impact energy absorptions were calculated according to the incident, reflected and transmitted strain wave histories measured by a oscilloscope. The degree of fragment rocks after tests was quantified by the box dimension of the fractal theory. The box dimension of rock fragments was obtained from the particle size distribution curve by the sieve analysis. The results can be concluded that: (1) the degree of rock fragments after tests can be well described by the value of box dimension; (2) with the impact energy absorption increasing, the degrees of rock fragments are varied from the very large fragments to very small fragments, and the corresponding box dimension varies from 2.9 to 1.2.

Keywords: SHPB test, energy absorption, rock fragments, impact loading, box dimension

Procedia PDF Downloads 440
9691 Numerical Analysis on the Effect of Abrasive Parameters on Wall Shear Stress and Jet Exit Kinetic Energy

Authors: D. Deepak, N. Yagnesh Sharma

Abstract:

Abrasive Water Jet (AWJ) machining is a relatively new nontraditional machine tool used in machining of fiber reinforced composite. The quality of machined surface depends on jet exit kinetic energy which depends on various operating and material parameters. In the present work the effect abrasive parameters such as its size, concentration and type on jet kinetic energy is investigated using computational fluid dynamics (CFD). In addition, the effect of these parameters on wall shear stress developed inside the nozzle is also investigated. It is found that for the same operating parameters, increase in the abrasive volume fraction (concentration) results in significant decrease in the wall shear stress as well as the jet exit kinetic energy. Increase in the abrasive particle size results in marginal decrease in the jet exit kinetic energy. Numerical simulation also indicates that garnet abrasives produce better jet exit kinetic energy than aluminium oxide and silicon carbide.

Keywords: abrasive water jet machining, jet kinetic energy, operating pressure, wall shear stress, Garnet abrasive

Procedia PDF Downloads 373
9690 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 145
9689 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: cloud compliance, cloud security, data governance, privacy protection

Procedia PDF Downloads 109
9688 Optimized Cluster Head Selection Algorithm Based on LEACH Protocol for Wireless Sensor Networks

Authors: Wided Abidi, Tahar Ezzedine

Abstract:

Low-Energy Adaptive Clustering Hierarchy (LEACH) has been considered as one of the effective hierarchical routing algorithms that optimize energy and prolong the lifetime of network. Since the selection of Cluster Head (CH) in LEACH is carried out randomly, in this paper, we propose an approach of electing CH based on LEACH protocol. In other words, we present a formula for calculating the threshold responsible for CH election. In fact, we adopt three principle criteria: the remaining energy of node, the number of neighbors within cluster range and the distance between node and CH. Simulation results show that our proposed approach beats LEACH protocol in regards of prolonging the lifetime of network and saving residual energy.

Keywords: wireless sensors networks, LEACH protocol, cluster head election, energy efficiency

Procedia PDF Downloads 326
9687 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 316
9686 Increasing the Efficiency of the Biomass Gasification Technology with Using the Organic Rankin Cycle

Authors: Jaroslav Frantík, Jan Najser

Abstract:

This article deals with increasing the energy efficiency of a plant in terms of optimizing the process. The European Union is striving to achieve the climate-energy package in the area increasing of energy efficiency. The goal of energy efficiency is to reduce primary energy consumption by 20% within the EU until 2020. The objective of saving energy consumption in the Czech Republic was set at 47.84 PJ (13.29 TWh). For reducing electricity consumption, it is possible to choose: a) mandatory increasing of energy efficiency, b) alternative scheme, c) combination of both actions. The Czech Republic has chosen for reducing electricity consumption using-alternative scheme. The presentation is focused on the proposal of a technological unit dealing with the gasification process of processing of biomass with an increase of power in the output. The synthesis gas after gasification of biomass is used as fuel in a cogeneration process of reciprocating internal combustion engine with the classic production of heat and electricity. Subsequently, there is an explanation of the ORC system dealing with the conversion of waste heat to electricity with the using closed cycle of the steam process with organic medium. The arising electricity is distributed to the power grid as a further energy source, or it is used for needs of the partial coverage of the technological unit. Furthermore, there is a presented schematic description of the technology with the identification of energy flows starting from the biomass treatment by drying, through its conversion to gaseous fuel, producing of electricity and utilize of thermal energy with minimizing losses. It has been found that using of ORC system increased the efficiency of the produced electricity by 7.5%.

