Search results for: energy security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10897

Search results for: energy security

9877 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 151
9876 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: cloud compliance, cloud security, data governance, privacy protection

Procedia PDF Downloads 116
9875 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 319
9874 A Hybrid Simulation Approach to Evaluate Cooling Energy Consumption for Public Housings of Subtropics

Authors: Kwok W. Mui, Ling T. Wong, Chi T. Cheung

Abstract:

Cooling energy consumption in the residential sector, different from shopping mall, office or commercial buildings, is significantly subject to occupant decisions where in-depth investigations are found limited. It shows that energy consumptions could be associated with housing types. Surveys have been conducted in existing Hong Kong public housings to understand the housing characteristics, apartment electricity demands, occupant’s thermal expectations, and air–conditioning usage patterns for further cooling energy-saving assessments. The aim of this study is to develop a hybrid cooling energy prediction model, which integrated by EnergyPlus (EP) and artificial neural network (ANN) to estimate cooling energy consumption in public residential sector. Sensitivity tests are conducted to find out the energy impacts with changing building parameters regarding to external wall and window material selection, window size reduction, shading extension, building orientation and apartment size control respectively. Assessments are performed to investigate the relationships between cooling demands and occupant behavior on thermal environment criteria and air-conditioning operation patterns. The results are summarized into a cooling energy calculator for layman use to enhance the cooling energy saving awareness in their own living environment. The findings can be used as a directory framework for future cooling energy evaluation in residential buildings, especially focus on the occupant behavioral air–conditioning operation and criteria of energy-saving incentives.

Keywords: artificial neural network, cooling energy, occupant behavior, residential buildings, thermal environment

Procedia PDF Downloads 168
9873 Vibration Energy Harvesting from Aircraft Structure Using Piezoelectric Transduction

Authors: M. Saifudin Ahmed Atique, Santosh Paudyal, Caixia Yang

Abstract:

In an aircraft, a great portion of energy is wasted due to its inflight structural vibration. Structural components vibrate due to aeroelastic instabilities, gust perturbations and engine rotation at very high rpm. Energy losses due to mechanical vibration can be utilized by harvesting energy from aircraft structure as electrical energy. This harvested energy can be stored in battery panels built into aircraft fuselage and can be used to power inflight auxiliary accessories i.e., lighting and entertainment systems. Moreover, this power can be used for wireless Structural Health Monitoring System (SHM) for aircraft and as an excellent replacement of aircraft Ground Power Unit (GPU)/Auxiliary Power Unit (APU) during passenger onboard time to power aircraft cabin accessories to reduce aircraft ground operation cost significantly. In this paper, we propose the design of a noble aircraft wing in which Piezoelectric panels placed under the composite skin of aircraft wing will generate electrical charges from any inflight aerodynamics or mechanical vibration and store it into battery to power auxiliary inflight systems/accessories as per requirement. Experimental results show that a well-engineered piezoelectric energy harvester based aircraft wing can produce adequate energy to support in-flight lighting and auxiliary cabin accessories.

Keywords: vibration energy, aircraft wing, piezoelectric material, inflight accessories

Procedia PDF Downloads 157
9872 Ab Initio Multiscale Catalytic Synthesis/Cracking Reaction Modelling of Ammonia as Liquid Hydrogen Carrier

Authors: Blaž Likozar, Andraž Pavlišič, Matic Pavlin, Taja Žibert, Aleksandra Zamljen, Sašo Gyergyek, Matej Huš

Abstract:

Ammonia is gaining recognition as a carbon-free fuel for energy-intensive applications, particularly transportation, industry, and power generation. Due to its physical properties, high energy density of 3 kWh kg-1, and high gravimetric hydrogen capacity of 17.6 wt%, ammonia is an efficient energy vector for green hydrogen, capable of mitigating hydrogen’s storage, distribution, and infrastructure deployment limitations. Chemicalstorage in the form of ammonia provides an efficient and affordable solution for energy storage, which is currently a critical step in overcoming the intermittency of abundant renewable energy sources with minimal or no environmental impact. Experiments were carried out to validate the modelling in a packed bed reactor, which proved to be agreeing.

