Search results for: electrical power system security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24523

Search results for: electrical power system security

22873 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy

Authors: Babatunde Osabiya

Abstract:

Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.

Keywords: security risk, legal framework, cyber security and policy, national security

Procedia PDF Downloads 93
22872 Biometric Recognition Techniques: A Survey

Authors: Shabir Ahmad Sofi, Shubham Aggarwal, Sanyam Singhal, Roohie Naaz

Abstract:

Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. These features are used to provide an authentication for computer based security systems. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on 'who she/he is' rather than 'what she/he has' (card, token, key) or 'what she/he knows' (password, PIN). In this paper, a brief overview of biometric methods, both unimodal and multimodal and their advantages and disadvantages, will be presented.

Keywords: biometric, DNA, fingerprint, ear, face, retina scan, gait, iris, voice recognition, unimodal biometric, multimodal biometric

Procedia PDF Downloads 756
22871 A Mixed Approach to Assess Information System Risk, Operational Risk, and Congolese Microfinance Institutions Performance

Authors: Alfred Kamate Siviri, Angelus Mafikiri Tsongo, Jean Robert Kala Kamdjoug

Abstract:

Digitalization and information systems well organized have been selected as relevant measures to mitigate operational risks within organizations. Unfortunately, information system comes with new threats that can cause severe damage and quick organization lockout. This study aims to measure perceived information system risks and their effects on operational risks within the microfinance institution in D.R. Congo. Also, the factors influencing the operational risk are identified, and the link between operational risk with other risks and performance is to be assessed. The study proposes a research model drawn on the combination of Resources-Based-View, dynamic capabilities, the agency theory, the Information System Security Model, and social theories of risk. Therefore, we suggest adopting a mixed methods research with the sole aim of increasing the literature that already exists on perceived operational risk assessment and its link with other risk and performance, a focus on IT risk.

Keywords: Democratic Republic Congo, information system risk, microfinance performance, operational risk

Procedia PDF Downloads 224
22870 Exploring Wheel-Motion Energy Sources for Energy Harvesting Based on Electromagnetic Effect: Experimental and Numerical Investigation

Authors: Mohammed Alaa Alwafaie, Bela Kovacs

Abstract:

With the rapid emergence and evolution of renewable energy sources like wind and solar power, there is an increasing demand for effective energy harvester architectures. This paper focuses on investigating the concept of energy harvesting using a wheel-motion energy source. The proposed method involves the placement of magnets and copper coils inside the hubcap rod of a wheel. When the wheel is set in motion, following Faraday's Law, the movement of the magnet within the coil induces an electric current. The paper includes an experiment to measure the output voltage of electromagnetics, as well as a numerical simulation to further explore the potential of this energy harvesting approach. By harnessing the rotational motion of wheels, this research aims to contribute to the development of innovative techniques for generating electrical power in a sustainable and efficient manner.

Keywords: harvesting energy, electromagnetic, hubcap rod wheel, magnet movement inside coil, faraday law

Procedia PDF Downloads 77
22869 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).

Keywords: intrusion detection, architectures, characteristic, tools, security

Procedia PDF Downloads 462
22868 A Dual-Mode Infinite Horizon Predictive Control Algorithm for Load Tracking in PUSPATI TRIGA Reactor

Authors: Mohd Sabri Minhat, Nurul Adilla Mohd Subha

Abstract:

The PUSPATI TRIGA Reactor (RTP), Malaysia reached its first criticality on June 28, 1982, with power capacity 1MW thermal. The Feedback Control Algorithm (FCA) which is conventional Proportional-Integral (PI) controller, was used for present power control method to control fission process in RTP. It is important to ensure the core power always stable and follows load tracking within acceptable steady-state error and minimum settling time to reach steady-state power. At this time, the system could be considered not well-posed with power tracking performance. However, there is still potential to improve current performance by developing next generation of a novel design nuclear core power control. In this paper, the dual-mode predictions which are proposed in modelling Optimal Model Predictive Control (OMPC), is presented in a state-space model to control the core power. The model for core power control was based on mathematical models of the reactor core, OMPC, and control rods selection algorithm. The mathematical models of the reactor core were based on neutronic models, thermal hydraulic models, and reactivity models. The dual-mode prediction in OMPC for transient and terminal modes was based on the implementation of a Linear Quadratic Regulator (LQR) in designing the core power control. The combination of dual-mode prediction and Lyapunov which deal with summations in cost function over an infinite horizon is intended to eliminate some of the fundamental weaknesses related to MPC. This paper shows the behaviour of OMPC to deal with tracking, regulation problem, disturbance rejection and caters for parameter uncertainty. The comparison of both tracking and regulating performance is analysed between the conventional controller and OMPC by numerical simulations. In conclusion, the proposed OMPC has shown significant performance in load tracking and regulating core power for nuclear reactor with guarantee stabilising in the closed-loop.

