Search results for: energy security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10898

Search results for: energy security

9788 Production Structures of Energy Based on Water Force, Its Infrastructure Protection, and Possible Causes of Failure

Authors: Gabriela-Andreea Despescu, Mădălina-Elena Mavrodin, Gheorghe Lăzăroiu, Florin Adrian Grădinaru

Abstract:

The purpose of this paper is to contribute to the enhancement of a hydroelectric plant protection by coordinating protection measures and existing security and introducing new measures under a risk management process. Also, the plan identifies key critical elements of a hydroelectric plant, from its level vulnerabilities and threats it is subjected to in order to achieve the necessary protection measures to reduce the level of risk.

Keywords: critical infrastructure, risk analysis, critical infrastructure protection, vulnerability, risk management, turbine, impact analysis

Procedia PDF Downloads 545
9787 Energy Efficiency Approach to Reduce Costs of Ownership of Air Jet Weaving

Authors: Corrado Grassi, Achim Schröter, Yves Gloy, Thomas Gries

Abstract:

Air jet weaving is the most productive, but also the most energy consuming weaving method. Increasing energy costs and environmental impact are constantly a challenge for the manufacturers of weaving machines. Current technological developments concern with low energy costs, low environmental impact, high productivity, and constant product quality. The high degree of energy consumption of the method can be ascribed to the high need of compressed air. An energy efficiency method is applied to the air jet weaving technology. Such method identifies and classifies the main relevant energy consumers and processes from the exergy point of view and it leads to the identification of energy efficiency potentials during the weft insertion process. Starting from the design phase, energy efficiency is considered as the central requirement to be satisfied. The initial phase of the method consists of an analysis of the state of the art of the main weft insertion components in order to point out a prioritization of the high demanding energy components and processes. The identified major components are investigated to reduce the high demand of energy of the weft insertion process. During the interaction of the flow field coming from the relay nozzles within the profiled reed, only a minor part of the stream is really accelerating the weft yarn, hence resulting in large energy inefficiency. Different tools such as FEM analysis, CFD simulation models and experimental analysis are used in order to design a more energy efficient design of the involved components in the filling insertion. A different concept for the metal strip of the profiled reed is developed. The developed metal strip allows a reduction of the machine energy consumption. Based on a parametric and aerodynamic study, the designed reed transmits higher values of the flow power to the filling yarn. The innovative reed fulfills both the requirement of raising energy efficiency and the compliance with the weaving constraints.

Keywords: air jet weaving, aerodynamic simulation, energy efficiency, experimental validation, weft insertion

Procedia PDF Downloads 195
9786 Wind Power Density and Energy Conversion in Al-Adwas Ras-Huwirah Area, Hadhramout, Yemen

Authors: Bawadi M. A., Abbad J. A., Baras E. A.

Abstract:

This study was conducted to assess wind energy resources in the area of Al-Adwas Ras-Huwirah Hadhramout Governorate, Yemen, through using statistical calculations, the Weibull model and SPSS program were used in the monthly and the annual to analyze the wind energy resource; the convergence of wind energy; turbine efficiency in the selected area. Wind speed data was obtained from NASA over a period of ten years (2010-2019) and at heights of 50 m above ground level. Probability distributions derived from wind data and their distribution parameters are determined. The density probability function is fitted to the measured probability distributions on an annual basis. This study also involves locating preliminary sites for wind farms using Geographic Information System (GIS) technology. This further leads to maximizing the output energy from the most suitable wind turbines in the proposed site.

Keywords: wind speed analysis, Yemen wind energy, wind power density, Weibull distribution model

Procedia PDF Downloads 81
9785 Design and Study of a Wind-Solar Hybrid System for Lighting Application

Authors: Nikhil V. Nayak, P. P. Revankar, M. B. Gorawar

Abstract:

Wind energy has been shown to be one of the most viable sources of renewable energy. With current technology, the low cost of wind energy is competitive with more conventional sources of energy such as coal. Most airfoil blades available for commercial grade wind turbines incorporate a straight span-wise profile and airfoil shaped cross sections. This paper is aimed at studying and designing a wind-solar hybrid system for light load application. The tools like qblade and solidworks are used to model and analyze the wind turbine system, the material used for the blade and hub is balsa wood and the tower a lattice type. The expected power output is 100 W for an average wind speed of 4.5 m/s.