Keywords: biomass, efficiency, gasification, ORC system

Procedia PDF Downloads 213
9685 Economic Forecasting Analysis for Solar Photovoltaic Application

Authors: Enas R. Shouman

Abstract:

Economic development with population growth is leading to a continuous increase in energy demand. At the same time, growing global concern for the environment is driving to decrease the use of conventional energy sources and to increase the use of renewable energy sources. The objective of this study is to present the market trends of solar energy photovoltaic technology over the world and to represent economics methods for PV financial analyzes on the basis of expectations for the expansion of PV in many applications. In the course of this study, detailed information about the current PV market was gathered and analyzed to find factors influencing the penetration of PV energy. The paper methodology depended on five relevant economic financial analysis methods that are often used for investment decisions maker. These methods are payback analysis, net benefit analysis, saving-to-investment ratio, adjusted internal rate of return, and life-cycle cost. The results of this study may be considered as a marketing guide that helps diffusion of using PV Energy. The study showed that PV cost is economically reliable. The consumers will pay higher purchase prices for PV system installation but will get lower electricity bill.

Keywords: photovoltaic, financial methods, solar energy, economics, PV panel

Procedia PDF Downloads 103
9684 Integrated Decision Support for Energy/Water Planning in Zayandeh Rud River Basin in Iran

Authors: Safieh Javadinejad

Abstract:

In order to make well-informed decisions respecting long-term system planning, resource managers and policy creators necessitate to comprehend the interconnections among energy and water utilization and manufacture—and also the energy-water nexus. Planning and assessment issues contain the enhancement of strategies for declining the water and energy system’s vulnerabilities to climate alteration with also emissions of decreasing greenhouse gas. In order to deliver beneficial decision support for climate adjustment policy and planning, understanding the regionally-specific features of the energy-water nexus, and the history-future of the water and energy source systems serving is essential. It will be helpful for decision makers understand the nature of current water-energy system conditions and capacity for adaptation plans for future. This research shows an integrated hydrology/energy modeling platform which is able to extend water-energy examines based on a detailed illustration of local circumstances. The modeling links the Water Evaluation and Planning (WEAP) and the Long Range Energy Alternatives Planning (LEAP) system to create full picture of water-energy processes. This will allow water managers and policy-decision makers to simply understand links between energy system improvements and hydrological processing and realize how future climate change will effect on water-energy systems. The Zayandeh Rud river basin in Iran is selected as a case study to show the results and application of the analysis. This region is known as an area with large integration of both the electric power and water sectors. The linkages between water, energy and climate change and possible adaptation strategies are described along with early insights from applications of the integration modeling system.

Keywords: climate impacts, hydrology, water systems, adaptation planning, electricity, integrated modeling

Procedia PDF Downloads 285
9683 Investigation on Solar Thermoelectric Generator Using D-Mannitol/Multi-Walled Carbon Nanotubes Composite Phase Change Materials

Authors: Zihua Wu, Yueming He, Xiaoxiao Yu, Yuanyuan Wang, Huaqing Xie

Abstract:

The match of Solar thermoelectric generator (STEG) and phase change materials (PCM) can enhance the solar energy storage and reduce environmental impact from the day-and-night transformation and weather changes. This work utilizes D-mannitol (DM) matrix as the suitable PCM for coupling with thermoelectric generator to achieve the middle-temperature solar energy storage performance at 165℃-167℃. DM/MWCNT composite phase change materials prepared by ball milling not only can keep a high phase change enthalpy of DM material but also have great photo-thermal conversion efficiency of 82%. Based on the self-made storage device container, the effect of PCM thickness on the solar energy storage performance is further discussed and analyzed. The experimental results prove that PCM-STEG coupling system can output more electric energy than pure STEG system because PCM can decline the heat transfer and storage thermal energy to further generate the electric energy through thermal-to-electric conversion when the light is removed. The increase of PCM thickness can reduce the heat transfer and enhance thermal storage, and then the power generation performance of PCM-STEG coupling system can be improved. As the increase of light intensity, the output electric energy of the coupling system rises accordingly, and the maximum amount of electrical energy can reach by 113.85 J at 1.6 W/cm2. The study of the PCM-STEG coupling system has certain reference for the development of solar energy storage and application.

