Search results for: energy security policy
12503 Wind Power Density and Energy Conversion in Al-Adwas Ras-Huwirah Area, Hadhramout, Yemen
Authors: Bawadi M. A., Abbad J. A., Baras E. A.
Abstract:
This study was conducted to assess wind energy resources in the area of Al-Adwas Ras-Huwirah Hadhramout Governorate, Yemen, through using statistical calculations, the Weibull model and SPSS program were used in the monthly and the annual to analyze the wind energy resource; the convergence of wind energy; turbine efficiency in the selected area. Wind speed data was obtained from NASA over a period of ten years (2010-2019) and at heights of 50 m above ground level. Probability distributions derived from wind data and their distribution parameters are determined. The density probability function is fitted to the measured probability distributions on an annual basis. This study also involves locating preliminary sites for wind farms using Geographic Information System (GIS) technology. This further leads to maximizing the output energy from the most suitable wind turbines in the proposed site.Keywords: wind speed analysis, Yemen wind energy, wind power density, Weibull distribution model
Procedia PDF Downloads 8412502 Design and Study of a Wind-Solar Hybrid System for Lighting Application
Authors: Nikhil V. Nayak, P. P. Revankar, M. B. Gorawar
Abstract:
Wind energy has been shown to be one of the most viable sources of renewable energy. With current technology, the low cost of wind energy is competitive with more conventional sources of energy such as coal. Most airfoil blades available for commercial grade wind turbines incorporate a straight span-wise profile and airfoil shaped cross sections. This paper is aimed at studying and designing a wind-solar hybrid system for light load application. The tools like qblade and solidworks are used to model and analyze the wind turbine system, the material used for the blade and hub is balsa wood and the tower a lattice type. The expected power output is 100 W for an average wind speed of 4.5 m/s.Keywords: renewable energy, hybrid, airfoil blades, wind speeds, make-in-india, camber, QBlade, solidworks, balsa wood
Procedia PDF Downloads 31012501 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service
Authors: Mabrouka Algherinai, Fatma Karkouri
Abstract:
Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.Keywords: SMS, RSA, McEliece, RABIN
Procedia PDF Downloads 16312500 Managerial Overconfidence, Payout Policy, and Corporate Governance: Evidence from UK Companies
Authors: Abdullah AlGhazali, Richard Fairchild, Yilmaz Guney
Abstract:
We examine the effect of managerial overconfidence on UK firms’ payout policy for the period 2000 to 2012. The analysis incorporates, in addition to common firm-specific factors, a wide range of corporate governance factors and managerial characteristics that have been documented to affect the relationship between overconfidence and payout policy. Our results are robust to several estimation considerations. The findings show that the influence of overconfident CEOs on the amount of, and the propensity to pay, dividends is significant within the UK context. Specifically, we detect that there is a reduction in dividend payments in firms managed by overconfident managers compared to their non-overconfident counterparts. Moreover, we affirm that cash flows, firm size and profitability are positively correlated, while leverage, firm growth and investment are negatively correlated with the amount of and propensity to pay dividends. Interestingly, we demonstrate that firms with the potential for undervaluation reduce dividend payments. Some of the corporate governance factors are shown to motivate firms to pay more dividends while these factors seem to have no influence on the propensity to pay dividends. The results also show that in general higher overconfidence leads to more share repurchases but the lower total payout. Overall, managerial overconfidence should be considered as an important factor influencing payout policy in addition to other known factors.Keywords: dividends, repurchases, UK firms, overconfidence, corporate governance, undervaluation
Procedia PDF Downloads 27012499 Suitable Models and Methods for the Steady-State Analysis of Multi-Energy Networks
Authors: Juan José Mesas, Luis Sainz
Abstract:
The motivation for the development of this paper lies in the need for energy networks to reduce losses, improve performance, optimize their operation and try to benefit from the interconnection capacity with other networks enabled for other energy carriers. These interconnections generate interdependencies between some energy networks and others, which requires suitable models and methods for their analysis. Traditionally, the modeling and study of energy networks have been carried out independently for each energy carrier. Thus, there are well-established models and methods for the steady-state analysis of electrical networks, gas networks, and thermal networks separately. What is intended is to extend and combine them adequately to be able to face in an integrated way the steady-state analysis of