Keywords: renewable energy, hybrid, airfoil blades, wind speeds, make-in-india, camber, QBlade, solidworks, balsa wood

Procedia PDF Downloads 308
9784 A Graph Theoretic Algorithm for Bandwidth Improvement in Computer Networks

Authors: Mehmet Karaata

Abstract:

Given two distinct vertices (nodes) source s and target t of a graph G = (V, E), the two node-disjoint paths problem is to identify two node-disjoint paths between s ∈ V and t ∈ V . Two paths are node-disjoint if they have no common intermediate vertices. In this paper, we present an algorithm with O(m)-time complexity for finding two node-disjoint paths between s and t in arbitrary graphs where m is the number of edges. The proposed algorithm has a wide range of applications in ensuring reliability and security of sensor, mobile and fixed communication networks.

Keywords: disjoint paths, distributed systems, fault-tolerance, network routing, security

Procedia PDF Downloads 441
9783 Russian pipeline natural gas export strategy under uncertainty

Authors: Koryukaeva Ksenia, Jinfeng Sun

Abstract:

Europe has been a traditional importer of Russian natural gas for more than 50 years. In 2021, Russian state-owned company Gazprom supplied about a third of all gas consumed in Europe. The Russia-Europe mutual dependence in terms of natural gas supplies has been causing many concerns about the energy security of the two sides for a long period of time. These days the issue has become more urgent than ever considering recent Russian invasion in Ukraine followed by increased large-scale geopolitical conflicts, making the future of Russian natural gas supplies and global gas markets as well highly uncertain. Hence, the main purpose of this study is to get insight into the possible futures of Russian pipeline natural gas exports by a scenario planning method based on Monte-Carlo simulation within LUSS model framework, and propose Russian pipeline natural gas export strategies based on the obtained scenario planning results. The scenario analysis revealed that recent geopolitical disputes disturbed the traditional, longstanding model of Russian pipeline gas exports, and, as a result, the prospects and the pathways for Russian pipeline gas on the world markets will differ significantly from those before 2022. Specifically, our main findings show, that (i) the events of 2022 generated many uncertainties for the long-term future of Russian pipeline gas export perspectives on both western and eastern supply directions, including geopolitical, regulatory, economic, infrastructure and other uncertainties; (ii) according to scenario modelling results, Russian pipeline exports will face many challenges in the future, both on western and eastern directions. A decrease in pipeline gas exports will inevitably affect country’s natural gas production and significantly reduce fossil fuel export revenues, jeopardizing the energy security of the country; (iii) according to proposed strategies, in order to ensure the long-term stable export supplies in the changing environment, Russia may need to adjust its traditional export strategy by performing export flows and product diversification, entering new markets, adapting its contracting mechanism, increasing competitiveness and gaining a reputation of a reliable gas supplier.

Keywords: Russian natural gas, Pipeline natural gas, Uncertainty, Scenario simulation, Export strategy

Procedia PDF Downloads 59
9782 Static Analysis of Security Issues of the Python Packages Ecosystem

Authors: Adam Gorine, Faten Spondon

Abstract:

Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. Unfortunately, one-third of these software packages have vulnerabilities that allow attackers to execute code automatically when a vulnerable or malicious package is installed. This paper contributes to large-scale empirical studies investigating security issues in the python ecosystem by evaluating package vulnerabilities. These provide a series of implications that can help the security of software ecosystems by improving the process of discovering, fixing, and managing package vulnerabilities. The vulnerable dataset is generated using the NVD, the national vulnerability database, and the Snyk vulnerability dataset. In addition, we evaluated 807 vulnerability reports in the NVD and 3900 publicly known security vulnerabilities in Python Package Manager (pip) from the Snyk database from 2002 to 2022. As a result, many Python vulnerabilities appear in high severity, followed by medium severity. The most problematic areas have been improper input validation and denial of service attacks. A hybrid scanning tool that combines the three scanners bandit, snyk and dlint, which provide a clear report of the code vulnerability, is also described.

