Search results for: energy security policy
13106 Challenges and Opportunities in Modelling Energy Behavior of Household in Malaysia
Authors: Zuhaina Zakaria, Noraliza Hamzah, Siti Halijjah Shariff, Noor Aizah Abdul Karim
Abstract:
The residential sector in Malaysia has become the single largest energy sector accounting for 21% of the entire energy usage of the country. In the past 10 years, a number of energy efficiency initiatives in the residential sector had been undertaken by the government including. However, there is no clear evidence that the total residential energy consumption has been reduced substantially via these strategies. Household electrical appliances such as air conditioners, refrigerators, lighting and televisions are used depending on the consumers’ activities. The behavior of household occupants played an important role in energy consumption and influenced the operation of the physical devices. Therefore, in order to ensure success in energy efficiency program, it requires not only the technological aspect but also the consumers’ behaviors component. This paper focuses on the challenges and opportunities in modelling residential consumer behavior in Malaysia. A field survey to residential consumers was carried out and responses from the survey were analyzed to determine the consumers’ level of knowledge and awareness on energy efficiency. The analyses will be used in determining a right framework to explain household energy use intentions and behavior. These findings will be beneficial to power utility company and energy regulator in addressing energy efficiency related issues.Keywords: consumer behavior theories, energy efficiency, household occupants, residential consumer
Procedia PDF Downloads 33313105 Food Waste Utilization: A Contemporary Prospect of Meeting Energy Crisis Using Microbial Fuel Cell
Authors: Bahareh Asefi, Fereidoun Farzaneh, Ghazaleh Asefi, Chang-Ping Yu
Abstract:
Increased production of food waste (FW) is a global issue that is receiving more attention due to its environmental and economic impacts. The generation of electricity from food waste, known as energy recovery, is one of the effective solutions in food waste management. Food waste has high energy content which seems ideal to achieve dual benefits in terms of energy recovery and waste stabilization. Microbial fuel cell (MFC) is a promising technology for treating food waste and generate electricity. In this work, we will review energy utilization from different kind of food waste using MFC and factors which affected the process. We have studied the key technology of energy generated from food waste using MFC to enhance the food waste management. The power density and electricity production by each kind of food waste and challenges were identified. This work explored the conversion of FW into energy from different type of food waste, which aim to provide a theoretical analysis for energy utilization of food waste.Keywords: energy generation, food waste, microbial fuel cell, power density
Procedia PDF Downloads 22913104 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme
Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey
Abstract:
In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID
Procedia PDF Downloads 29813103 Mapping the Digital Landscape: An Analysis of Party Differences between Conventional and Digital Policy Positions
Authors: Daniel Schwarz, Jan Fivaz, Alessia Neuroni
Abstract:
Although digitization is a buzzword in almost every election campaign, the political parties leave voters largely in the dark about their specific positions on digital issues. In the run-up to the 2019 elections in Switzerland, the ‘Digitization Monitor’ project (DMP) was launched in order to change this situation. Within the framework of the DMP, all 4,736 candidates were surveyed about their digital policy positions and values. The DMP is designed as a digital policy supplement to the existing ‘smartvote’ voting advice application. This enabled a direct comparison of the digital policy attitudes according to the DMP with the topics of the ‘smartvote’ questionnaire which are comprehensive in content but mainly related to conventional policy areas. This paper’s main research goal is to analyze and visualize possible differences between conventional and digital policy areas in terms of response patterns between and within political parties. The analysis is based on dimensionality reduction methods (multidimensional scaling and principal component analysis) for the visualization of inter-party differences, and on standard deviation as a measure of variation for the evaluation of intra-party unity. The results reveal that digital issues show a lower degree of inter-party polarization compared to conventional policy areas. Thus, the parties have more common ground in issues on digitization than in conventional policy areas. In contrast, the study reveals a mixed picture regarding intra-party unity. Homogeneous parties show a lower degree of unity in digitization issues whereas parties with heterogeneous positions in conventional areas have more united positions in digital areas. All things considered, the findings are encouraging as less polarized conditions apply to the debate on digital development compared to conventional politics. For the future, it would be desirable if in further countries similar projects to the DMP could emerge to broaden the basis for conclusions.Keywords: comparison of political issue dimensions, digital awareness of candidates, digital policy space, party positions on digital issues