Keywords: core power control, dual-mode prediction, load tracking, optimal model predictive control

Procedia PDF Downloads 162
22867 Evaluation of a Hybrid System for Renewable Energy in a Small Island in Greece

Authors: M. Bertsiou, E. Feloni, E. Baltas

Abstract:

The proper management of the water supply and electricity is the key issue, especially in small islands, where sustainability has been combined with the autonomy and covering of water needs and the fast development in potential sectors of economy. In this research work a hybrid system in Fournoi island (Icaria), a small island of Aegean, has been evaluated in order to produce hydropower and cover water demands, as it can provide solutions to acute problems, such as the water scarcity or the instability of local power grids. The meaning and the utility of hybrid system and the cooperation with a desalination plant has also been considered. This kind of project has not yet been widely applied, so the consideration will give us valuable information about the storage of water and the controlled distribution of the generated clean energy. This process leads to the conclusions about the functioning of the system and the profitability of this project, covering the demand for water and electricity.

Keywords: hybrid system, water, electricity, island

Procedia PDF Downloads 322
22866 Perceived Power and Conflict Management in Spousal Relationships

Authors: Dana Weimann-Saks, Inbal Peleg-Koriat

Abstract:

The perception of relative power within a couple relies on the resources (emotional-social, materialistic) each partner perceives to have. The present study examines a model in which the perceived power of the couple predicts the spouses’ conflict management. In addition, we examined whether this relationship is mediated by the perceived quality of the relationship. It was found that the perception of social-emotional power predicts cooperative conflict management styles of the couple. It was also found that this correlation is mediated by the perceived quality of the relationship. Contrary to the hypothesis, perception of social-emotional power did not predict the use of non-cooperative conflict management styles.

Keywords: spouses’ conflict management, conflict management, perceived quality of the relationship, social-emotional power

Procedia PDF Downloads 331
22865 Technical and Economical Evaluation of Electricity Generation and Seawater Desalination Using Nuclear Energy

Authors: A. Hany A. Khater, G. M. Mostafa, M. R. Badawy

Abstract:

The techno-economic analysis of the nuclear desalination is a very important tool that enables studying of the mutual effects between the nuclear power plant and the coupled desalination plant under different operating conditions, and hence investigating the feasibility of safe and economical production of potable water. For this purpose, a comprehensive model for both technical and economic performance evaluation of the nuclear desalination has been prepared. The developed model has the capability to be used in performing a parametric study for the performance measuring parameters of the nuclear desalination system. Also a sensitivity analysis of varying important factors such as interest/discount rate, power plant availability, fossil fuel prices, purchased electricity price, nuclear fuel cost, and specific base cost for both power and water plant has been conducted.

Keywords: uclear desalination, PWR, MED, MED-TVC, MSF, RO

Procedia PDF Downloads 725
22864 Design and Study of a Low Power High Speed Full Adder Using GDI Multiplexer

Authors: Biswarup Mukherjee, Aniruddha Ghosal

Abstract:

In this paper, we propose a new technique for implementing a low power full adder using a set of GDI multiplexers. Full adder circuits are used comprehensively in Application Specific Integrated Circuits (ASICs). Thus it is desirable to have low power operation for the sub components. The explored method of implementation achieves a low power design for the full adder. Simulated results using state-of-art Tanner tool indicates the superior performance of the proposed technique over conventional CMOS full adder. Detailed comparison of simulated results for the conventional and present method of implementation is presented.