Keywords: Python vulnerabilities, bandit, Snyk, Dlint, Python package index, ecosystem, static analysis, malicious attacks

Procedia PDF Downloads 136
9781 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service

Authors: Mabrouka Algherinai, Fatma Karkouri

Abstract:

Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.

Keywords: SMS, RSA, McEliece, RABIN

Procedia PDF Downloads 161
9780 Suitable Models and Methods for the Steady-State Analysis of Multi-Energy Networks

Authors: Juan José Mesas, Luis Sainz

Abstract:

The motivation for the development of this paper lies in the need for energy networks to reduce losses, improve performance, optimize their operation and try to benefit from the interconnection capacity with other networks enabled for other energy carriers. These interconnections generate interdependencies between some energy networks and others, which requires suitable models and methods for their analysis. Traditionally, the modeling and study of energy networks have been carried out independently for each energy carrier. Thus, there are well-established models and methods for the steady-state analysis of electrical networks, gas networks, and thermal networks separately. What is intended is to extend and combine them adequately to be able to face in an integrated way the steady-state analysis of networks with multiple energy carriers. Firstly, the added value of multi-energy networks, their operation, and the basic principles that characterize them are explained. In addition, two current aspects of great relevance are exposed: the storage technologies and the coupling elements used to interconnect one energy network with another. Secondly, the characteristic equations of the different energy networks necessary to carry out the steady-state analysis are detailed. The electrical network, the natural gas network, and the thermal network of heat and cold are considered in this paper. After the presentation of the equations, a particular case of the steady-state analysis of a specific multi-energy network is studied. This network is represented graphically, the interconnections between the different energy carriers are described, their technical data are exposed and the equations that have previously been presented theoretically are formulated and developed. Finally, the two iterative numerical resolution methods considered in this paper are presented, as well as the resolution procedure and the results obtained. The pros and cons of the application of both methods are explained. It is verified that the results obtained for the electrical network (voltages in modulus and angle), the natural gas network (pressures), and the thermal network (mass flows and temperatures) are correct since they comply with the distribution, operation, consumption and technical characteristics of the multi-energy network under study.

Keywords: coupling elements, energy carriers, multi-energy networks, steady-state analysis

Procedia PDF Downloads 77
9779 The Current Development and Legislation on the Acquisition and Use of Nuclear Energy in Contemporary International Law

Authors: Uche A. Nnawulezi

Abstract:

Over the past decades, the acquisition and utilization of nuclear energy have remained a standout amongst the most intractable issues which past world leaders have unsuccessfully endeavored to grapple with. This study analyzes the present advancement and enactment on the acquisition and utilization of nuclear energy in contemporary international law. It seeks to address international co-operations in the field of nuclear energy by looking at what nuclear energy is all about and how it came into being. It also seeks to address concerns expressed by a few researchers on the position of nuclear law in the most extensive domain of the law by looking at the authoritative procedure for nuclear law, system of arrangements and traditions. This study also agrees in favour of treaty on non-proliferation of nuclear weapons based on human right and humanitarian principles that are not duly moral, but also legal ones. Specifically, the past development activities on nuclear weapon and the practical system of the nuclear energy institute will be inspected. The study noted among others, former president Obama's remark on nuclear energy and Pakistan nuclear policies and its attendant outcomes. Essentially, we depended on documentary evidence and henceforth scooped a great part of the data from secondary sources. The study emphatically advocates for the adoption of absolute liability principles and setting up of a viability trust fund, all of which will help in sustaining global peace where global best practices in acquisition and use of nuclear energy will be widely accepted in the contemporary international law. Essentially, the fundamental proposals made in this paper if completely adopted, might go far in fortifying the present advancement and enactment on the application and utilization of nuclear energy and accordingly, addressing a portion of the intractable issues under international law.