Keywords: hydrogen, ammonia, catalysis, modelling, kinetics

Procedia PDF Downloads 68
9871 Analysis of Energy Required for the Massive Incorporation of Electric Buses in the City of Ambato - Ecuador

Authors: Paola Quintana, Angélica Vaca, Sebastián Villacres, Henry Acurio

Abstract:

Ecuador through the Organic Law of Energy Efficiency establishes that "Starting in the year 2025, all vehicles that are incorporated into the urban and inter-parroquial public transport service must only be electric”, this marks a foundation for the introduction of electric mobility in the country. The present investigation is based on developing an analysis and projection of the Energy Required for the incorporation of electric buses for public passenger transport in the city of Ambato-Ecuador, taking into account the useful life of the vehicle fleet, number of existing vehicles and analysis of transport routes in the study city. The energy demand based on the vehicular dynamics is analyzed, determination of equations for the calculation of force in the wheel since it is considered a variable of slope due to the fact that this has a great incidence in the autonomy when speaking of electric mobility, later the energy analysis applied to public transport routes, finally a projection of the energy requirement is made based on the change of public transport units according to their useful life.

Keywords: public transport, electric mobility, energy, ecuador

Procedia PDF Downloads 86
9870 Simulation and Study of the Effect of Paint Mineral Coating on Energy Saving

Authors: A. A. Azemati, H. Hosseini

Abstract:

By using an adequate paint in buildings, energy consumption can be decreased. In this research, a range of wall paints in different climatic conditions has been investigated to observe its effect on energy consumption. In the current study, the researchers have investigated the effect of different parameters including climatic condition, absorption coefficient, and thermal loads on paint coating. In order to study these effects, heating and cooling loads of a typical building with different color paints have been calculated. The effect of building paint in different climatic condition was studied and a comparison was drawn between paints and painting coats with inorganic micro particles in temperate climate to obtain optimized energy consumption.

Keywords: climate, energy consumption, inorganic, painting coats

Procedia PDF Downloads 288
9869 Blockchain’s Feasibility in Military Data Networks

Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam

Abstract:

Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.

Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing

Procedia PDF Downloads 137
9868 The New Approach to Airport Emergency Plans

Authors: Jakub Kraus, Vladimír Plos, Peter Vittek

Abstract:

This article deals with a new approach to the airport emergency plans, which are the basic documents and manuals for dealing with events with impact on safety or security. The article describes the identified parts in which the current airport emergency plans do not fulfill their role and which should therefore be considered in the creation of corrective measures. All these issues have been identified at airports in the Czech Republic and confirmed at airports in neighboring countries.

Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system

Procedia PDF Downloads 509
9867 How Manufacturing Firm Manages Information Security: Need Pull and Technology Push Perspective

Authors: Geuna Kim, Sanghyun Kim

Abstract:

This study investigates various factors that may influence the ISM process, including the organization’s internal needs and external pressure, and examines the role of regulatory pressure in ISM development and performance. The 105 sets of data collected in a survey were tested against the research model using SEM. The results indicate that NP and TP had positive effects on the ISM process, except for perceived benefits. Regulatory pressure had a positive effect on the relationship between ISM awareness and ISM development and performance.

Keywords: information security management, need pull, technology push, regulatory pressure

Procedia PDF Downloads 293
9866 Investigation on Machine Tools Energy Consumptions

Authors: Shiva Abdoli, Daniel T.Semere

Abstract:

Several researches have been conducted to study consumption of energy in cutting process. Most of these researches are focusing to measure the consumption and propose consumption reduction methods. In this work, the relation between the cutting parameters and the consumption is investigated in order to establish a generalized energy consumption model that can be used for process and production planning in real production lines. Using the generalized model, the process planning will be carried out by taking into account the energy as a function of the selected process parameters. Similarly, the generalized model can be used in production planning to select the right operational parameters like batch sizes, routing, buffer size, etc. in a production line. The description and derivation of the model as well as a case study are given in this paper to illustrate the applicability and validity of the model.