networks with multiple energy carriers. Firstly, the added value of multi-energy networks, their operation, and the basic principles that characterize them are explained. In addition, two current aspects of great relevance are exposed: the storage technologies and the coupling elements used to interconnect one energy network with another. Secondly, the characteristic equations of the different energy networks necessary to carry out the steady-state analysis are detailed. The electrical network, the natural gas network, and the thermal network of heat and cold are considered in this paper. After the presentation of the equations, a particular case of the steady-state analysis of a specific multi-energy network is studied. This network is represented graphically, the interconnections between the different energy carriers are described, their technical data are exposed and the equations that have previously been presented theoretically are formulated and developed. Finally, the two iterative numerical resolution methods considered in this paper are presented, as well as the resolution procedure and the results obtained. The pros and cons of the application of both methods are explained. It is verified that the results obtained for the electrical network (voltages in modulus and angle), the natural gas network (pressures), and the thermal network (mass flows and temperatures) are correct since they comply with the distribution, operation, consumption and technical characteristics of the multi-energy network under study.Keywords: coupling elements, energy carriers, multi-energy networks, steady-state analysis
Procedia PDF Downloads 7912498 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics
Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova
Abstract:
We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.Keywords: cybersecurity, epidemiology, cyber epidemiology, malware
Procedia PDF Downloads 10812497 The Current Development and Legislation on the Acquisition and Use of Nuclear Energy in Contemporary International Law
Authors: Uche A. Nnawulezi
Abstract:
Over the past decades, the acquisition and utilization of nuclear energy have remained a standout amongst the most intractable issues which past world leaders have unsuccessfully endeavored to grapple with. This study analyzes the present advancement and enactment on the acquisition and utilization of nuclear energy in contemporary international law. It seeks to address international co-operations in the field of nuclear energy by looking at what nuclear energy is all about and how it came into being. It also seeks to address concerns expressed by a few researchers on the position of nuclear law in the most extensive domain of the law by looking at the authoritative procedure for nuclear law, system of arrangements and traditions. This study also agrees in favour of treaty on non-proliferation of nuclear weapons based on human right and humanitarian principles that are not duly moral, but also legal ones. Specifically, the past development activities on nuclear weapon and the practical system of the nuclear energy institute will be inspected. The study noted among others, former president Obama's remark on nuclear energy and Pakistan nuclear policies and its attendant outcomes. Essentially, we depended on documentary evidence and henceforth scooped a great part of the data from secondary sources. The study emphatically advocates for the adoption of absolute liability principles and setting up of a viability trust fund, all of which will help in sustaining global peace where global best practices in acquisition and use of nuclear energy will be widely accepted in the contemporary international law. Essentially, the fundamental proposals made in this paper if completely adopted, might go far in fortifying the present advancement and enactment on the application and utilization of nuclear energy and accordingly, addressing a portion of the intractable issues under international law.Keywords: nuclear energy, international law, acquisition, development
Procedia PDF Downloads 17812496 Cellular Energy Metabolism Decreases with Age in the Trophocytes and Oenocytes of Honeybees (Apis Mellifera)
Authors: Chin-Yuan Hsu, Yu-Lung Chuang
Abstract:
The expression, concentration, and activity of mitochondrial energy-utilized molecules and cellular energy-regulated molecules decreased with age in the trophocytes and oenocytes of honeybees (Apis mellifera), but those of cellular energy-metabolized molecules is unknown. In this study, the expression, concentration, and activity of cellular energy-metabolized molecules were assayed in the trophocytes and fat cells of young and old worker bees by using the techniques of cell and biochemistry. The results showed that (i) the •-hydroxylacyl-coenzyme A dehydrogenase (HOAD) activity/citrate synthase (CS) activity ratio, non-esterified fatty acids concentrations, the expression of eukaryotic initiation factor 4E, and the expression of phosphorylated eIF4E binding protein 1 decreased with age; (ii) fat and glycogen accumulation increased with age; and (iii) the pyruvate dehydrogenase (PDH) activity/citrate synthase (CS) activity ratio was not correlated with age. These finding indicated that •-oxidation (HOAD/CS) and protein synthsis decreased with age. Glycolysis (PDH/CS) was unchanged with age. The most likely reason is that sugars are the vital food of worker bees. Taken together these data reveal that young workers have higher cellular energy metabolism than old workers and that aging results in a decline in the cellular energy metabolism in worker honeybees.Keywords: aging, energy, honeybee, metabolism