Keywords: nuclear energy, international law, acquisition, development

Procedia PDF Downloads 176
9778 Cellular Energy Metabolism Decreases with Age in the Trophocytes and Oenocytes of Honeybees (Apis Mellifera)

Authors: Chin-Yuan Hsu, Yu-Lung Chuang

Abstract:

The expression, concentration, and activity of mitochondrial energy-utilized molecules and cellular energy-regulated molecules decreased with age in the trophocytes and oenocytes of honeybees (Apis mellifera), but those of cellular energy-metabolized molecules is unknown. In this study, the expression, concentration, and activity of cellular energy-metabolized molecules were assayed in the trophocytes and fat cells of young and old worker bees by using the techniques of cell and biochemistry. The results showed that (i) the •-hydroxylacyl-coenzyme A dehydrogenase (HOAD) activity/citrate synthase (CS) activity ratio, non-esterified fatty acids concentrations, the expression of eukaryotic initiation factor 4E, and the expression of phosphorylated eIF4E binding protein 1 decreased with age; (ii) fat and glycogen accumulation increased with age; and (iii) the pyruvate dehydrogenase (PDH) activity/citrate synthase (CS) activity ratio was not correlated with age. These finding indicated that •-oxidation (HOAD/CS) and protein synthsis decreased with age. Glycolysis (PDH/CS) was unchanged with age. The most likely reason is that sugars are the vital food of worker bees. Taken together these data reveal that young workers have higher cellular energy metabolism than old workers and that aging results in a decline in the cellular energy metabolism in worker honeybees.

Keywords: aging, energy, honeybee, metabolism

Procedia PDF Downloads 468
9777 Harnessing Earth's Electric Field and Transmission of Electricity

Authors: Vaishakh Medikeri

Abstract:

Energy in this Universe is the most basic characteristic of every particle. Since the birth of life on this planet, there has been a quest undertaken by the living beings to analyze, understand and harness the precious natural facts of the nature. In this quest, one of the greatest undertaken is the process of harnessing the naturally available energy. Scientists around the globe have discovered many ways to harness the freely available energy. But even today we speak of “Power Crisis”. Nikola Tesla once said “Nature has stored up in this universe infinite energy”. Energy is everywhere around us in unlimited quantities; all of it waiting to be harnessed by us. Here in this paper a method has been proposed to harness earth's electric field and transmit the stored electric energy using strong magnetic fields and electric fields. In this paper a new technique has been proposed to harness earth's electric field which is everywhere around the world in infinite quantities. Near the surface of the earth there is an electric field of about 120V/m. This electric field is used to charge a capacitor with high capacitance. Later the energy stored is allowed to pass through a device which converts the DC stored into AC. The AC so produced is then passed through a step down transformer to magnify the incoming current. Later the current passes through the RLC circuit. Later the current can be transmitted wirelessly using the principle of resonant inductive coupling. The proposed apparatus can be placed in most of the required places and any circuit tuned to the frequency of the transmitted current can receive the energy. The new source of renewable energy is of great importance if implemented since the apparatus is not costly and can be situated in most of the required places. And also the receiver which receives the transmitted energy is just an RLC circuit tuned to the resonant frequency of the transmitted energy. By using the proposed apparatus the energy losses can be reduced to a very large extent.

Keywords: capacitor, inductive resonant coupling, RLC circuit, transmission of electricity

Procedia PDF Downloads 371
9776 Performance of Nakagami Fading Channel over Energy Detection Based Spectrum Sensing

Authors: M. Ranjeeth, S. Anuradha

Abstract:

Spectrum sensing is the main feature of cognitive radio technology. Spectrum sensing gives an idea of detecting the presence of the primary users in a licensed spectrum. In this paper we compare the theoretical results of detection probability of different fading environments like Rayleigh, Rician, Nakagami-m fading channels with the simulation results using energy detection based spectrum sensing. The numerical results are plotted as P_f Vs P_d for different SNR values, fading parameters. It is observed that Nakagami fading channel performance is better than other fading channels by using energy detection in spectrum sensing. A MATLAB simulation test bench has been implemented to know the performance of energy detection in different fading channel environment.