Procedia PDF Downloads 18613102 In a Situation of Great Distress: Cross Border Migration and the Quest for Enduring Security in North-East Nigeria
Authors: Nuhu Bitrus Mailabari
Abstract:
Nigeria is a highly multifarious nation trapped between affluence and affliction. On one hand, the state has vast territorial size, economic strength, relative internal cohesion, and good external linkages. On the other, it is bedeviled with enormous challenges. It is common knowledge that the North-East geo-political zone has suffered colossal destruction for the most part of the last ten years due to the activities of the insurgent group Boko Haram. Several factors (political, economic, religious, socio-cultural) have been credited with the heightened insecurity in the region. Without a doubt, the security crisis in the region has rekindled several discussions critical to Nigeria’s security architecture. However, the debate on finding an enduring solution to the devastation in the North East continually neglects the nexus between cross border migration and national security. Using content analysis, this paper debates two main issues that continue to affect security in the North East. One, the cumulative impact of the Economic Community of West African States (ECOWAS) protocol on the free movement of people and goods. Two, the porous nature of Nigeria’s borders. Theoretically, the paper will rely on the systems theory because of its broad focus on structure, linkage, and process. The work concludes in twofold. First, that cross border migration and poor border management processes further worsened the political and socio-economic conditions of a region that is already in a bad state. Secondly, in addition to the existing strategies, Nigeria must develop a holistic approach including new methods of handling cross border movements in solving the security issues.Keywords: border, cross border, migration, Nigeria, northeast region, security
Procedia PDF Downloads 16413101 Maximaxing the Usage of Solar Energy in an Area of Low Peak Sunlight Hours
Authors: Ohabuiro John Uwabunkeonye
Abstract:
Source of green energy is becoming a concern in developing countries where most energy source in use emits high level of carbon (IV) oxide which contributes to global warming. More so, even with the generation of energy from fossil fuel, the electricity supply is still very inadequate. Therefore, this paper examines different ways of designing and installing photovoltaic (PV) system in terms of optimal sizing of PV array and battery storage in an area of very low peak sunlight hours (PSH) and inadequate supply of electricity from utility companies. Different sample of Peak sunlight hour for selected areas in Nigeria are considered and the lowest of it all is taken. Some means of ensuring that the available solar energy is harnessed properly and converted into electrical energy are discussed for usage in such areas as mentioned above.Keywords: green energy, fossil fuel, peak sunlight hour, photovoltaic
Procedia PDF Downloads 64213100 Fuelwood Heating, Felling, Energy Renewing in Total Fueling of Fuelwood, Renewable Technologies
Authors: Adeiza Matthew, Oluwamishola Abubakar
Abstract:
In conclusion, Fuelwood is a traditional and renewable source of energy that can have both positive and negative impacts. Adopting sustainable practices for its collection, transportation, and use and investing in renewable technologies can help mitigate the negative effects and provide a clean and reliable source of energy, improve living standards and support economic development. For example, solar energy can be used to generate electricity, heat homes and water, and can even be used for cooking. Wind energy can be used to generate electricity, and geothermal energy can be used for heating and cooling. Biogas can be produced from waste products such as animal manure, sewage, and organic kitchen waste and can be used for cooking and lighting.Keywords: calorific, BTU, wood moisture content, density of wood
Procedia PDF Downloads 10613099 The Impact of Undocumented Migration on Human Security in Northern Nigeria
Authors: Targba Aondowase
Abstract:
Undocumented migration along Nigeria’s boarder with Cameroon, Chad and Niger is a key issue in tackling the human security challenges in the region as the security situation cannot be contained without proper boarder control. The paper adopts migration systems theory which asserts that migration alters the social, cultural, economic, and institutional conditions at both the sending and receiving ends to explain the influence of unregistered migrants on institutional changes as it affects the security situation in Northern Nigeria. It was found that undocumented migration is majorly influenced by poverty, illegal trade, wars and asylum. The study also discovers that Nigerian boarders are porous with over 250 footpaths that link directly to Cameroon, Chad and Niger, making the proliferation of small arms and light weapons a transnational organized crime in the region. These porous borders are unmanned by security operatives with limited government presence in the boarder communities. The study also found that undocumented immigrants are easily integrated into the northern communities due to common religious beliefs and race where they carry out normal and civic functions without obstruction. The paper concluded that the level of undocumented migration in Northern Nigeria is high due to unmanned and porous borders. The paper therefore recommended that the security agencies should be strengthened through adequate funding, innovative technology, sound policies and proficient processes that will help protect the country’s borders. The National Populations Commission and the National Identity Management Commission should be strengthened to have a good data base of the country’s citizens and there should be international cooperation between the neighbouring countries to tackle illegal migration and illegal trade along the borders. The findings and recommendations of this paper will serve as a guide towards curtailing the impact of undocumented migration on human security in Northern Nigeria.Keywords: human security, impact, migration, undocumented
Procedia PDF Downloads 33413098 Determining Inventory Replenishment Policy for Major Component in Assembly-to-Order of Cooling System Manufacturing
Authors: Tippawan Nasawan
Abstract:
The objective of this study is to find the replenishment policy in Assembly-to-Order manufacturing (ATO) which some of the major components have lead-time longer than customer lead-time. The variety of products, independent component demand, and long component lead-time are the difficulty that has resulted in the overstock problem. In addition, the ordering cost is trivial when compared to the cost of material of the major component. A conceptual design of the Decision Supporting System (DSS) has introduced to assist the replenishment policy. Component replenishment by using the variable which calls Available to Promise (ATP) for making the decision is one of the keys. The Poisson distribution is adopted to realize demand patterns in order to calculate Safety Stock (SS) at the specified Customer Service Level (CSL). When distribution cannot identify, nonparametric will be applied instead. The test result after comparing the ending inventory between the new policy and the old policy, the overstock has significantly reduced by 46.9 percent or about 469,891.51 US-Dollars for the cost of the major component (material cost only). Besides, the number of the major component inventory is also reduced by about 41 percent which helps to mitigate the chance of damage and keeping stock.Keywords: Assembly-to-Order, Decision Supporting System, Component replenishment , Poisson distribution
Procedia PDF Downloads 12613097 Energy Consumption Modeling for Strawberry Greenhouse Crop by Adaptive Nero Fuzzy Inference System Technique: A Case Study in Iran
Authors: Azar Khodabakhshi, Elham Bolandnazar
Abstract:
Agriculture as the most important food manufacturing sector is not only the energy consumer, but also is known as energy supplier. Using energy is considered as a helpful parameter for analyzing and evaluating the agricultural sustainability. In this study, the pattern of energy consumption of strawberry greenhouses of Jiroft in Kerman province of Iran was surveyed. The total input energy required in the strawberries production was calculated as 113314.71 MJ /ha. Electricity with 38.34% contribution of the total energy was considered as the most energy consumer in strawberry production. In this study, Neuro Fuzzy networks was used for function modeling in the production of strawberries. Results showed that the best model for predicting the strawberries function had a correlation coefficient, root mean square error (RMSE) and mean absolute percentage error (MAPE) equal to 0.9849, 0.0154 kg/ha and 0.11% respectively. Regards to these results, it can be said that Neuro Fuzzy method can be well predicted and modeled the strawberry crop function.Keywords: crop yield, energy, neuro-fuzzy method, strawberry