Keywords: low power full adder, 2-T GDI MUX, ASIC (application specific integrated circuit), 12-T FA, CMOS (complementary metal oxide semiconductor)

Procedia PDF Downloads 348
22863 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 299
22862 Comparison of Fundamental Frequency Model and PWM Based Model for UPFC

Authors: S. A. Al-Qallaf, S. A. Al-Mawsawi, A. Haider

Abstract:

Among all FACTS devices, the unified power flow controller (UPFC) is considered to be the most versatile device. This is due to its capability to control all the transmission system parameters (impedance, voltage magnitude, and phase angle). With the growing interest in UPFC, the attention to develop a mathematical model has increased. Several models were introduced for UPFC in literature for different type of studies in power systems. In this paper a novel comparison study between two dynamic models of UPFC with their proposed control strategies.

Keywords: FACTS, UPFC, dynamic modeling, PWM, fundamental frequency

Procedia PDF Downloads 346
22861 The Performance Improvement of Solar Aided Power Generation System by Introducing the Second Solar Field

Authors: Junjie Wu, Hongjuan Hou, Eric Hu, Yongping Yang

Abstract:

Solar aided power generation (SAPG) technology has been proven as an efficient way to make use of solar energy for power generation purpose. In an SAPG plant, a solar field consisting of parabolic solar collectors is normally used to supply the solar heat in order to displace the high pressure/temperature extraction steam. To understand the performance of such a SAPG plant, a new simulation model was developed by the authors recently, in which the boiler was treated, as a series of heat exchangers unlike other previous models. Through the simulations using the new model, it was found the outlet properties of reheated steam, e.g. temperature, would decrease due to the introduction of the solar heat. The changes make the (lower stage) turbines work under off-design condition. As a result, the whole plant’s performance may not be optimal. In this paper, the second solar filed was proposed to increase the inlet temperature of steam to be reheated, in order to bring the outlet temperature of reheated steam back to the designed condition. A 600MW SAPG plant was simulated as a case study using the new model to understand the impact of the second solar field on the plant performance. It was found in the study, the 2nd solar field would improve the plant’s performance in terms of cycle efficiency and solar-to-electricity efficiency by 1.91% and 6.01%. The solar-generated electricity produced by per aperture area under the design condition was 187.96W/m2, which was 26.14% higher than the previous design.

Keywords: solar-aided power generation system, off-design performance, coal-saving performance, boiler modelling, integration schemes

Procedia PDF Downloads 290
22860 Exploring the Techniques of Achieving Structural Electrical Continuity for Gas Plant Facilities

Authors: Abdulmohsen Alghadeer, Fahad Al Mahashir, Loai Al Owa, Najim Alshahrani

Abstract:

Electrical continuity of steel structure members is an essential condition to ensure equipotential and ultimately to protect personnel and assets in industrial facilities. The steel structure is electrically connected to provide a low resistance path to earth through equipotential bonding to prevent sparks and fires in the event of fault currents and avoid malfunction of the plant with detrimental consequences to the local and global environment. The oil and gas industry is commonly establishing steel structure electrical continuity by bare surface connection of coated steel members. This paper presents information pertaining to a real case of exploring and applying different techniques to achieve the electrical continuity in erecting steel structures at a gas plant facility. A project was supplied with fully coated steel members even at the surface connection members that cause electrical discontinuity. This was observed while a considerable number of steel members had already been received at the job site and erected. This made the resolution of the case to use different techniques such as bolt tightening and torqueing, chemical paint stripping and single point jumpers. These techniques are studied with comparative analysis related to their applicability, workability, time and cost advantages and disadvantages.

Keywords: coated Steel, electrical continuity, equipotential bonding, galvanized steel, gas plant facility, lightning protection, steel structure

Procedia PDF Downloads 128
22859 Effective Strategies Migrants Adopted to Improve Food Security in a Regional Area of Australia

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Daniel R. Terry, Rosa Mc Manamey

Abstract:

Food security is a global issue and one of the concerns in Australia, particularly in regional and rural areas. Despite Australia’s current ability to produce enough food to feed more than its current population, evidence has been accumulating over the last decade to demonstrate many Australians struggle to feed themselves, including immigrants from cultural and linguistically diverse (CALD) backgrounds. This study aims to identify the acculturation strategies used by migrants to enhance their approach to food security in Tasmania. The study employed a mixed methods approach that used both questionnaires and semi-structured interviews with migrants living in Tasmania. Descriptive and inferential statistics was used to analyse data collected from questionnaire, whereas, thematic analysis was employed to analyse the interview data. Migrants (n=301) completed the questionnaire with a response rate of 50.2% and 33 follow-up interviews were conducted. We found that majority of the migrants (70.0%) replaced food ingredients and went without the food they could not buy from shops with similar ingredients. Support and advice from friends were effective ways to improve their food access. Additionally, length of stays in Tasmania and region of origin were significantly associated with the ways migrants dealing with food security. The interview results revealed that migrants managed to adapt to the new food culture by using different acculturation strategies, including access food ingredients from other country; adjusting or adapting; home gardening and access to technology. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. To summarize, migrants employed different strategies for food security while acculturating into the new environment. Our findings could become the guidelines for migrants and relevant government or private sectors that address food security.

Keywords: food security, migrants, strategies, inferential statistics

Procedia PDF Downloads 526
22858 Impact of Egypt’s Energy Demand on Oil and Gas Power Systems Environment

Authors: Moustafa Osman Mohamed

Abstract:

This paper will explore the influence of energy sector in Arab Republic of Egypt which has shared its responsibilities of many environmental challenges as the second largest economy in the Middle East (after Iran). Air and water pollution, desertification, inadequate disposal of solid waste and damage to coral reefs are serious problems that influence environmental management in Egypt. The intensive reliance of high population density and strong industrial growth are wearing Egypt's resources, and the rapidly-growing population has forced Egypt to breakdown agricultural land to residential and relevant use of commercial ingestion. The depletion effects of natural resources impose the government to apply innovation techniques in emission control and focus on sustainability. The cogeneration will be presented to control thermal losses and increase efficiency of energy power system.

Keywords: cogeneration, environmental management, power electricity, energy indicators

Procedia PDF Downloads 274
22857 Spatial Correlation of Channel State Information in Real Long Range Measurement

Authors: Ahmed Abdelghany, Bernard Uguen, Christophe Moy, Dominique Lemur

Abstract:

The Internet of Things (IoT) is developed to ensure monitoring and connectivity within different applications. Thus, it is critical to study the channel propagation characteristics in Low Power Wide Area Network (LPWAN), especially Long Range Wide Area Network (LoRaWAN). In this paper, an in-depth investigation of the reciprocity between the uplink and downlink Channel State Information (CSI) is done by performing an outdoor measurement campaign in the area of Campus Beaulieu in Rennes. At each different location, the CSI reciprocity is quantified using the Pearson Correlation Coefficient (PCC) which shows a very high linear correlation between the uplink and downlink CSI. This reciprocity feature could be utilized for the physical layer security between the node and the gateway. On the other hand, most of the CSI shapes from different locations are highly uncorrelated from each other. Hence, it can be anticipated that this could achieve significant localization gain by utilizing the frequency hopping in the LoRa systems by getting access to a wider band.

Keywords: IoT, LPWAN, LoRa, effective signal power, onsite measurement

Procedia PDF Downloads 162
22856 Utilization of an Object Oriented Tool to Perform Model-Based Safety Analysis According to Extended Failure System Models

Authors: Royia Soliman, Salma ElAnsary, Akram Amin Abdellatif, Florian Holzapfel

Abstract:

Model-Based Safety Analysis (MBSA) is an approach in which the system and safety engineers share a common system model created using a model-based development process. The model can also be extended by the failure modes of the system components. There are two famous approaches for the addition of fault behaviors to system models. The first one is to enclose the failure into the system design directly. The second approach is to develop a fault model separately from the system model, thus combining both independent models for safety analysis. This paper introduces a hybrid approach of MBSA. The approach tries to use informal abstracted models to investigate failure behaviors. The approach will combine various concepts such as directed graph traversal, event lists and Constraint Satisfaction Problems (CSP). The approach is implemented using an Object Oriented programming language. The components are abstracted to its failure logic and relationships of connected components. The implemented approach is tested on various flight control systems, including electrical and multi-domain examples. The various tests are analyzed, and a comparison to different approaches is represented.

Keywords: flight control systems, model based safety analysis, safety assessment analysis, system modelling

Procedia PDF Downloads 164
22855 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique

Authors: Veysel Çelik, Aynur Aker, Ebru Güç

Abstract:

Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.

Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy

Procedia PDF Downloads 126
22854 The Diverse and Flexible Coping Strategies Simulation for Maanshan Nuclear Power Plant

Authors: Chin-Hsien Yeh, Shao-Wen Chen, Wen-Shu Huang, Chun-Fu Huang, Jong-Rong Wang, Jung-Hua Yang, Yuh-Ming Ferng, Chunkuan Shih

Abstract:

In this research, a Fukushima-like conditions is simulated with TRACE and RELAP5. Fukushima Daiichi Nuclear Power Plant (NPP) occurred the disaster which caused by the earthquake and tsunami. This disaster caused extended loss of all AC power (ELAP). Hence, loss of ultimate heat sink (LUHS) happened finally. In order to handle Fukushima-like conditions, Taiwan Atomic Energy Council (AEC) commanded that Taiwan Power Company should propose strategies to ensure the nuclear power plant safety. One of the diverse and flexible coping strategies (FLEX) is a different water injection strategy. It can execute core injection at 20 Kg/cm2 without depressurization. In this study, TRACE and RELAP5 were used to simulate Maanshan nuclear power plant, which is a three loops PWR in Taiwan, under Fukushima-like conditions and make sure the success criteria of FLEX. Reducing core cooling ability is due to failure of emergency core cooling system (ECCS) in extended loss of all AC power situation. The core water level continues to decline because of the seal leakage, and then FLEX is used to save the core water level and make fuel rods covered by water. The result shows that this mitigation strategy can cool the reactor pressure vessel (RPV) as soon as possible under Fukushima-like conditions, and keep the core water level higher than Top of Active Fuel (TAF). The FLEX can ensure the peak cladding temperature (PCT) below than the criteria 1088.7 K. Finally, the FLEX can provide protection for nuclear power plant and make plant safety.

Keywords: TRACE, RELAP5/MOD3.3, ELAP, FLEX

Procedia PDF Downloads 251
22853 Sensitivity Analysis for 14 Bus Systems in a Distribution Network with Distributed Generators

Authors: Lakshya Bhat, Anubhav Shrivastava, Shiva Rudraswamy

Abstract:

There has been a formidable interest in the area of Distributed Generation in recent times. A wide number of loads are addressed by Distributed Generators and have better efficiency too. The major disadvantage in Distributed Generation is voltage control- is highlighted in this paper. The paper addresses voltage control at buses in IEEE 14 Bus system by regulating reactive power. An analysis is carried out by selecting the most optimum location in placing the Distributed Generators through load flow analysis and seeing where the voltage profile rises. MATLAB programming is used for simulation of voltage profile in the respective buses after introduction of DG’s. A tolerance limit of +/-5% of the base value has to be maintained. To maintain the tolerance limit, 3 methods are used. Sensitivity analysis of 3 methods for voltage control is carried out to determine the priority among the methods.

Keywords: distributed generators, distributed system, reactive power, voltage control, sensitivity analysis

Procedia PDF Downloads 703
22852 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset

Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor

Abstract:

The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.

Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques

Procedia PDF Downloads 11
22851 Toward a Risk Assessment Model Based on Multi-Agent System for Cloud Consumer

Authors: Saadia Drissi

Abstract:

The cloud computing is an innovative paradigm that introduces several changes in technology that have resulted a new ways for cloud providers to deliver their services to cloud consumers mainly in term of security risk assessment, thus, adapting a current risk assessment tools to cloud computing is a very difficult task due to its several characteristics that challenge the effectiveness of risk assessment approaches. As consequence, there is a need of risk assessment model adapted to cloud computing. This paper requires a new risk assessment model based on multi-agent system and AHP model as fundamental steps towards the development of flexible risk assessment approach regarding cloud consumers.

Keywords: cloud computing, risk assessment model, multi-agent system, AHP model, cloud consumer

Procedia PDF Downloads 545
22850 Analyzing the Performance of Different Cost-Based Methods for the Corrective Maintenance of a System in Thermal Power Plants

Authors: Demet Ozgur-Unluakin, Busenur Turkali, S. Caglar Aksezer

Abstract:

Since the age of industrialization, maintenance has always been a very crucial element for all kinds of factories and plants. With today’s increasingly developing technology, the system structure of such facilities has become more complicated, and even a small operational disruption may return huge losses in profits for the companies. In order to reduce these costs, effective maintenance planning is crucial, but at the same time, it is a difficult task because of the complexity of systems. The most important aspect of correct maintenance planning is to understand the structure of the system, not to ignore the dependencies among the components and as a result, to model the system correctly. In this way, it will be better to understand which component improves the system more when it is maintained. Undoubtedly, proactive maintenance at a scheduled time reduces costs because the scheduled maintenance prohibits high losses in profits. But the necessity of corrective maintenance, which directly affects the situation of the system and provides direct intervention when the system fails, should not be ignored. When a fault occurs in the system, if the problem is not solved immediately and proactive maintenance time is awaited, this may result in increased costs. This study proposes various maintenance methods with different efficiency measures under corrective maintenance strategy on a subsystem of a thermal power plant. To model the dependencies between the components, dynamic Bayesian Network approach is employed. The proposed maintenance methods aim to minimize the total maintenance cost in a planning horizon, as well as to find the most appropriate component to be attacked on, which improves the system reliability utmost. Performances of the methods are compared under corrective maintenance strategy. Furthermore, sensitivity analysis is also applied under different cost values. Results show that all fault effect methods perform better than the replacement effect methods and this conclusion is also valid under different downtime cost values.

Keywords: dynamic Bayesian networks, maintenance, multi-component systems, reliability

Procedia PDF Downloads 128
22849 Application of Electrochemically Prepared PPy/MWCNT:MnO2 Nano-Composite Film in Microbial Fuel Cells for Sustainable Power Generation

Authors: Rajeev jain, D. C. Tiwari, Praveena Mishra

Abstract:

Nano-composite of polypyrrole/multiwalled carbon nanotubes:mangenese oxide (PPy/MWCNT:MnO2) was electrochemically deposited on the surface of carbon cloth (CC). The nano-composite was structurally characterized by FTIR, SEM, TEM and UV-Vis studies. Nano-composite was also characterized by cyclic voltammetry (CV), current voltage measurements (I-V) and the optical band gaps of film were evaluated from UV-Vis absorption studies. The PPy/MWCNT:MnO2 nano-composite was used as anode in microbial fuel cell (MFC) for sewage waste water treatment, power and coulombic efficiency measurement. The prepared electrode showed good electrical conductivity (0.1185 S m-1). This was also supported by band gap measurements (direct 0.8 eV, indirect 1.3 eV). The obtained maximum power density was 1125.4 mW m-2, highest chemical oxygen demand (COD) removal efficiency was 93% and the maximum coulombic efficiency was 59%. For the first time PPy/MWCNT:MnO2 nano-composite for MFC prepared from nano-composite electrode having the potential for the use in MFC with good stability and better adhesion of microbes is being reported. The SEM images confirm the growth and development of microbe’s colony.

Keywords: carbon cloth, electro-polymerization, functionalization, microbial fuel cells, multi walled carbon nanotubes, polypyrrole

Procedia PDF Downloads 271
22848 Wind Energy Potential of Southern Sindh, Pakistan for Power Generation

Authors: M. Akhlaque Ahmed, Maliha Afshan Siddiqui

Abstract:

A study has been carried out to see the prospect of wind power potential of southern Sindh namely Karachi, Hawksbay, Norriabad, Hyderabad, Ketibander and Shahbander using local wind speed data. The monthly average wind speed for these area ranges from 4.5m/sec to 8.5m/sec at 30m height from ground. Extractable wind power, wind energy and Weibul parameter for above mentioned areas have been examined. Furthermore, the power output using fast and slow wind machine using different blade diameter along with the 4Kw and 20 Kw aero-generator were examined to see the possible use for deep well pumping and electricity supply to remote villages. The analysis reveals that in this wind corridor of southern Sindh Hawksbay, Ketibander and Shahbander belongs to wind power class-3 Hyderabad and Nooriabad belongs to wind power class-5 and Karachi belongs to wind power class-2. The result shows that the that higher wind speed values occur between June till August. It was found that considering maximum wind speed location, Hawksbay,Noriabad are the best location for setting up wind machines for power generation.