Keywords: spectrum sensing, energy detection, fading channels, probability of detection, probability of false alarm

Procedia PDF Downloads 530
9775 Retrofitting Measures for Existing Housing Stock in Kazakhstan

Authors: S. Yessengabulov, A. Uyzbayeva

Abstract:

Residential buildings fund of Kazakhstan was built in the Soviet time about 35-60 years ago without considering energy efficiency measures. Currently, most of these buildings are in a rundown condition and fail to meet the minimum of hygienic, sanitary and comfortable living requirements. The paper aims to examine the reports of recent building energy survey activities in the country and provide a possible solution for retrofitting existing housing stock built before 1989 which could be applicable for building envelope in cold climate. Methodology also includes two-dimensional modeling of possible practical solutions and further recommendations.

Keywords: energy audit, energy efficient buildings in Kazakhstan, retrofit, two-dimensional conduction heat transfer analysis

Procedia PDF Downloads 246
9774 Risk Assessment Results in Biogas Production from Agriculture Biomass

Authors: Sandija Zeverte-Rivza, Irina Pilvere, Baiba Rivza

Abstract:

The use of renewable energy sources incl. biogas has become topical in accordance with the increasing demand for energy, decrease of fossil energy resources and the efforts to reduce greenhouse gas emissions as well as to increase energy independence from the territories where fossil energy resources are available. As the technologies of biogas production from agricultural biomass develop, risk assessment and risk management become necessary for farms producing such a renewable energy. The need for risk assessments has become particularly topical when discussions on changing the biogas policy in the EU take place, which may influence the development of the sector in the future, as well as the operation of existing biogas facilities and their income level. The current article describes results of the risk assessment for farms producing biomass from agriculture biomass in Latvia, the risk assessment system included 24 risks, that affect the whole biogas production process and the obtained results showed the high significance of political and production risks.

Keywords: biogas production, risks, risk assessment, biosystems engineering

Procedia PDF Downloads 414
9773 An Electrode Material for Ultracapacitors: Hydrothermal Synthesis of Neodymium Oxide/Manganese Oxide/Nitrogen Doped Reduced Graphene Oxide Ternary Nanocomposites

Authors: K. Saravanan, K. A.Rameshkumar, P. Maadeswaran

Abstract:

The depletion of fossil resources and the rise in global temperatures are two of the most important concerns we confront today. There are numerous renewable energy sources like solar power, tidal power, wind energy, radiant energy, hydroelectricity, geothermal energy, and biomass available to generate the needed energy demand. Engineers and scientists around the world are facing a massive barrier in the development of storage technologies for the energy developed from renewable energy sources. The development of electrochemical capacitors as a future energy storage technology is at the forefront of current research and development. This is due to the fact that the electrochemical capacitors have a significantly higher energy density, a faster charging-discharging rate, and a longer life span than capacitors, and they also have a higher power density than batteries, making them superior to both. In this research, electrochemical capacitors using the Nd2O3/Mn3O4/ N-rGO electrode material is chosen since the of hexagonal and tetragonal crystal structures of Nd2O3 and Mn3O4 and also has cycling stability of 68% over a long time at 50mVs-1 and a high coulombic efficiency of 99.64% at 5 Ag-1. This approach may also be used to create novel electrode materials with improved electrochemical and cyclic stability for high-performance supercapacitors.

Keywords: Nd2O3/Mn3O4/N-rGO, nanocomposites, hydrothermal method, electrode material, specific capacitance, use of supercapacitors

Procedia PDF Downloads 94
9772 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics

Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova

Abstract:

We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.

Keywords: cybersecurity, epidemiology, cyber epidemiology, malware

Procedia PDF Downloads 105
9771 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services

Authors: Rachna Jain, Sushila Madan, Bindu Garg

Abstract:

Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.

Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service

Procedia PDF Downloads 332
9770 Theoretical and Numerical Investigation of a Tri-Stable Nonlinear Energy Harvesting System in Rotational Motion for Low Frequency Environment

Authors: Mei Xutao, Nakano Kimihiko

Abstract:

In order to enhance the energy harvesting efficiency, this paper presents a novel tri-stable energy harvesting system (TEHS), which is realized by the effect of magnetic force, in rotational motion to scavenge vibration energy. The device is meant to provide the power supply for wireless autonomous systems in low-frequency environment. The nonlinear TEHS is composed of the cantilever beam which is mounted on a rotating hub and partially covered by piezoelectric patch, a tip mass magnet in the end and two fixed magnets. A theoretical investigation using the Lagrangian formulation is derived to describe the motion of the energy harvesting system and the output voltage. Additionally, several numerical simulations were carried out to characterize the system under different external excitations and to validate its performance. The results demonstrated that TEHS owns a wide range of frequency of snap-through and high output voltage compared with the bi-stable energy harvesting system (BEHS). Moreover, some sets of experimental validations will be performed in the future work because the experimental setup is in the configuration now.

Keywords: piezoelectric beam, rotational motion, snap-through, tri-stable energy harvester

Procedia PDF Downloads 296
9769 Design of a Plant to Produce 100,000 MTPY of Green Hydrogen from Brine

Authors: Abdulrazak Jinadu Otaru, Ahmed Almulhim, Hassan Alhassan, Mohammed Sabri

Abstract:

Saudi Arabia is host to a state-owned oil and gas corporation, known as Saudi ARAMCO, that is responsible for the highest emissions of carbon dioxide (CO₂) due to the heavy reliance on fossil fuels as an energy source for various sectors such as transportation, aerospace, manufacturing, and residential use. Unfortunately, the detrimental consequences of CO₂ emissions include escalating temperatures in the Middle East region, posing significant obstacles in terms of food security and water scarcity for the Kingdom of Saudi Arabia. As part of the Saudi Vision 2030 initiative, which aims to reduce the country's reliance on fossil fuels by 50 %, this study focuses on designing a plant that will produce approximately 100,000 metric tons per year (MTPY) of green hydrogen (H₂) using brine as the primary feedstock. The proposed facility incorporates a double electrolytic technology that first separates brine or sodium chloride (NaCl) into sodium hydroxide, hydrogen gas, and chlorine gas. The sodium hydroxide is then used as an electrolyte in the splitting of water molecules through the supply of electrical energy in a second-stage electrolyser to produce green hydrogen. The study encompasses a comprehensive analysis of process descriptions and flow diagrams, as well as materials and energy balances. It also includes equipment design and specification, cost analysis, and considerations for safety and environmental impact. The design capitalizes on the abundant brine supply, a byproduct of the world's largest desalination plant located in Al Jubail, Saudi Arabia. Additionally, the design incorporates the use of available renewable energy sources, such as solar and wind power, to power the proposed plant. This approach not only helps reduce carbon emissions but also aligns with Saudi Arabia's energy transition policy. Furthermore, it supports the United Nations Sustainable Development Goals on Sustainable Cities and Communities (Goal 11) and Climate Action (Goal 13), benefiting not only Saudi Arabia but also other countries in the Middle East.

Keywords: plant design, electrolysis, brine, sodium hydroxide, chlorine gas, green hydrogen

Procedia PDF Downloads 46
9768 The Energy Consumption by the Sector of Transport and His Impact on the Atmospheric Pollution

Authors: Mme Hamani Née Guessas Ghaniya

Abstract:

The transport is the base of the development of the exchanges and the business, being both a recognized determiner of the economic and social development. The development of the transport is in the center of the big challenges of development of countries, but it is also at the heart of big contradictions, since we integrate the environmental issues which are bound to him, in particular through the questions of energy. Indeed, the energy consumption by the sector of transport is one of bigger concerns, because it is increasing and it has a big impact on our environment. The main consequences are, the atmospheric pollution causing an increase of the greenhouse effect which causes a global warming. These global warming risks to engender a partial cast iron of polar caps so raising the level of seas, flooding the low coastal zones, certain islands and the deltas. Thus, the purpose of this communication is to present the impact of the energy consumption by the sector of transport on the air quality, showing its effect on the health and on the global warming.