Keywords: process parameters, cutting process, energy efficiency, Material Removal Rate (MRR)

Procedia PDF Downloads 495
9865 Development of Energy Benchmarks Using Mandatory Energy and Emissions Reporting Data: Ontario Post-Secondary Residences

Authors: C. Xavier Mendieta, J. J McArthur

Abstract:

Governments are playing an increasingly active role in reducing carbon emissions, and a key strategy has been the introduction of mandatory energy disclosure policies. These policies have resulted in a significant amount of publicly available data, providing researchers with a unique opportunity to develop location-specific energy and carbon emission benchmarks from this data set, which can then be used to develop building archetypes and used to inform urban energy models. This study presents the development of such a benchmark using the public reporting data. The data from Ontario’s Ministry of Energy for Post-Secondary Educational Institutions are being used to develop a series of building archetype dynamic building loads and energy benchmarks to fill a gap in the currently available building database. This paper presents the development of a benchmark for college and university residences within ASHRAE climate zone 6 areas in Ontario using the mandatory disclosure energy and greenhouse gas emissions data. The methodology presented includes data cleaning, statistical analysis, and benchmark development, and lessons learned from this investigation are presented and discussed to inform the development of future energy benchmarks from this larger data set. The key findings from this initial benchmarking study are: (1) the importance of careful data screening and outlier identification to develop a valid dataset; (2) the key features used to develop a model of the data are building age, size, and occupancy schedules and these can be used to estimate energy consumption; and (3) policy changes affecting the primary energy generation significantly affected greenhouse gas emissions, and consideration of these factors was critical to evaluate the validity of the reported data.

Keywords: building archetypes, data analysis, energy benchmarks, GHG emissions

Procedia PDF Downloads 306
9864 Changing the Dynamics of the Regional Water Security in the Mekong River Basin: An Explorative Study Understanding the Cooperation and Conflict from Critical Hydropolitical Perspective

Authors: Richard Grünwald, Wenling Wang, Yan Feng

Abstract:

The presented paper explores the changing dynamics of regional water security in the Mekong River Basin and examines the contemporary water-related challenges from a critical hydropolitical perspective. By drawing on the Lancang-Mekong Cooperation and Conflict Database (LMCCD) recording more than 3000 water-related events within the basin in the last 30 years, we identified several trends changing the dynamics of the regional water security in the Mekong River Basin. Firstly, there is growing politicization of water that is no longer interpreted as abundant. While some scientists blame the rapid basin development, particularly in upstream countries, other researchers consider climate change and cumulative environmental impacts of various water projects as the main culprit for changing the water flow. Secondly, there is an increasing securitization of large-scale hydropower dams with questionable outcomes. Despite hydropower dams raise many controversies, many riparian states push the development at all cost. Such water security dilemma can be especially traced to Laos and Cambodia, which highly invest in the hydropower sector even at the expense of the local environment and good relations with neighbouring countries situated lower on the river. Thirdly, there is a lack of accountable transboundary water governance that will effectively face a looming water crisis. To date, most of the existing cooperation mechanisms are undermined by the geopolitical interests of foreign donors and increasing mistrust to scientific approaches dealing with water insecurity. Our findings are beneficial for the policy-makers and other water experts who want to grasp the broader hydropolitical context in the Mekong River Basin and better understand the new water security threats, including misinterpretation of the hydrological data and legitimization of the pro-development narratives.