Keywords: wind energy generation, Southern Sindh, seasonal change, Weibull parameter, wind machines

Procedia PDF Downloads 149
22847 Strategies to Achieve Deep Decarbonisation in Power Generation: A Review

Authors: Abdullah Alotaiq

Abstract:

The transition to low-carbon power generation is essential for mitigating climate change and achieving sustainability. This process, however, entails considerable costs, and understanding the factors influencing these costs is critical. This is necessary to cater to the increasing demand for low-carbon electricity across the heating, industry, and transportation sectors. A crucial aspect of this transition is identifying cost-effective and feasible paths for decarbonization, which is integral to global climate mitigation efforts. It is concluded that hybrid solutions, combining different low-carbon technologies, are optimal for minimizing costs and enhancing flexibility. These solutions also address the challenges associated with phasing out existing fossil fuel-based power plants and broadening the spectrum of low-carbon power generation options.

Keywords: review, power generation, energy transition, decarbonisation

Procedia PDF Downloads 54
22846 A Study on the Functional Safety Analysis of Stage Control System Based on International Electronical Committee 61508-2

Authors: Youn-Sung Kim, Hye-Mi Kim, Sang-Hoon Seo, Jaden Cha

Abstract:

This International standard IEC 61508 sets out a generic approach for all safety lifecycle activities for systems comprised of electrical/electronic/programmable electronic (E/E/PE) elements that are used to perform safety functions. The control unit in stage control system is safety related facilities to control state and speed for stage system running, and it performs safety-critical function by stage control system. The controller unit is part of safety loops corresponding to the IEC 61508 and classified as logic part in the safety loop. In this paper, we analyze using FMEDA (Failure Mode Effect and Diagnostic Analysis) to verification for fault tolerance methods and functional safety of control unit. Moreover, we determined SIL (Safety Integrity Level) for control unit according to the safety requirements defined in IEC 61508-2 based on an analyzed functional safety.

Keywords: safety function, failure mode effect, IEC 61508-2, diagnostic analysis, stage control system

Procedia PDF Downloads 278
22845 Enhancing Transit Trade, Facilitation System and Supply Chain Security for Local, Regional and an International Corridor

Authors: Moh’d A. AL-Shboul

Abstract:

Recently, and due to Arab spring and terrorism around the globe, pushing and driving most governments potentially to harmonize their border measures particularly the regional and an international transit trade within and among Customs Unions. The main purpose of this study is to investigate and provide an insight for monitoring and controlling the trade supply chain within and among different countries by using technological advancement (i.e. an electronic tracking system, etc.); furthermore, facilitate the local and intra-regional trade among countries through reviewing the recent trends and practical implementation of an electronic transit traffic and cargo that related to customs measures by introducing and supporting some case studies of several international and landlocked transit trade countries. The research methodology employed in this study was described as qualitative by conducting few interviews with managers, transit truck drivers, and traders and reviewing the related literature to collect qualitative data from secondary sources such as statistical reports, previous studies, etc. The results in this study show that Jordan and other countries around the globe that used an electronic tracking system for monitoring transit trade has led to a significant reduction in cost, effort and time in physical movement of goods internally and crossing through other countries. Therefore, there is no need to escort transit trucks by customs staff; hence, the rate of escort transit trucks is reduced by more than ninety percent, except the bulky and high duty goods. Electronic transit traffic has been increased; the average transit time journey has been reduced by more than seventy percent and has led to decrease in rates of smuggling up to fifty percent. The researcher recommends considering Jordan as regional and international office for tracking electronically and monitoring the transit trade for many considerations.

Keywords: electronic tracking system, facilitation system, regional and international corridor, supply chain security, transit trade

Procedia PDF Downloads 503
22844 Review, Analysis and Simulation of Advanced Technology Solutions of Selected Components in Power Electronics Systems (PES) of More Electric Aircraft

Authors: Lucjan Setlak, Emil Ruda

Abstract:

The subject of this paper is to review, comparative analysis and simulation of selected components of power electronic systems (PES), consistent with the concept of a more electric aircraft (MEA). Comparative analysis and simulation in software environment MATLAB / Simulink were carried out based on a group of representatives of civil aircraft (B-787, A-380) and military (F-22 Raptor, F-35) in the context of multi-pulse converters used in them (6- and 12-pulse, and 18- and 24-pulse), which are key components of high-tech electronics on-board power systems of autonomous power systems (ASE) of modern aircraft (airplanes of the future).

Keywords: converters, electric machines, MEA (more electric aircraft), PES (power electronics systems)

Procedia PDF Downloads 494