Keywords: energy consumption, sector of transport, air quality, atmospheric pollution

Procedia PDF Downloads 328
9767 Profiling the Food Security Status of Farming Households in Chanchaga Area of Nigeria’s Guinea Savana

Authors: Olorunsanya E. O., Adedeji S. O., Anyanwu A. A.

Abstract:

Food insecurity is a challenge to many nations Nigeria inclusive. It is increasingly becoming a major problem among farm households due to many factors chief of which is low labour productivity. This study therefore profiles the food security status of a representative randomly selected 90 farming households in Chanchaga area of Nigeria’s Guinea Savana using structured interview schedule Descriptive and inferential statistics were used as analytical tools for the study. The results of the descriptive statistics show that majority (35.56%) of the surveyed household heads fall within the age range of 40 – 49 years and (88.89%) are male while (78.89) are married. More than half of the respondents have formal education. About 43.3% of the household heads have farm experience of 11- 20 years and a modal household size class range of 7 – 12. The results further reveal that majority (68.8%) earned more than N12, 500 (22.73 US Dollar) per month. The result of households’ food expenditure pattern reveals that an average household spends about N3, 644.44 (6.63 US Dollar) on food and food items on a weekly basis. The result of the analysis of food diversity intake in the study area shows that 63.33% of the sampled households fell under the low household food diversity intake, while 33 households, representing 36.67% ranks high in term of household food diversity intake. The result for the food security status shows that the sampled population was food secure (58.89%) while 41.11% falls below the recommended threshold. The result for the logistics regression model shows that age, engagement in off farm employment and household size are significant in determining the food security status of farm household in the study area. The three variables were significant at 10%, 5% and 1% respectively. The study therefore recommends among others, that measures be put in place by stakeholders to make agriculture attractive for youth since age is a significant determinant of food security in the study area. Awareness should also be created by stakeholders on the needs for effective family planning methods to be adopted by farm household in the study area.

Keywords: Niger State, Guinea Savana, food diversity, logit regression model and food security

Procedia PDF Downloads 104
9766 Reducing Energy Consumption in Architectural Spaces by Optimizing Natural Light Transmission

Authors: Parisa Javid

Abstract:

In architecture, daylight contributes to humans' mental and physical well-being and reduces the consumption of fossil fuels. Accordingly, Iran's rich architecture has valuable achievements and experiences that should be recognized and introduced to the Iranian and international architecture communities. There are many ways to reduce energy consumption in buildings, but electricity accounts for a large part of that consumption. Lighting up spaces with natural light is a significant factor in reducing energy consumption and preventing electricity dissipation. Aside from being expensive, electric lighting systems cause excessive heat and physical injury (eyes). This study is based on library records and documents. Modern lighting systems are used to reduce energy consumption in the interior of a building to allow for optimal transmission of natural light. It discusses how to use natural light in architecture and the benefits of natural light in buildings. Solar energy can be used more efficiently, and electrical power can be saved in residential, administrative, commercial, and educational buildings by using new methods such as light tubes and mirror directors. Modern lighting systems, natural light, and reduced energy consumption are keywords for these systems, which quickly return their investment.

Keywords: modern lighting systems, natural light, reduced energy consumption

Procedia PDF Downloads 96
9765 Efficient Use of Energy through Incorporation of a Gas Turbine in Methanol Plant

Authors: M. Azadi, N. Tahouni, M. H. Panjeshahi

Abstract:

A techno-economic evaluation for efficient use of energy in a large scale industrial plant of methanol is carried out. This assessment is based on integration of a gas turbine with an existing plant of methanol in which the outlet gas products of exothermic reactor is expanded to power generation. Also, it is decided that methanol production rate is constant through addition of power generation system to the existing methanol plant. Having incorporated a gas turbine with the existing plant, the economic results showed total investment of MUSD 16.9, energy saving of 3.6 MUSD/yr with payback period of approximately 4.7 years.