Procedia PDF Downloads 47012495 Harnessing Earth's Electric Field and Transmission of Electricity
Authors: Vaishakh Medikeri
Abstract:
Energy in this Universe is the most basic characteristic of every particle. Since the birth of life on this planet, there has been a quest undertaken by the living beings to analyze, understand and harness the precious natural facts of the nature. In this quest, one of the greatest undertaken is the process of harnessing the naturally available energy. Scientists around the globe have discovered many ways to harness the freely available energy. But even today we speak of “Power Crisis”. Nikola Tesla once said “Nature has stored up in this universe infinite energy”. Energy is everywhere around us in unlimited quantities; all of it waiting to be harnessed by us. Here in this paper a method has been proposed to harness earth's electric field and transmit the stored electric energy using strong magnetic fields and electric fields. In this paper a new technique has been proposed to harness earth's electric field which is everywhere around the world in infinite quantities. Near the surface of the earth there is an electric field of about 120V/m. This electric field is used to charge a capacitor with high capacitance. Later the energy stored is allowed to pass through a device which converts the DC stored into AC. The AC so produced is then passed through a step down transformer to magnify the incoming current. Later the current passes through the RLC circuit. Later the current can be transmitted wirelessly using the principle of resonant inductive coupling. The proposed apparatus can be placed in most of the required places and any circuit tuned to the frequency of the transmitted current can receive the energy. The new source of renewable energy is of great importance if implemented since the apparatus is not costly and can be situated in most of the required places. And also the receiver which receives the transmitted energy is just an RLC circuit tuned to the resonant frequency of the transmitted energy. By using the proposed apparatus the energy losses can be reduced to a very large extent.Keywords: capacitor, inductive resonant coupling, RLC circuit, transmission of electricity
Procedia PDF Downloads 37312494 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services
Authors: Rachna Jain, Sushila Madan, Bindu Garg
Abstract:
Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service
Procedia PDF Downloads 33412493 Performance of Nakagami Fading Channel over Energy Detection Based Spectrum Sensing
Authors: M. Ranjeeth, S. Anuradha
Abstract:
Spectrum sensing is the main feature of cognitive radio technology. Spectrum sensing gives an idea of detecting the presence of the primary users in a licensed spectrum. In this paper we compare the theoretical results of detection probability of different fading environments like Rayleigh, Rician, Nakagami-m fading channels with the simulation results using energy detection based spectrum sensing. The numerical results are plotted as P_f Vs P_d for different SNR values, fading parameters. It is observed that Nakagami fading channel performance is better than other fading channels by using energy detection in spectrum sensing. A MATLAB simulation test bench has been implemented to know the performance of energy detection in different fading channel environment.Keywords: spectrum sensing, energy detection, fading channels, probability of detection, probability of false alarm
Procedia PDF Downloads 53212492 Retrofitting Measures for Existing Housing Stock in Kazakhstan
Authors: S. Yessengabulov, A. Uyzbayeva
Abstract:
Residential buildings fund of Kazakhstan was built in the Soviet time about 35-60 years ago without considering energy efficiency measures. Currently, most of these buildings are in a rundown condition and fail to meet the minimum of hygienic, sanitary and comfortable living requirements. The paper aims to examine the reports of recent building energy survey activities in the country and provide a possible solution for retrofitting existing housing stock built before 1989 which could be applicable for building envelope in cold climate. Methodology also includes two-dimensional modeling of possible practical solutions and further recommendations.Keywords: energy audit, energy efficient buildings in Kazakhstan, retrofit, two-dimensional conduction heat transfer analysis
Procedia PDF Downloads 24712491 An Electrode Material for Ultracapacitors: Hydrothermal Synthesis of Neodymium Oxide/Manganese Oxide/Nitrogen Doped Reduced Graphene Oxide Ternary Nanocomposites