Procedia PDF Downloads 38013096 Impact of Social Transfers on Energy Poverty in Turkey
Authors: Julide Yildirim, Nadir Ocal
Abstract:
Even though there are many studies investigating the extent and determinants of poverty, there is paucity of research investigating the issue of energy poverty in Turkey. The aim of this paper is threefold: First to investigate the extend of energy poverty in Turkey by using Household Budget Survey datasets belonging to 2005 - 2016 period. Second, to examine the risk factors for energy poverty. Finally, to assess the impact of social assistance program participation on energy poverty. Existing literature employs alternative methods to measure energy poverty. In this study energy poverty is measured by employing expenditure approach, where people are considered as energy poor if they disburse more than 10 per cent of their income to meet their energy requirements. Empirical results indicate that energy poverty rate is around 20 per cent during the time period under consideration. Since Household Budget Survey panel data is not available for 2005 - 2016 period, a pseudo panel has been constructed. Panel logistic regression method is utilized to determine the risk factors for energy poverty. The empirical results demonstrate that there is a statistically significant impact of work status and education level on energy poverty likelihood. In the final part of the paper the impact of social transfers on energy poverty has been examined by utilizing panel biprobit model, where social transfer participation and energy poverty incidences are jointly modeled. The empirical findings indicate that social transfer program participation reduces energy poverty. The negative association between energy poverty and social transfer program participation is more pronounced in urban areas compared with the rural areas.Keywords: energy poverty, social transfers, panel data models, Turkey
Procedia PDF Downloads 14113095 Energy Saving Stove for Stew Coconut Sugar
Authors: Ruedee Niyomrath
Abstract:
The purposes of this research is aim to build the energy saving stove for stew coconut sugar. The research started from explores ceramic raw materials in local area, create the appropriate mixture of ceramic raw materials for construction material of stove, and make it by ceramic process. It includes design and build the energy saving stove, experiment the efficiency of energy saving stove as to thermal efficiency, energy saving, performance of time, and energy cost efficiency, transfer the knowledge for community, stove manufacturers, and technicians. The findings must be useful to the coconut sugar enterprises producing, to reduce the cost of production, preserve natural resources, and environments.Keywords: ceramic raw material, energy saving stove, stove design, performance of stove, stove for stew coconut sugar
Procedia PDF Downloads 36113094 Security Analysis of SIMSec Protocol
Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci
Abstract:
Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.Keywords: End-to-end encryption, key exchange, SIM card, smart card
Procedia PDF Downloads 28413093 Comparative Policy Analysis on Agropolitan Territorial Development in Rural Area: A Study Case in Bojonegoro Regency, Indonesia
Authors: Fatihin Khoirul, Muhammad Muqorrobin Ist
Abstract:
Bojonegoro Regency is one of the districts that use the concept Agropolitan as the Territorial Development Policy. Three sub-district designated as Area Development District of Agropolitan are Kapas, Dander, and Kalitidu or commonly called KADEKA. Current policy has been shown results, but there was an inequality of results in some areas. One of them occurred in the Ngringinrejo village with the main commodities is Starfruit and Wedi village with the main commodities is Salak fruit. Therefore, a comparative study is used to search for causal factors of inequality result of the policy by using the 5 aspects compared, namely: (1) Management Development Agropolitan; (2) Physical Condition agropolitan Region; (3) Implementing Agency at the Village Level; (4) Village Government Support; and (5) Community support. Based on the discussion of qualitative analysis, it was found that five aspects have their respective roles in creating inequality of outcomes that occur in both villages. But beyond that, there are conditions where the two villages experienced the same condition that is when the initial implementation of the policy. The condition is referred to as 'the phenomenon of price trap.' The condition is caused by lower commodity prices, causing the village government's commitment in implementing policies too low, followed by public awareness in support of the policy is also low, so care for commodities is also low, and the quality is too low lead and eventually back causing low price. However, the difference is that the village Ngringinrejo able to get out of this condition with 'the new culture of administration' at the end of 2013. While the conditions in the village of Wedi compounded by not respected request assistance by the irrigation district.Keywords: comparative policy analysis, qualitative comparative, inequallity, price trap, new culture of administration