Keywords: critical hydropolitics, mekong river, politicization of science, water governance, water security

Procedia PDF Downloads 211
9863 Harnessing the Potential of Renewable Energy Sources to Reduce Fossil Energy Consumption in the Wastewater Treatment Process

Authors: Hen Friman

Abstract:

Various categories of aqueous solutions are discharged within residential, institutional, commercial, and industrial structures. To safeguard public health and preserve the environment, it is imperative to subject wastewater to treatment processes that eliminate pathogens (such as bacteria and viruses), nutrients (such as nitrogen and phosphorus), and other compounds. Failure to address untreated sewage accumulation can result in an array of adverse consequences. Israel exemplifies a special case in wastewater management. Appropriate wastewater treatment significantly benefits sectors such as agriculture, tourism, horticulture, and industry. Nevertheless, untreated sewage in settlements lacking proper sewage collection or transportation networks remains an ongoing and substantial threat. Notably, the process of wastewater treatment entails substantial energy consumption. Consequently, this study explores the integration of solar energy as a renewable power source within the wastewater treatment framework. By incorporating renewable energy sources into the process, costs can be minimized, and decentralized facilities can be established even in areas lacking adequate infrastructure for traditional treatment methods.

Keywords: renewable energy, solar energy, innovative, wastewater treatment

Procedia PDF Downloads 107
9862 Energy Saving Study of Mass Rapid Transit by Optimal Train Coasting Operation

Authors: Artiya Sopharak, Tosaphol Ratniyomchai, Thanatchai Kulworawanichpong

Abstract:

This paper presents an energy-saving study of Mass Rapid Transit (MRT) using an optimal train coasting operation. For the dynamic train movement with four modes of operation, including accelerating mode, constant speed or cruising mode, coasting mode, and braking mode are considered in this study. The acceleration rate, the deceleration rate, and the starting coasting point are taken into account the optimal train speed profile during coasting mode with considering the energy saving and acceptable travel time comparison to the based case with no coasting operation. In this study, the mathematical method as a Quadratic Search Method (QDS) is conducted to carry out the optimization problem. A single train of MRT services between two stations with a distance of 2 km and a maximum speed of 80 km/h is taken to be the case study. Regarding the coasting mode operation, the results show that the longer distance of costing mode, the less energy consumption in cruising mode and the less braking energy. On the other hand, the shorter distance of coasting mode, the more energy consumption in cruising mode and the more braking energy.

Keywords: energy saving, coasting mode, mass rapid transit, quadratic search method

Procedia PDF Downloads 301
9861 High-Performance Non-aqueous Organic Redox Flow Battery in Ambient Condition

Authors: S. K. Mohapatra, K. Ramanujam, S. Sankararaman

Abstract:

Redox flow battery (RFB) is a preferred energy storage option for grid stabilisation and energy arbitrage as it offers energy and power decoupling. In contrast to aqueous RFBs (ARFBs), nonaqueous RFBs (NARFBs) could offer high energy densities due to the wider electrochemical window of the solvents used, which could handle high and low voltage organic redox couples without undergoing electrolysis. In this study, a RFB based on benzyl viologen hexafluorophosphate [BV(PF6)2] as anolyte and N-hexyl phenothiazine [HPT] as catholyte demonstrated. A cell operated with mixed electrolyte (1:1) containing 0.2 M [BV(PF₆)₂] and 0.2 M [HPT] delivered a coulombic efficiency (CE) of 95.3 % and energy efficiency (EE) 53%, with nearly 68.9% material utilisation at 40 mA cm-2 current density.

Keywords: non-aqueous redox flow battery, benzyl viologen, N-hexyl phenothiazine, mixed electrolyte

Procedia PDF Downloads 74
9860 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova

Abstract:

In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality

Procedia PDF Downloads 182
9859 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 221
9858 Energy Conversion from Waste Paper Industry Using Fluidized Bed Combustion

Authors: M. Dyah Ayu Yuli, S. Faisal Dhio, P. Johandi, P. Muhammad Sofyan

Abstract:

Pulp and paper mills generate various quantities of energy-rich biomass as wastes, depending on technological level, pulp and paper grades and wood quality. These wastes are produced in all stages of the process: wood preparation, pulp and paper manufacture, chemical recovery, recycled paper processing, waste water treatment. Energy recovery from wastes of different origin has become a generally accepted alternative to their disposal. Pulp and paper industry expresses an interest in adapting and integrating advanced biomass energy conversion technologies into its mill operations using Fluidized Bed Combustion. Industrial adoption of these new technologies has the potential for higher efficiency, lower capital cost, and safer operation than conventional operations that burn fossil fuels for energy. Incineration with energy recovery has the advantage of hygienic disposal, volume reduction, and the recovery of thermal energy by means of steam or super heated water that can be used for heating and power generation.

Keywords: biomass, fluidized bed combustion, pulp and paper mills, waste

Procedia PDF Downloads 472
9857 Energy Efficiency Analysis of Electrical Submersible Pump on Mature Oil Field Offshore Java Sea

Authors: Marda Vidrianto, Tania Surya Utami

Abstract:

Electrical Submersible Pump (ESP) is an artificial lift of choice to produce oil on Offshore Java Sea. It is selected based on the production rate capacity and running life expectation. ESP performance in a mature field is highly affected by oil well conditions. The presence of sand, scale, gas, and low influx will create unstable ESP operation hence lowering the run life expectation and system efficiency. This paper reviews the current energy usage and efficiency on every part of the ESP system. The hydraulic and electrical losses, as well as system efficiency for each well, are calculated to identify energy losses and the possibility for improvement. It is shown that high back pressure on the system and low-efficiency pump are the major contributors to energy losses. It was found that optimized production rate and the use of advanced technology on pump and motor unit could improve energy efficiency.

Keywords: advance technology, energy efficiency, ESP, mature field, production rate

Procedia PDF Downloads 340
9856 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 167
9855 Combining Chiller and Variable Frequency Drives

Authors: Nasir Khalid, S. Thirumalaichelvam

Abstract:

In most buildings, according to US Department of Energy Data Book, the electrical consumption attributable to centralized heating and ventilation of air- condition (HVAC) component can be as high as 40-60% of the total electricity consumption for an entire building. To provide efficient energy management for the market today, researchers are finding new ways to develop a system that can save electrical consumption of buildings even more. In this concept paper, a system known as Intelligent Chiller Energy Efficiency (iCEE) System is being developed that is capable of saving up to 25% from the chiller’s existing electrical energy consumption. In variable frequency drives (VFDs), research has found significant savings up to 30% of electrical energy consumption. Together with the VFDs at specific Air Handling Unit (AHU) of HVAC component, this system will save even more electrical energy consumption. The iCEE System is compatible with any make, model or age of centrifugal, rotary or reciprocating chiller air-conditioning systems which are electrically driven. The iCEE system uses engineering principles of efficiency analysis, enthalpy analysis, heat transfer, mathematical prediction, modified genetic algorithm, psychometrics analysis, and optimization formulation to achieve true and tangible energy savings for consumers.

Keywords: variable frequency drives, adjustable speed drives, ac drives, chiller energy system

Procedia PDF Downloads 556
9854 Sustainable Design Features Implementing Public Rental Housing for Remodeling

Authors: So-Young Lee, Myoung-Won Oh, Soon-Cheol Eom, Yeon-Won Suh

Abstract:

Buildings produce more than one thirds of the total energy consumption and CO₂ emissions. Korean government agency pronounced and initiated Zero Energy Buildings policy for construction as of 2025. The net zero energy design features include passive (daylight, layout, materials, insulation, finishes, etc.) and active (renewable energy sources) elements. The Zero Energy House recently built in Nowon-gu, Korea is provided for 121 households as a public rental housing complex. However most of public rental housing did not include sustainable features which can reduce housing maintaining cost significantly including energy cost. It is necessary to implement net zero design features to the obsolete public rental housing during the remodeling procedure since it can reduce housing cost in long term. The purpose of this study is to investigate sustainable design elements implemented in Net Zero Energy House in Korea and passive and active housing design features in order to apply the sustainable features to the case public rental apartment for remodeling. Housing complex cases in this study are Nowan zero Energy house, Gangnam Bogemjari House, and public rental housings built in more than 20 years in Seoul areas. As results, energy consumption in public rental housing built in 5-years can be improved by exterior surfaces. Energy optimizing in case housing built in more than 20 years can be enhanced by renovated materials, insulation, replacement of windows, exterior finishes, lightings, gardening, water, renewable energy installation, Green IT except for sunlight and layout of buildings. Further life costing analysis is needed for energy optimizing for case housing alternatives.