Authors: K. Saravanan, K. A.Rameshkumar, P. Maadeswaran
Abstract:
The depletion of fossil resources and the rise in global temperatures are two of the most important concerns we confront today. There are numerous renewable energy sources like solar power, tidal power, wind energy, radiant energy, hydroelectricity, geothermal energy, and biomass available to generate the needed energy demand. Engineers and scientists around the world are facing a massive barrier in the development of storage technologies for the energy developed from renewable energy sources. The development of electrochemical capacitors as a future energy storage technology is at the forefront of current research and development. This is due to the fact that the electrochemical capacitors have a significantly higher energy density, a faster charging-discharging rate, and a longer life span than capacitors, and they also have a higher power density than batteries, making them superior to both. In this research, electrochemical capacitors using the Nd2O3/Mn3O4/ N-rGO electrode material is chosen since the of hexagonal and tetragonal crystal structures of Nd2O3 and Mn3O4 and also has cycling stability of 68% over a long time at 50mVs-1 and a high coulombic efficiency of 99.64% at 5 Ag-1. This approach may also be used to create novel electrode materials with improved electrochemical and cyclic stability for high-performance supercapacitors.Keywords: Nd2O3/Mn3O4/N-rGO, nanocomposites, hydrothermal method, electrode material, specific capacitance, use of supercapacitors
Procedia PDF Downloads 9612490 Theoretical and Numerical Investigation of a Tri-Stable Nonlinear Energy Harvesting System in Rotational Motion for Low Frequency Environment
Authors: Mei Xutao, Nakano Kimihiko
Abstract:
In order to enhance the energy harvesting efficiency, this paper presents a novel tri-stable energy harvesting system (TEHS), which is realized by the effect of magnetic force, in rotational motion to scavenge vibration energy. The device is meant to provide the power supply for wireless autonomous systems in low-frequency environment. The nonlinear TEHS is composed of the cantilever beam which is mounted on a rotating hub and partially covered by piezoelectric patch, a tip mass magnet in the end and two fixed magnets. A theoretical investigation using the Lagrangian formulation is derived to describe the motion of the energy harvesting system and the output voltage. Additionally, several numerical simulations were carried out to characterize the system under different external excitations and to validate its performance. The results demonstrated that TEHS owns a wide range of frequency of snap-through and high output voltage compared with the bi-stable energy harvesting system (BEHS). Moreover, some sets of experimental validations will be performed in the future work because the experimental setup is in the configuration now.Keywords: piezoelectric beam, rotational motion, snap-through, tri-stable energy harvester
Procedia PDF Downloads 29712489 Research and Implementation of Cross-domain Data Sharing System in Net-centric Environment
Authors: Xiaoqing Wang, Jianjian Zong, Li Li, Yanxing Zheng, Jinrong Tong, Mao Zhan
Abstract:
With the rapid development of network and communication technology, a great deal of data has been generated in different domains of a network. These data show a trend of increasing scale and more complex structure. Therefore, an effective and flexible cross-domain data-sharing system is needed. The Cross-domain Data Sharing System(CDSS) in a net-centric environment is composed of three sub-systems. The data distribution sub-system provides data exchange service through publish-subscribe technology that supports asynchronism and multi-to-multi communication, which adapts to the needs of the dynamic and large-scale distributed computing environment. The access control sub-system adopts Attribute-Based Access Control(ABAC) technology to uniformly model various data attributes such as subject, object, permission and environment, which effectively monitors the activities of users accessing resources and ensures that legitimate users get effective access control rights within a legal time. The cross-domain access security negotiation subsystem automatically determines the access rights between different security domains in the process of interactive disclosure of digital certificates and access control policies through trust policy management and negotiation algorithms, which provides an effective means for cross-domain trust relationship establishment and access control in a distributed environment. The CDSS’s asynchronous,multi-to-multi and loosely-coupled communication features can adapt well to data exchange and sharing in dynamic, distributed and large-scale network environments. Next, we will give CDSS new features to support the mobile computing environment.Keywords: data sharing, cross-domain, data exchange, publish-subscribe
Procedia PDF Downloads 12412488 Profiling the Food Security Status of Farming Households in Chanchaga Area of Nigeria’s Guinea Savana
Authors: Olorunsanya E. O., Adedeji S. O., Anyanwu A. A.