Keywords: solar energy, solar thermoelectric generator, phase change materials, solar-to-electric energy, DM/MWCNT

Procedia PDF Downloads 60
9682 Study of Energy Dissipation in Shape Memory Alloys: A Comparison between Austenite and Martensite Phase of SMAs

Authors: Amirmozafar Benshams, Khatere Kashmari, Farzad Hatami, Mesbah Saybani

Abstract:

Shape memory alloys with high capability of energy dissipation and large deformation bearing with return ability to their original shape without too much hysteresis strain have opened their place among the other damping systems as smart materials. Ninitol which is the most well-known and most used alloy material from the shape memory alloys family, has high resistance and fatigue and is coverage for large deformations. Shape memory effect and super-elasticity by shape alloys like Nitinol, are the reasons of the high power of these materials in energy depreciation. Thus, these materials are suitable for use in reciprocating dynamic loading conditions. The experiments results showed that Nitinol wires with small diameter have greater energy dissipation capability and by increase of diameter and thickness the damping capability and energy dissipation increase.

Keywords: shape memory alloys, shape memory effect, super elastic effect, nitinol, energy dissipation

Procedia PDF Downloads 502
9681 Distributed Energy Storage as a Potential Solution to Electrical Network Variance

Authors: V. Rao, A. Bedford

Abstract:

As the efficient performance of national grid becomes increasingly important to maintain the electrical network stability, the balance between the generation and the demand must be effectively maintained. To do this, any losses that occur in the power network must be reduced by compensating for it. In this paper, one of the main cause for the losses in the network is identified as the variance, which hinders the grid’s power carrying capacity. The reason for the variance in the grid is investigated and identified as the rise in the integration of renewable energy sources (RES) such as wind and solar power. The intermittent nature of these RES along with fluctuating demands gives rise to variance in the electrical network. The losses that occur during this process is estimated by analyzing the network’s power profiles. Whilst researchers have identified different ways to tackle this problem, little consideration is given to energy storage. This paper seeks to redress this by considering the role of energy storage systems as potential solutions to reduce variance in the network. The implementation of suitable energy storage systems based on different applications is presented in this paper as part of variance reduction method and thus contribute towards maintaining a stable and efficient grid operation.

Keywords: energy storage, electrical losses, national grid, renewable energy, variance

Procedia PDF Downloads 310
9680 Blockchain’s Feasibility in Military Data Networks

Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam

Abstract:

Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.

Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing

Procedia PDF Downloads 133
9679 A Memetic Algorithm for an Energy-Costs-Aware Flexible Job-Shop Scheduling Problem

Authors: Christian Böning, Henrik Prinzhorn, Eric C. Hund, Malte Stonis

Abstract:

In this article, the flexible job-shop scheduling problem is extended by consideration of energy costs which arise owing to the power peak, and further decision variables such as work in process and throughput time are incorporated into the objective function. This enables a production plan to be simultaneously optimized in respect of the real arising energy and logistics costs. The energy-costs-aware flexible job-shop scheduling problem (EFJSP) which arises is described mathematically, and a memetic algorithm (MA) is presented as a solution. In the MA, the evolutionary process is supplemented with a local search. Furthermore, repair procedures are used in order to rectify any infeasible solutions that have arisen in the evolutionary process. The potential for lowering the real arising costs of a production plan through consideration of energy consumption levels is highlighted.

Keywords: energy costs, flexible job-shop scheduling, memetic algorithm, power peak

Procedia PDF Downloads 341