Keywords: affordable housing, remodeling, sustainable design, zero-energy house

Procedia PDF Downloads 189
9853 Learning Predictive Models for Efficient Energy Management of Exhibition Hall

Authors: Jeongmin Kim, Eunju Lee, Kwang Ryel Ryu

Abstract:

This paper addresses the problem of predictive control for energy management of large-scaled exhibition halls, where a lot of energy is consumed to maintain internal atmosphere under certain required conditions. Predictive control achieves better energy efficiency by optimizing the operation of air-conditioning facilities with not only the current but also some future status taken into account. In this paper, we propose to use predictive models learned from past sensor data of hall environment, for use in optimizing the operating plan for the air-conditioning facilities by simulating future environmental change. We have implemented an emulator of an exhibition hall by using EnergyPlus, a widely used building energy emulation tool, to collect data for learning environment-change models. Experimental results show that the learned models predict future change highly accurately on a short-term basis.

Keywords: predictive control, energy management, machine learning, optimization

Procedia PDF Downloads 269
9852 STC Parameters versus Real Time Measured Parameters to Determine Cost Effectiveness of PV Panels

Authors: V. E. Selaule, R. M. Schoeman H. C. Z. Pienaar

Abstract:

Research has shown that solar energy is a renewable energy resource with the most potential when compared to other renewable energy resources in South Africa. There are many makes of Photovoltaic (PV) panels on the market and it is difficult to assess which to use. PV panel manufacturers use Standard Test Conditions (STC) to rate their PV panels. STC conditions are different from the actual operating environmental conditions were the PV panels are used. This paper describes a practical method to determine the most cost effective available PV panel. The method shows that PV panel manufacturer STC ratings cannot be used to select a cost effective PV panel.

Keywords: PV orientation, PV panel, PV STC, Solar energy

Procedia PDF Downloads 471
9851 Cyber Supply Chain Resilient: Enhancing Security through Leadership to Protect National Security

Authors: Katie Wood

Abstract:

Cyber criminals are constantly on the lookout for new opportunities to exploit organisation and cause destruction. This could lead to significant cause of economic loss for organisations in the form of destruction in finances, reputation and even the overall survival of the organization. Additionally, this leads to serious consequences on national security. The threat of possible cyber attacks places further pressure on organisations to ensure they are secure, at a time where international scale cyber attacks have occurred in a range of sectors. Stakeholders are wanting confidence that their data is protected. This is only achievable if a business fosters a resilient supply chain strategy which is implemented throughout its supply chain by having a strong cyber leadership culture. This paper will discuss the essential role and need for organisations to adopt a cyber leadership culture and direction to learn about own internal processes to ensure mitigating systemic vulnerability of its supply chains. This paper outlines that to protect national security there is an urgent need for cyber awareness culture change. This is required in all organisations, regardless of their sector or size, to implementation throughout the whole supplier chain to support and protect economic prosperity to make the UK more resilient to cyber-attacks. Through businesses understanding the supply chain and risk management cycle of their own operates has to be the starting point to ensure effective cyber migration strategies.