Abstract:
Food insecurity is a challenge to many nations Nigeria inclusive. It is increasingly becoming a major problem among farm households due to many factors chief of which is low labour productivity. This study therefore profiles the food security status of a representative randomly selected 90 farming households in Chanchaga area of Nigeria’s Guinea Savana using structured interview schedule Descriptive and inferential statistics were used as analytical tools for the study. The results of the descriptive statistics show that majority (35.56%) of the surveyed household heads fall within the age range of 40 – 49 years and (88.89%) are male while (78.89) are married. More than half of the respondents have formal education. About 43.3% of the household heads have farm experience of 11- 20 years and a modal household size class range of 7 – 12. The results further reveal that majority (68.8%) earned more than N12, 500 (22.73 US Dollar) per month. The result of households’ food expenditure pattern reveals that an average household spends about N3, 644.44 (6.63 US Dollar) on food and food items on a weekly basis. The result of the analysis of food diversity intake in the study area shows that 63.33% of the sampled households fell under the low household food diversity intake, while 33 households, representing 36.67% ranks high in term of household food diversity intake. The result for the food security status shows that the sampled population was food secure (58.89%) while 41.11% falls below the recommended threshold. The result for the logistics regression model shows that age, engagement in off farm employment and household size are significant in determining the food security status of farm household in the study area. The three variables were significant at 10%, 5% and 1% respectively. The study therefore recommends among others, that measures be put in place by stakeholders to make agriculture attractive for youth since age is a significant determinant of food security in the study area. Awareness should also be created by stakeholders on the needs for effective family planning methods to be adopted by farm household in the study area.Keywords: Niger State, Guinea Savana, food diversity, logit regression model and food security
Procedia PDF Downloads 10612487 Realizing the National Disaster Management Policy of Sri Lanka through Public Private Partnerships
Authors: K. W. A. M. Kokila, Matsui Kenichi
Abstract:
Sri Lanka’s disaster management policy aims to protect lives and developments in disaster affected areas by effectively using resources for disaster risk reduction, emergency management, and community awareness. However, funding for these action programs has posed a serious challenge to the country’s economy. This paper examines the extent to which private-public partnerships (PPPs) can facilitate and expedite disaster management works. In particular, it discusses the results of the questionnaire survey among policymakers, government administrators, NGOs, and private businesses. This questionnaire was conducted in 2017. All respondents were selected based on their experience in PPP projects in the past. The survey focused on clarifying the effectiveness of past PPP projects as well as their efficiency and transparency. The respondents also provided their own opinions and suggestions to improve the future PPP projects in Sri Lanka. The questionnaire was distributed to fifteen persons. The results show that almost all respondents think that PPP projects are beneficial and important for future disaster risk management in Sri Lanka. The respondents, however, showed some reservation about effectiveness and transparency of the PPP process. This paper also discusses the results on the respondents’ perceptions about their capacity regarding human resources and management. This paper, overall, sheds light on technological, financial and human resource management practices in developed countries as well as policy and legislation provisions regarding PPP projects.Keywords: disaster management, policy, private public partnership, projects
Procedia PDF Downloads 16912486 Green Economy and Environmental Protection Economic Policy Challenges in Georgia
Authors: Gulnaz Erkomaishvili
Abstract:
Introduction. One of the most important issues of state economic policy in the 21st century is the problem of environmental protection. The Georgian government considers the green economy as one of the most important means of sustainable economic development and takes the initiative to implement voluntary measures to promote sustainable development. In this context, it is important to promote the development of ecosystem services, clean production, environmental education and green jobs.The development of the green economy significantly reduces the inefficient use of natural resources, waste generation, emissions into the atmosphere and the discharge of untreated water into bodies of water.It is, therefore, an important instrument in the environmental orientation of sustainable development. Objectives.The aim of the paper is to analyze the current status of the green economy in Georgia and identify effective ways to