Procedia PDF Downloads 28613092 e-Learning Security: A Distributed Incident Response Generator
Authors: Bel G Raggad
Abstract:
An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection
Procedia PDF Downloads 43713091 A Review of Sustainable Energy-Saving Solutions in Active and Passive Solar Systems of Zero Energy Buildings Based on the Internet of Things
Authors: Hanieh Sadat Jannesari, Hoori Jannesar, Alireza Hajian HosseinAbadi
Abstract:
In general, buildings are responsible for a considerable share of consumed energy and carbon emissions worldwide and play a significant role in formulating sustainable development strategies. Therefore, a lot of effort is put into the design and construction of zero-energy buildings (ZEBs) to help eliminate the problems associated with the reduction of energy resources and environmental degradation. Two strategies are significant in designing ZEBs: minimizing the need for energy utilization in buildings (particularly for cooling and heating) through highly energy-efficient designs and using renewable energies and other technologies to meet the remaining energy needs. This paper reviews the works related to these two strategies concerning sustainable energy-saving solutions using renewable energy technologies and the Internet of Things in ZEBs. Drawing on the theories and recently implemented projects of energy engineers in ZEBs, we have reported the required technologies within the framework of this paper’s objectives. Overall, solutions based on renewable and sustainable technologies such as photovoltaic (PV) modules, thermal collectors, Phase Change Material (PCM) techniques, etc., are used in active and passive systems designed for various applications in such buildings as cooling, heating, lighting, cooking, etc. The results obtained from examining these projects show that it is possible to minimize the amount of energy required to be produced for and consumed by these buildings.Keywords: active and passive renewable energy systems, internet of things, storage, zero energy buildings
Procedia PDF Downloads 2913090 Performance of Environmental Efficiency of Energy Iran and Other Middle East Countries
Authors: Bahram Fathi, Mahdi Khodaparast Mashhadi, Masuod Homayounifar
Abstract:
According to 1404 forecasting documentation, among the most fundamental ways of Iran’s success in competition with other regional countries are innovations, efficiency enhancements and domestic productivity. Therefore, in this study, the energy consumption efficiency of Iran and the neighbor countries has been measured in the period between 2007-2012 considering the simultaneous economic activities, CO2 emission, and consumption of energy through data envelopment analysis of undesirable output. The results of the study indicated that the energy efficiency changes in both Iran and the average neighbor countries has been on a descending trend and Iran’s energy efficiency status is not desirable compared to the other countries in the region.Keywords: energy efficiency, environmental, undesirable output, data envelopment analysis
Procedia PDF Downloads 44813089 Effect of Cloud Computing on Enterprises
Authors: Amir Rashid
Abstract:
Today is the world of innovations where everyone is looking for a change. Organizations are now looking toward virtualization in order to minimize their computing cost. Cloud Computing has also introduced itself by the means of reducing computing cost. It offers different approach to make computing better by improving utilization and reducing infrastructure and administrative costs. Cloud Computing is basically the amalgamation of Utility Computing and SaaS (Software as a Service). Cloud Computing is quite new to organizations as it is still at its deploying stage. Due to this reason, organizations are not confident whether to adopt it or not. This thesis investigates the problem for organization concerning the security and cost issues. Benefits and drawbacks are being highlighted which organizations can have or suffer in order to adopt Cloud Computing. In Conclusion, Cloud Computing is a better option available for small and medium organizations with a comparison to large companies both in terms of data security and cost.Keywords: cloud computing, security, cost, elasticity, PaaS, IaaS, SaaS
Procedia PDF Downloads 34013088 India-Afghanistan Relations Post 9\11
Authors: Saifurahman Fayiz
Abstract:
Geo-strategically and geo-politically location of Afghanistan has endured the consideration of Indian government policy. Afghanistan has a durable and widespread economic, historical, military, and cultural relationship with India. Afghanistan has significant and durable bilateral relations with its neighbor India. India has enjoyed friendly relations with Afghanistan since 1947. After the collapse of the Taliban regime, India and Afghanistan started diplomatic relations. The relationship between the two countries was friendly and stable. The objective of this research is to study the India- Afghanistan relationship from 2001 to 2021 from different aspects. The research conducted a qualitative research method based on descriptive. The research findings propose that India should expand its soft power in Afghanistan, and India’s foreign policy in Afghanistan should be evaluated.Keywords: relation, policy, soft power, sector
Procedia PDF Downloads 16413087 Secure Content Centric Network
Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris
Abstract:
Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer
Procedia PDF Downloads 64413086 A Critical Analysis on Gaps Associated with Culture Policy Milieu Governing Traditional Male Circumcision in the Eastern Cape, South Africa
Authors: Thanduxolo Nomngcoyiya, Simon M. Kang’ethe
Abstract:
The paper aimed to critically analyse gaps pertaining to the cultural policy environments governing traditional male circumcision in the Eastern Cape as exemplified by an empirical case study. The original study which this paper is derived from utilized qualitative paradigm; and encompassed 28 participants. It used in-depth one-on-one interviews complemented by focus group discussions and key informants as a method of data collection. It also adopted interview guide as a data collection instrument. The original study was cross-sectional in nature, and the data was audio recorded and transcribed later during the data analysis and coding process. The study data analysis was content thematic analysis and identified the following key major findings on the culture of male circumcision policy: Lack of clarity on culture of male circumcision policy operations; Myths surrounding procedures on culture of male circumcision; Divergent views on cultural policies between government and male circumcision custodians; Unclear cultural policies on selection criteria of practitioners; and Lack of policy enforcement and implementation on transgressors of culture of male circumcision. It recommended: a stringent selection criteria of practitioners; a need to carry out death-free male circumcision; a need for male circumcision stakeholders to work with other culture and tradition-friendly stakeholders.Keywords: human rights, policy enforcement, traditional male circumcision, traditional surgeons and nurses
Procedia PDF Downloads 29713085 Evaluation of Biogas Potential from Livestock in Malawi
Authors: Regina Kulugomba, Richard Blanchard, Harold Mapoma, Gregory Gamula, Stanley Mlatho
Abstract:
Malawi is a country with low energy access with only 10% of people having access to electricity and 97% of people relying on charcoal and fuel wood. The over dependence on the traditional biomass has brought in a number of negative consequences on people’s health and the environment. To curb the situation, the Government of Malawi (GoM), through its national policy of 2018 and charcoal strategies of 2007, identified biogas as a suitable alternative energy source for cooking. The GoM intends to construct tubular digesters across the country and one of the most crucial factors is the availability of livestock manure. The study was conducted to assess biogas potential from livestock manure by using Quantum Geographic information system (QGIS) software. Potential methane was calculated based on the population of livestock, amount of manure produced per capita and year, total solids, biogas yield and availability coefficient. The results of the study estimated biogas potential at 687 million m3 /year. Districts identified with highest biogas potential were Lilongwe, Ntcheu, Mangochi, Neno, Mwanza, Blantyre, Chiradzulu and Mulanje. The information will help investors and the Government of Malawi to locate potential sites for biogas plants installation.Keywords: biogas, energy, feedstock, livestock
Procedia PDF Downloads 17313084 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption
Procedia PDF Downloads 43513083 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective
Authors: Justyna Żywiołek, Marek Matulewski
Abstract:
Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis
Procedia PDF Downloads 4813082 Energy Efficient Plant Design Approaches: Case Study of the Sample Building of the Energy Efficiency Training Facilities
Authors: Idil Kanter Otcu
Abstract:
Nowadays, due to the growing problems of energy supply and the drastic reduction of natural non-renewable resources, the development of new applications in the energy sector and steps towards greater efficiency in energy consumption are required. Since buildings account for a large share of energy consumption, increasing the structural density of buildings causes an increase in energy consumption. This increase in energy consumption means that energy efficiency approaches to building design and the integration of new systems using emerging technologies become necessary in order to curb this consumption. As new systems for productive usage of generated energy are developed, buildings that require less energy to operate, with rational use of resources, need to be developed. One solution for reducing the energy requirements of buildings is through landscape planning, design and application. Requirements such as heating, cooling and lighting can be met with lower energy consumption through planting design, which can help to achieve more efficient and rational use of resources. Within this context, rather than a planting design which considers only the ecological and aesthetic features of plants, these considerations should also extend to spatial organization whereby the relationship between the site and open spaces in the context of climatic elements and planting designs are taken into account. In this way, the planting design can serve an additional purpose. In this study, a landscape design which takes into consideration location, local climate morphology and solar angle will be illustrated on a sample building project.Keywords: energy efficiency, landscape design, plant design, xeriscape landscape
Procedia PDF Downloads 25913081 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom
Authors: John Hardy
Abstract:
The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing
Procedia PDF Downloads 14213080 Exploring Wheel-Motion Energy Sources for Energy Harvesting Based on Electromagnetic Effect: Experimental and Numerical Investigation
Authors: Mohammed Alaa Alwafaie, Bela Kovacs
Abstract:
With the rapid emergence and evolution of renewable energy sources like wind and solar power, there is an increasing demand for effective energy harvester architectures. This paper focuses on investigating the concept of energy harvesting using a wheel-motion energy source. The proposed method involves the placement of magnets and copper coils inside the hubcap rod of a wheel. When the wheel is set in motion, following Faraday's Law, the movement of the magnet within the coil induces an electric current. The paper includes an experiment to measure the output voltage of electromagnetics, as well as a numerical simulation to further explore the potential of this energy harvesting approach. By harnessing the rotational motion of wheels, this research aims to contribute to the development of innovative techniques for generating electrical power in a sustainable and efficient manner.Keywords: harvesting energy, electromagnetic, hubcap rod wheel, magnet movement inside coil, faraday law
Procedia PDF Downloads 7613079 Comparison of the Performance of a Brake Energy Regeneration System in Hybrid Vehicles
Authors: Miguel Arlenzo Duran Sarmiento, Luis Alfonso Del Portillo Valdés, Carlos Borras Pinilla
Abstract:
Brake energy regeneration systems have the capacity to transform part of the vehicle's kinetic energy during deceleration into useful energy. These systems can be implemented in hybrid vehicles, which can be electric or hydraulic in type, and contribute to reducing the energy required to propel the vehicle thanks to the accumulation of energy. This paper presents the modeling and simulation of a braking energy regeneration system applied in hydraulic hybrid vehicles configured in parallel, the modeling and simulation were performed in Simulink of Matlab, where a performance comparison of the regenerated torque as a function of vehicle load, the displacement of the hydraulic regeneration device and the vehicle speed profile. The speed profiles used in the simulation are standard profiles such as the NEDC and WLTP profiles. The vehicle loads range from 1500 kg to 12000 kg. The results show the comparison of the torque required by the vehicle, the torque regenerated by the system subjected to the different speed and load conditions.Keywords: braking energy, energy regeneration, hybrid vehicles, kinetic energy, torque
Procedia PDF Downloads 12413078 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm
Authors: Vahid Bayrami Rad
Abstract:
Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.Keywords: arduino board, artificial intelligence, image processing, solenoid lock
Procedia PDF Downloads 6913077 Securing Web Servers by the Intrusion Detection System (IDS)
Authors: Yousef Farhaoui
Abstract:
An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).Keywords: intrusion detection, architectures, characteristic, tools, security, web server
Procedia PDF Downloads 418