Keywords: cyber leadership, cyber migration strategies, resilient supply chain strategy, cybersecurity

Procedia PDF Downloads 241
9850 The Fadama Initiative: Implications for Human Security and Sustainable Development in Nigeria

Authors: Albert T. Akume, Yahya M. Abdullahi

Abstract:

The impact of poverty on individual and society is grave, hence the efforts by the government to eradicate or alleviate. In Nigeria the various efforts to reduce rural poverty by empowering them and making the process of their development self-sustaining have ended dismally. That notwithstanding, government determination to conquer poverty has not diminish as in the early 1990s the government with financial collaboration from the World Bank and African Development Bank introduced the fadama project. It is against this backdrop that this paper uses the documentary and analytical research methods to examine the implication the fadama development project has for community capacity development and human security in Nigeria. From the analysis it was discovered the fadama project improved household income of fadama farmers, community empowerment, participatory development planning and support for demand driven productive investment in farm and non-farm activities including community infrastructures. Despite this impressive result the fadama project is challenged by conflict especially in northern Nigeria and late delivery of necessary farm consumables that aid improved productivity. It was therefore recommended that the government should strengthen her various state security institutions to proactively mitigate conflicts and to ensure that farm consumables and other support services reach farmers timely.

Keywords: capacity development, empowerment, fadama, human security, poverty reduction, theory of change, sustainable development

Procedia PDF Downloads 496
9849 Prediction of Pounding between Two SDOF Systems by Using Link Element Based On Mathematic Relations and Suggestion of New Equation for Impact Damping Ratio

Authors: Seyed M. Khatami, H. Naderpour, R. Vahdani, R. C. Barros

Abstract:

Many previous studies have been carried out to calculate the impact force and the dissipated energy between two neighboring buildings during seismic excitation, when they collide with each other. Numerical studies are an important part of impact, which several researchers have tried to simulate the impact by using different formulas. Estimation of the impact force and the dissipated energy depends significantly on some parameters of impact. Mass of bodies, stiffness of spring, coefficient of restitution, damping ratio of dashpot and impact velocity are some known and unknown parameters to simulate the impact and measure dissipated energy during collision. Collision is usually shown by force-displacement hysteresis curve. The enclosed area of the hysteresis loop explains the dissipated energy during impact. In this paper, the effect of using different types of impact models is investigated in order to calculate the impact force. To increase the accuracy of impact model and to optimize the results of simulations, a new damping equation is assumed and is validated to get the best results of impact force and dissipated energy, which can show the accuracy of suggested equation of motion in comparison with other formulas. This relation is called "n-m". Based on mathematical relation, an initial value is selected for the mentioned coefficients and kinetic energy loss is calculated. After each simulation, kinetic energy loss and energy dissipation are compared with each other. If they are equal, selected parameters are true and, if not, the constant of parameters are modified and a new analysis is performed. Finally, two unknown parameters are suggested to estimate the impact force and calculate the dissipated energy.

Keywords: impact force, dissipated energy, kinetic energy loss, damping relation

Procedia PDF Downloads 550
9848 Routing and Energy Efficiency through Data Coupled Clustering in Large Scale Wireless Sensor Networks (WSNs)

Authors: Jainendra Singh, Zaheeruddin

Abstract:

A typical wireless sensor networks (WSNs) consists of several tiny and low-power sensors which use radio frequency to perform distributed sensing tasks. The longevity of wireless sensor networks (WSNs) is a major issue that impacts the application of such networks. While routing protocols are striving to save energy by acting on sensor nodes, recent studies show that network lifetime can be enhanced by further involving sink mobility. A common approach for energy efficiency is partitioning the network into clusters with correlated data, where the representative nodes simply transmit or average measurements inside the cluster. In this paper, we propose an energy- efficient homogenous clustering (EHC) technique. In this technique, the decision of each sensor is based on their residual energy and an estimate of how many of its neighboring cluster heads (CHs) will benefit from it being a CH. We, also explore the routing algorithm in clustered WSNs. We show that the proposed schemes significantly outperform current approaches in terms of packet delay, hop count and energy consumption of WSNs.

Keywords: wireless sensor network, energy efficiency, clustering, routing

Procedia PDF Downloads 264