improve the environmental, economic policy of sustainable development. Methodologies: This paper uses general and specific methods, in particular, analysis, synthesis, induction, deduction, scientific abstraction, comparative and statistical methods, as well as experts’ evaluation. bibliographic research of scientific works and reports of organizations was conducted; Publications of the National Statistics Office of Georgia are used to determine the regularity between analytical and statistical estimations. Also, theoretical and applied research of international organizations and scientist-economists are used. Contributions: The country should implement such an economic policy that ensures the transition to a green economy, in particular, revising water, air and waste laws, strengthening existing environmental management tools and introcing new tools (including economic tools). Perfecting the regulatory legal framework of the environmental impact assessment system, which includes the harmonization of Georgian legislation with the requirements of the European Union. To ensure the protection and rational use of Georgia's forests, emphasis should be placed on sustainable forestry, protection and restoration of forests.Keywords: green economy, environmental protection, environmental protection economic policy, environmental protection policy challanges
Procedia PDF Downloads 6512485 Feasibility Study of Iraq' Decomposition and Its Effects on the Region
Authors: Ebrahim Rahmani, Siyamak Moazeni
Abstract:
According to the Iraq's first constitutional law (approved 2005), Iraq is an independent with sovereignty and its governmental structure is parliamentary democratic republic and federal. Even in reforms in 2009, this article of law did not changed at all. But considering the existence of this emphasis and clarity which is mentioned in the law, different and sometimes contradictory interpretations and positions are expressed about federalism in the way that we can say, considering the importance of the matter, federalism is a focus point to create and expansion of the cold war among leaders of different groups of the country. Iraq's today political and security position has granted the suitable opportunity to Iraq's Kurdistan in appearing of the recent security crisis to increase its share from the central political power or to achieve to its independent dream. The federalism the weakest point of Iraq's territorial integrity in a way that if different groups do not come to a consensus about it and do not think about a mechanism which is accepted by all of them, this can effect on and Iraq's political stability and security. Iraq's Kurdistan follows the option of disintegration and separation under the shadow of political and security changes, even with existence of some Iraqi groups' hopes regarding the improvement of situation after parliament election and also considering Masoud Barezani's power will for separation from Iraq as well as regarding special international changes and disintegration of Karime from Ukraine and ISIS crises; concerns have been created among regional and international powers and interior players. In this article, a paradox due constitutional law about federalism, Iraq's central government view and its politicians to the matter and the regional effect of this action on region's geopolitics are reviewed as well.Keywords: constitutional law, federalism, decomposition, Iraq's Kurdistan
Procedia PDF Downloads 32812484 Drugs, Silk Road, Bitcoins
Authors: Lali Khurtsia, Vano Tsertsvadze
Abstract:
Georgian drug policy is directed to reduce the supply of drugs. Retrospective analysis has shown that law enforcement activities have been followed by the expulsion of particular injecting drugs. The demand remains unchanged and drugs are substituted by the hand-made, even more dangerous homemade drugs entered the market. To find out expected new trends on the Georgian drug market, qualitative study was conducted with Georgian drug users to determine drug supply routes. It turned out that drug suppliers and consumers for safety reasons and to protect their anonymity, use Skype to make deals. IT in illegal drug trade is even more sophisticated in the worldwide. Trading with Bitcoins in the Darknet ensures high confidentiality of money transactions and the safe circulation of drugs. In 2014 largest Bitcoin mining enterprise in the world was built in Georgia. We argue that the use of Bitcoins and Darknet by Georgian drug consumers and suppliers will be an incentive to response adequately to the government's policy of restricting supply in order to satisfy market demand for drugs.Keywords: bitcoin, darknet, drugs, policy
Procedia PDF Downloads 43912483 The Energy Consumption by the Sector of Transport and His Impact on the Atmospheric Pollution
Authors: Mme Hamani Née Guessas Ghaniya
Abstract:
The transport is the base of the development of the exchanges and the business, being both a recognized determiner of the economic and social development. The development of the transport is in the center of the big challenges of development of countries, but it is also at the heart of big contradictions, since we integrate the environmental issues which are bound to him, in particular through the questions of energy. Indeed, the energy consumption by the sector of transport is one of bigger concerns, because it is increasing and it has a big impact on our environment. The main consequences are, the atmospheric pollution causing an increase of the greenhouse effect which causes a global warming. These global warming risks to engender a partial cast iron of polar caps so raising the level of seas, flooding the low coastal zones, certain islands and the deltas. Thus, the purpose of this communication is to present the impact of the energy consumption by the sector of transport on the air quality, showing its effect on the health and on the global warming.Keywords: energy consumption, sector of transport, air quality, atmospheric pollution
Procedia PDF Downloads 33212482 Reducing Energy Consumption in Architectural Spaces by Optimizing Natural Light Transmission
Authors: Parisa Javid
Abstract:
In architecture, daylight contributes to humans' mental and physical well-being and reduces the consumption of fossil fuels. Accordingly, Iran's rich architecture has valuable achievements and experiences that should be recognized and introduced to the Iranian and international architecture communities. There are many ways to reduce energy consumption in buildings, but electricity accounts for a large part of that consumption. Lighting up spaces with natural light is a significant factor in reducing energy consumption and preventing electricity dissipation. Aside from being expensive, electric lighting systems cause excessive heat and physical injury (eyes). This study is based on library records and documents. Modern lighting systems are used to reduce energy consumption in the interior of a building to allow for optimal transmission of natural light. It discusses how to use natural light in architecture and the benefits of natural light in buildings. Solar energy can be used more efficiently, and electrical power can be saved in residential, administrative, commercial, and educational buildings by using new methods such as light tubes and mirror directors. Modern lighting systems, natural light, and reduced energy consumption are keywords for these systems, which quickly return their investment.Keywords: modern lighting systems, natural light, reduced energy consumption
Procedia PDF Downloads 10012481 Efficient Use of Energy through Incorporation of a Gas Turbine in Methanol Plant
Authors: M. Azadi, N. Tahouni, M. H. Panjeshahi
Abstract:
A techno-economic evaluation for efficient use of energy in a large scale industrial plant of methanol is carried out. This assessment is based on integration of a gas turbine with an existing plant of methanol in which the outlet gas products of exothermic reactor is expanded to power generation. Also, it is decided that methanol production rate is constant through addition of power generation system to the existing methanol plant. Having incorporated a gas turbine with the existing plant, the economic results showed total investment of MUSD 16.9, energy saving of 3.6 MUSD/yr with payback period of approximately 4.7 years.Keywords: energy saving, methanol, gas turbine, power generation
Procedia PDF Downloads 46912480 Psychosocial Processes and Strategies behind Islamic Deradicalisation: A Scoping Review
Authors: Carvalho M. Catia, Pinto R. Isabel, Azevedo F. Luis, Guerreiro, T. Alexandre, Barbosa R. Mariana, Pinto S. Marta
Abstract:
Due to the loss of territory, foreign terrorist fighters who have joined Islamic State are returning to their home countries. In order to counter this threat to international security, it is important to implement deradicalisation programmes, through strategies and processes that can reverse radicalisation. The objectives of this scoping review - which is underway - are to provide a comprehensive overview of the programmes being implemented, its main characteristics, the main motives and processes leading to deradicalisation, and to identify the key findings and the existing gaps in the literature. The methodology to be implemented in this scoping review follows the guidelines proposed by Arksey and O’Malley and by The Joanna Briggs Institute. The main results will be the development of a synthesis map of the deradicalisation programmes existing in the world, its main features, and recommendations to policy-makers and professionals.Keywords: deradicalisation strategies, psychosocial processes, radicalisation, terrorism
Procedia PDF Downloads 38912479 Intrusion Detection System Based on Peer to Peer
Authors: Alireza Pour Ebrahimi, Vahid Abasi
Abstract:
Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.Keywords: network, intrusion detection system, peer to peer, internal and external network
Procedia PDF Downloads 54812478 Detecting Black Hole Attacks in Body Sensor Networks
Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai
Abstract:
This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++
Procedia PDF Downloads 64612477 Effectiveness of Climate Smart Agriculture in Managing Field Stresses in Robusta Coffee
Authors: Andrew Kirabira
Abstract:
This study is an investigation into the effectiveness of climate-smart agriculture (CSA) technologies in improving productivity through managing biotic and abiotic stresses in the coffee agroecological zones of Uganda. The motive is to enhance farmer livelihoods. The study was initiated as a result of the decreasing productivity of the crop in Uganda caused by the increasing prevalence of pests, diseases and abiotic stresses. Despite 9 years of farmers’ application of CSA, productivity has stagnated between 700kg -800kg/ha/yr which is only 26% of the 3-5tn/ha/yr that CSA is capable of delivering if properly applied. This has negatively affected the incomes of the 10.6 million people along the crop value chain which has in essence affected the country’s national income. In 2019/20 FY for example, Uganda suffered a deficit of $40m out of singularly the increasing incidence of one pest; BCTB. The amalgamation of such trends cripples the realization of SDG #1 and #13 which are the eradication of poverty and mitigation of climate change, respectively. In probing CSA’s effectiveness in curbing such a trend, this study is guided by the objectives of; determining the existing farmers’ knowledge and perceptions of CSA amongst the coffee farmers in the diverse coffee agro-ecological zones of Uganda; examining the relationship between the use of CSA and prevalence of selected coffee pests, diseases and abiotic stresses; ascertaining the difference in the market organization and pricing between conventionally and CSA produced coffee; and analyzing the prevailing policy environment concerning the use of CSA in coffee production. The data collection research design is descriptive in nature; collecting data from farmers and agricultural extension workers in the districts of Ntungamo, Iganga and Luweero; each of these districts representing a distinct coffee agroecological zone. Policy custodian officers at district, cooperatives and at the crop’s overseeing national authority were also interviewed.Keywords: climate change, food security, field stresses, Productivity
Procedia PDF Downloads 5712476 Multisource (RF and Solar) Energy Harvesting for Internet of Things (IoT)
Authors: Emmanuel Ekwueme, Anwar Ali
Abstract:
As the Internet of Things (IoT) continues to expand, the demand for battery-free devices is increasing, which is crucial for the efficiency of 5G networks and eco-friendly industrial systems. The solution is a device that operates indefinitely, requires no maintenance, and has no negative impact on the ambient environment. One promising approach to achieve this is energy harvesting, which involves capturing energy from the ambient environment and transferring it to power devices. This method can revolutionize industries. Such as manufacturing, agriculture, and healthcare by enabling real-time data collection and analysis, reducing maintenance costs, improving efficiency, and contributing to a future with lower carbon emissions. This research explores various energy harvesting techniques, focusing on radio frequencies (RF) and multiple energy sources. It examines RF-based and solar methods for powering battery-free sensors, low-power circuits, and IoT devices. The study investigates a hybrid RF-solar harvesting circuit designed for remote sensing devices. The proposed system includes distinct RF and solar energy harvester circuits, with the RF harvester operating at 2.45GHz and the solar harvester utilizing a maximum power point tracking (MPPT) algorithm to maximize efficiency.Keywords: radio frequency, energy harvesting, Internet of Things (IoT), multisource, solar energy
Procedia PDF Downloads 1012475 Energy Calculation for Excited Lithium Atom in Position Space
Authors: Khalil H. Al-Bayati, Khalid Omar Al-Baiti
Abstract:
The energy expectation valueKeywords: energy expectation value, atomic systems, ground and excited states, Hartree-Fock approximation
Procedia PDF Downloads 61712474 Research of the Activation Energy of Conductivity in P-I-N SiC Structures Fabricated by Doping with Aluminum Using the Low-Temperature Diffusion Method
Authors: Ilkham Gafurovich Atabaev, Khimmatali Nomozovich Juraev
Abstract:
The activation energy of conductivity in p-i-n SiC structures fabricated by doping with Aluminum using the new low-temperature diffusion method is investigated. In this method, diffusion is stimulated by the flux of carbon and silicon vacancies created by surface oxidation. The activation energy of conductivity in the p - layer is 0.25 eV and it is close to the ionization energy of Aluminum in 4H-SiC from 0.21 to 0.27 eV for the hexagonal and cubic positions of aluminum in the silicon sublattice for weakly doped crystals. The conductivity of the i-layer (measured in the reverse biased diode) shows 2 activation energies: 0.02 eV and 0.62 eV. Apparently, the 0.62 eV level is a deep trap level and it is a complex of Aluminum with a vacancy. According to the published data, an analogous level system (with activation energies of 0.05, 0.07, 0.09 and 0.67 eV) was observed in the ion Aluminum doped 4H-SiC samples.Keywords: activation energy, aluminum, low temperature diffusion, SiC
Procedia PDF Downloads 279