Keywords: energy saving, methanol, gas turbine, power generation

Procedia PDF Downloads 467
9764 Feasibility Study of Iraq' Decomposition and Its Effects on the Region

Authors: Ebrahim Rahmani, Siyamak Moazeni

Abstract:

According to the Iraq's first constitutional law (approved 2005), Iraq is an independent with sovereignty and its governmental structure is parliamentary democratic republic and federal. Even in reforms in 2009, this article of law did not changed at all. But considering the existence of this emphasis and clarity which is mentioned in the law, different and sometimes contradictory interpretations and positions are expressed about federalism in the way that we can say, considering the importance of the matter, federalism is a focus point to create and expansion of the cold war among leaders of different groups of the country. Iraq's today political and security position has granted the suitable opportunity to Iraq's Kurdistan in appearing of the recent security crisis to increase its share from the central political power or to achieve to its independent dream. The federalism the weakest point of Iraq's territorial integrity in a way that if different groups do not come to a consensus about it and do not think about a mechanism which is accepted by all of them, this can effect on and Iraq's political stability and security. Iraq's Kurdistan follows the option of disintegration and separation under the shadow of political and security changes, even with existence of some Iraqi groups' hopes regarding the improvement of situation after parliament election and also considering Masoud Barezani's power will for separation from Iraq as well as regarding special international changes and disintegration of Karime from Ukraine and ISIS crises; concerns have been created among regional and international powers and interior players. In this article, a paradox due constitutional law about federalism, Iraq's central government view and its politicians to the matter and the regional effect of this action on region's geopolitics are reviewed as well.

Keywords: constitutional law, federalism, decomposition, Iraq's Kurdistan

Procedia PDF Downloads 327
9763 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures

Authors: Mastoor Qubra

Abstract:

Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.

Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation

Procedia PDF Downloads 268
9762 Multisource (RF and Solar) Energy Harvesting for Internet of Things (IoT)

Authors: Emmanuel Ekwueme, Anwar Ali

Abstract:

As the Internet of Things (IoT) continues to expand, the demand for battery-free devices is increasing, which is crucial for the efficiency of 5G networks and eco-friendly industrial systems. The solution is a device that operates indefinitely, requires no maintenance, and has no negative impact on the ambient environment. One promising approach to achieve this is energy harvesting, which involves capturing energy from the ambient environment and transferring it to power devices. This method can revolutionize industries. Such as manufacturing, agriculture, and healthcare by enabling real-time data collection and analysis, reducing maintenance costs, improving efficiency, and contributing to a future with lower carbon emissions. This research explores various energy harvesting techniques, focusing on radio frequencies (RF) and multiple energy sources. It examines RF-based and solar methods for powering battery-free sensors, low-power circuits, and IoT devices. The study investigates a hybrid RF-solar harvesting circuit designed for remote sensing devices. The proposed system includes distinct RF and solar energy harvester circuits, with the RF harvester operating at 2.45GHz and the solar harvester utilizing a maximum power point tracking (MPPT) algorithm to maximize efficiency.

Keywords: radio frequency, energy harvesting, Internet of Things (IoT), multisource, solar energy

Procedia PDF Downloads 3
9761 Energy Calculation for Excited Lithium Atom in Position Space

Authors: Khalil H. Al-Bayati, Khalid Omar Al-Baiti

Abstract:

The energy expectation value for Li-like ions systems (Li, Be+ and Be2+) hasbeen calculated and examined within the ground state (1s2sα)^2 S and the excited state (1s3sα)^2 S in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wavefnctions.

Keywords: energy expectation value, atomic systems, ground and excited states, Hartree-Fock approximation

Procedia PDF Downloads 615
9760 Intrusion Detection System Based on Peer to Peer

Authors: Alireza Pour Ebrahimi, Vahid Abasi

Abstract:

Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.

Keywords: network, intrusion detection system, peer to peer, internal and external network

Procedia PDF Downloads 545
9759 Detecting Black Hole Attacks in Body Sensor Networks

Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai

Abstract:

This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.

Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++

Procedia PDF Downloads 643