Search results for: electrical power system security
22760 Optimal Sizes of Battery Energy Storage Systems for Economic Operation in Microgrid
Authors: Sirus Mohammadi, Sara Ansari, Darush dehghan, Habib Hoshyari
Abstract:
Batteries for storage of electricity from solar and wind generation farms are a key element in the success of sustainability. In recent years, due to large integration of Renewable Energy Sources (RESs) like wind turbine and photovoltaic unit into the Micro-Grid (MG), the necessity of Battery Energy Storage (BES) has increased dramatically. The BES has several benefits and advantages in the MG-based applications such as short term power supply, power quality improvement, facilitating integration of RES, ancillary service and arbitrage. This paper presents the cost-based formulation to determine the optimal size of the BES in the operation management of MG. Also, some restrictions, i.e. power capacity of Distributed Generators (DGs), power and energy capacity of BES, charge/discharge efficiency of BES, operating reserve and load demand satisfaction should be considered as well. In this paper, a methodology is proposed for the optimal allocation and economic analysis of ESS in MGs on the basis of net present value (NPV). As the optimal operation of an MG strongly depends on the arrangement and allocation of its ESS, economic operation strategies and optimal allocation methods of the ESS devices are required for the MG.Keywords: microgrid, energy storage system, optimal sizing, net present value
Procedia PDF Downloads 49422759 Design of Nano-Reinforced Carbon Fiber Reinforced Plastic Wheel for Lightweight Vehicles with Integrated Electrical Hub Motor
Authors: Davide Cocchi, Andrea Zucchelli, Luca Raimondi, Maria Brugo Tommaso
Abstract:
The increasing attention is given to the issues of environmental pollution and climate change is exponentially stimulating the development of electrically propelled vehicles powered by renewable energy, in particular, the solar one. Given the small amount of solar energy that can be stored and subsequently transformed into propulsive energy, it is necessary to develop vehicles with high mechanical, electrical and aerodynamic efficiencies along with reduced masses. The reduction of the masses is of fundamental relevance especially for the unsprung masses, that is the assembly of those elements that do not undergo a variation of their distance from the ground (wheel, suspension system, hub, upright, braking system). Therefore, the reduction of unsprung masses is fundamental in decreasing the rolling inertia and improving the drivability, comfort, and performance of the vehicle. This principle applies even more in solar propelled vehicles, equipped with an electric motor that is connected directly to the wheel hub. In this solution, the electric motor is integrated inside the wheel. Since the electric motor is part of the unsprung masses, the development of compact and lightweight solutions is of fundamental importance. The purpose of this research is the design development and optimization of a CFRP 16 wheel hub motor for solar propulsion vehicles that can carry up to four people. In addition to trying to maximize aspects of primary importance such as mass, strength, and stiffness, other innovative constructive aspects were explored. One of the main objectives has been to achieve a high geometric packing in order to ensure a reduced lateral dimension, without reducing the power exerted by the electric motor. In the final solution, it was possible to realize a wheel hub motor assembly completely comprised inside the rim width, for a total lateral overall dimension of less than 100 mm. This result was achieved by developing an innovative connection system between the wheel and the rotor with a double purpose: centering and transmission of the driving torque. This solution with appropriate interlocking noses allows the transfer of high torques and at the same time guarantees both the centering and the necessary stiffness of the transmission system. Moreover, to avoid delamination in critical areas, evaluated by means of FEM analysis using 3D Hashin damage criteria, electrospun nanofibrous mats have been interleaved between CFRP critical layers. In order to reduce rolling resistance, the rim has been designed to withstand high inflation pressure. Laboratory tests have been performed on the rim using the Digital Image Correlation technique (DIC). The wheel has been tested for fatigue bending according to E/ECE/324 R124e.Keywords: composite laminate, delamination, DIC, lightweight vehicle, motor hub wheel, nanofiber
Procedia PDF Downloads 21422758 Design and Control of a Brake-by-Wire System Using a Permanent Magnet Synchronous Motor
Authors: Daniel S. Gamba, Marc Sánchez, Javier Pérez, Juan J. Castillo, Juan A. Cabrera
Abstract:
The conventional hydraulic braking system operates through the activation of a master cylinder and solenoid valves that distribute and regulate brake fluid flow, adjusting the pressure at each wheel to prevent locking during sudden braking. However, in recent years, there has been a significant increase in the integration of electronic units into various vehicle control systems. In this context, one of the technologies most recently researched is the Brake-by-wire system, which combines electronic, hydraulic, and mechanical technologies to manage braking. This proposal introduces the design and control of a Brake-by-wire system, which will be part of a fully electric and teleoperated vehicle. This vehicle will have independent four-wheel drive, braking, and steering systems. The vehicle will be operated by embedded controllers programmed into a Speedgoat test system, which allows programming through Simulink and real-time capabilities. The braking system comprises all mechanical and electrical components, a vehicle control unit (VCU), and an electronic control unit (ECU). The mechanical and electrical components include a permanent magnet synchronous motor from Odrive and its inverter, the mechanical transmission system responsible for converting torque into pressure, and the hydraulic system that transmits this pressure to the brake caliper. The VCU is responsible for controlling the pressure and communicates with the other components through the CAN protocol, minimizing response times. The ECU, in turn, transmits the information obtained by a sensor installed in the caliper to the central computer, enabling the control loop to continuously regulate pressure by controlling the motor's speed and current. To achieve this, tree controllers are used, operating in a nested configuration for effective control. Since the computer allows programming in Simulink, a digital model of the braking system has been developed in Simscape, which makes it possible to reproduce different operating conditions, faithfully simulate the performance of alternative brake control systems, and compare the results with data obtained in various real tests. These tests involve evaluating the system's response to sinusoidal and square wave inputs at different frequencies, with the results compared to those obtained from conventional braking systems.Keywords: braking, CAN protocol, permanent magnet motor, pressure control
Procedia PDF Downloads 2022757 Review of Existing Pumped Storage Technologies and their Application in the Case of Bistrica Pump Storage Plant
Authors: Dušan Bojović, Wei Huang, Zdravko Stojanović, Jovan Ilić
Abstract:
In an era of ever-growing electricity generation from renewable energy sources, namely wind and solar, a need for reliable energy storage and intensive balancing of the electric power system gains significance. For decades, pump storage hydroelectric power plants have proven to be an important asset regarding the storage of generated electricity. However, with the increasing overall share of wind and solar in electric systems at large, the importance of electric grid stability keeps growing. A large pump storage project, the Bistrica Pump Storage Plant (PSP), is currently under development in Serbia. The Bistrica PSP will be designed as a 600+ MW power plant, which is envisaged as a significant contributor to the Serbian power grid stability as more and more renewable energy sources are implemented over time. PSP Bistrica is seen as a strategically important project on the green agenda path of the Electric Power Industry of Serbia as a necessary pre-condition for the safe implementation of other renewable energy sources. The importance of such a plant would also play an important role in reducing the electricity production from coal, i.e., thermoelectric power plants. During the project’s development, various techniques and technologies are evaluated for the purpose of determining the optimum (the most profitable) solution. Over the course of this paper, these technologies – such as frequency-regulated pump turbines and ternary sets will be presented, with a detailed explanation of their possible application within the Bistrica PSP project and their relative advantages/disadvantages in this particular case.Keywords: hydraulic turbines, pumped storage, renewable energy, competing technologies
Procedia PDF Downloads 9222756 Exposure Analysis of GSM Base Stations in Industrial Area
Authors: A. D. Usman, W. F. Wan Ahmad, H. H. Danjuma
Abstract:
Exposure due to GSM frequencies is subject of daily debate. Though regulatory bodies provide guidelines for exposure, people still exercise fear on the possible health hazard that may result due to long term usage. In this study, exposure due to electromagnetic field emitted by GSM base stations in industrial areas was investigated. The aimed was to determine whether industrial area exposure is higher as compared to residential as well as compliance with ICNIRP guidelines. Influence of reflection and absorption with respect to inverse square law was also investigated. Measurements from GSM base stations were performed at various distances in far field region. The highest measured peak power densities as well as the calculated values at GSM 1.8 GHz were 6.05 and 90 mW/m2 respectively. This corresponds to 0.07 and 1% of ICNIRP guidelines. The highest peak power densities as well as the calculated values at GSM 0.9 GHz were 11.92 and 49.7 mW/m2 respectively. These values were 0.3 and 1.1% of ICNIRP guidelines.Keywords: Global System for Mobile Communications (GSM), Electromagnetic Field (EMF), far field, power density, Radiofrequency (RF)
Procedia PDF Downloads 48222755 Design Optimization of Doubly Fed Induction Generator Performance by Differential Evolution
Authors: Mamidi Ramakrishna Rao
Abstract:
Doubly-fed induction generators (DFIG) due to their advantages like speed variation and four-quadrant operation, find its application in wind turbines. DFIG besides supplying power to the grid has to support reactive power (kvar) under grid voltage variations, should contribute minimum fault current during faults, have high efficiency, minimum weight, adequate rotor protection during crow-bar-operation from +20% to -20% of rated speed. To achieve the optimum performance, a good electromagnetic design of DFIG is required. In this paper, a simple and heuristic global optimization – Differential Evolution has been used. Variables considered are lamination details such as slot dimensions, stack diameters, air gap length, and generator stator and rotor stack length. Two operating conditions have been considered - voltage and speed variations. Constraints included were reactive power supplied to the grid and limiting fault current and torque. The optimization has been executed separately for three objective functions - maximum efficiency, weight reduction, and grid fault stator currents. Subsequent calculations led to the conclusion that designs determined through differential evolution help in determining an optimum electrical design for each objective function.Keywords: design optimization, performance, DFIG, differential evolution
Procedia PDF Downloads 15022754 US-ASEAN Counter Terrorism Cooperation: Maintaining International Security and Avoiding Muslim Stereotypes
Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana
Abstract:
The US Global War on Terror has had effect on Southeast Asia as Second Front of Global War on Terror. Since 2001, ASEAN had adopted legal framework to counter the terrorist threat through numerous approach which accommodate various counterterrorism policy of the ten member states. ASEAN have also enhanced multilateral cooperation with US and its allies in Asia Pacific region in addressing terrorist threat, terrorist funding, cyber terrorism and other forms of terrorism. This cooperation is essential to maintain international security and stability and also assure economic development. This work focuses on the US-ASEAN counterterrorism cooperation due to they identified terrorism as a mutual enemy that posed to human security, infrastructure security, and national security. Having in mind that international terrorism usually connected with Muslim community, this paper will also elaborate the concept of Jihad and Islam revivalism in politics to avoid negative image of Islam and Muslim. This paper argues that as region with large Muslim community, Southeast Asia still need to tighten counter terrorism cooperation and also lessening Muslim stereotypes with terrorism through educating public understanding and inter-faith and intra-faith dialogue to create a better world.Keywords: ASEAN, U.S., counter terrorism, Muslim stereotypes
Procedia PDF Downloads 24622753 Food Security in Nigeria: An Examination of Food Availability and Accessibility in Nigeria
Authors: Okolo Chimaobi Valentine, Obidigbo Chizoba
Abstract:
As a basic physiology need, the threat to sufficient food production is the threat to human survival. Food security has been an issue that has gained global concern. This paper looks at the food security in Nigeria by assessing the availability of food and accessibility of the available food. The paper employed multiple linear regression technique and graphic trends of growth rates of relevant variables to show the situation of food security in Nigeria. Results of the tests revealed that population growth rate was higher than the growth rate of food availability in Nigeria for the earlier period of the study. Commercial bank credit to the agricultural sector, foreign exchange utilization for food and the Agricultural Credit Guarantee Scheme Fund (ACGSF) contributed significantly to food availability in Nigeria. Food prices grew at a faster rate than the average income level, making it difficult to access sufficient food. It implies that prior to the year 2012; there was insufficient food to feed the Nigerian populace. However, continued credit to the food and agricultural sector will ensure sustained and sufficient production of food in Nigeria. Microfinance banks should make sufficient credit available to the smallholder farmer. The government should further control and subsidize the rising price of food to make it more accessible by the people.Keywords: food, accessibility, availability, security
Procedia PDF Downloads 37622752 Design of Open Framework Based Smart ESS Profile for PV-ESS and UPS-ESS
Authors: Young-Su Ryu, Won-Gi Jeon, Byoung-Chul Song, Jae-Hong Park, Ki-Won Kwon
Abstract:
In this paper, an open framework based smart energy storage system (ESS) profile for photovoltaic (PV)-ESS and uninterruptible power supply (UPS)-ESS is proposed and designed. An open framework based smart ESS is designed and developed for unifying the different interfaces among manufacturers. The smart ESS operates under the profile which provides the specifications of peripheral devices such as different interfaces and to the open framework. The profile requires well systemicity and expandability for addible peripheral devices. Especially, the smart ESS should provide the expansion with existing systems such as UPS and the linkage with new renewable energy technology such as PV. This paper proposes and designs an open framework based smart ESS profile for PV-ESS and UPS-ESS. The designed profile provides the existing smart ESS and also the expandability of additional peripheral devices on smart ESS such as PV and UPS.Keywords: energy storage system (ESS), open framework, profile, photovoltaic (PV), uninterruptible power supply (UPS)
Procedia PDF Downloads 47422751 Comparison of Spiral Circular Coil and Helical Coil Structures for Wireless Power Transfer System
Authors: Zhang Kehan, Du Luona
Abstract:
Wireless power transfer (WPT) systems have been widely investigated for advantages of convenience and safety compared to traditional plug-in charging systems. The research contents include impedance matching, circuit topology, transfer distance et al. for improving the efficiency of WPT system, which is a decisive factor in the practical application. What is more, coil structures such as spiral circular coil and helical coil with variable distance between two turns also have indispensable effects on the efficiency of WPT systems. This paper compares the efficiency of WPT systems utilizing spiral or helical coil with variable distance between two turns, and experimental results show that efficiency of spiral circular coil with an optimum distance between two turns is the highest. According to efficiency formula of resonant WPT system with series-series topology, we introduce M²/R₋₁ to measure the efficiency of spiral circular coil and helical coil WPT system. If the distance between two turns s is too close, proximity effect theory shows that the induced current in the conductor, caused by a variable flux created by the current flows in the skin of vicinity conductor, is the opposite direction of source current and has assignable impart on coil resistance. Thus in two coil structures, s affects coil resistance. At the same time, when the distance between primary and secondary coils is not variable, s can also make the influence on M to some degrees. The aforementioned study proves that s plays an indispensable role in changing M²/R₋₁ and then can be adjusted to find the optimum value with which WPT system achieves the highest efficiency. In actual application situations of WPT systems especially in underwater vehicles, miniaturization is one vital issue in designing WPT system structures. Limited by system size, the largest external radius of spiral circular coil is 100 mm, and the largest height of helical coil is 40 mm. In other words, the turn of coil N changes with s. In spiral circular and helical structures, the distance between each two turns in secondary coil is set as a constant value 1 mm to guarantee that the R2 is not variable. Based on the analysis above, we set up spiral circular coil and helical coil model using COMSOL to analyze the value of M²/R₋₁ when the distance between each two turns in primary coil sp varies from 0 mm to 10 mm. In the two structure models, the distance between primary and secondary coils is 50 mm and wire diameter is chosen as 1.5 mm. The turn of coil in secondary coil are 27 in helical coil model and 20 in spiral circular coil model. The best value of s in helical coil structure and spiral circular coil structure are 1 mm and 2 mm respectively, in which the value of M²/R₋₁ is the largest. It is obviously to select spiral circular coil as the first choice to design the WPT system for that the value of M²/R₋₁ in spiral circular coil is larger than that in helical coil under the same condition.Keywords: distance between two turns, helical coil, spiral circular coil, wireless power transfer
Procedia PDF Downloads 34522750 Data Security in Cloud Storage
Authors: Amir Rashid
Abstract:
Today is the world of innovation and Cloud Computing is becoming a day to day technology with every passing day offering remarkable services and features on the go with rapid elasticity. This platform took business computing into an innovative dimension where clients interact and operate through service provider web portals. Initially, the trust relationship between client and service provider remained a big question but with the invention of several cryptographic paradigms, it is becoming common in everyday business. This research work proposes a solution for building a cloud storage service with respect to Data Security addressing public cloud infrastructure where the trust relationship matters a lot between client and service provider. For the great satisfaction of client regarding high-end Data Security, this research paper propose a layer of cryptographic primitives combining several architectures in order to achieve the goal. A survey has been conducted to determine the benefits for such an architecture would provide to both clients/service providers and recent developments in cryptography specifically by cloud storage.Keywords: data security in cloud computing, cloud storage architecture, cryptographic developments, token key
Procedia PDF Downloads 29422749 Investigation on Biomass as an Alternate Source for Power Generation
Authors: Narsimhulu Sanke, D. N. Reddy
Abstract:
The purpose of the paper is to discuss the biomass as a renewable source of energy for power generation. The setup is designed and fabricated in the Centre for Energy Technology (CET) and four different fuels are tested in the laboratory, but here the focus is on wood blocks (fuel) combustion with temperature, gas composition percentage by volume and the heating values.Keywords: biomass, downdraft gasifier, power generation, renewable energy sources
Procedia PDF Downloads 54422748 Intrusion Detection in SCADA Systems
Authors: Leandros A. Maglaras, Jianmin Jiang
Abstract:
The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection
Procedia PDF Downloads 55222747 Optimal Sizing and Placement of Distributed Generators for Profit Maximization Using Firefly Algorithm
Authors: Engy Adel Mohamed, Yasser Gamal-Eldin Hegazy
Abstract:
This paper presents a firefly based algorithm for optimal sizing and allocation of distributed generators for profit maximization. Distributed generators in the proposed algorithm are of photovoltaic and combined heat and power technologies. Combined heat and power distributed generators are modeled as voltage controlled nodes while photovoltaic distributed generators are modeled as constant power nodes. The proposed algorithm is implemented in MATLAB environment and tested the unbalanced IEEE 37-node feeder. The results show the effectiveness of the proposed algorithm in optimal selection of distributed generators size and site in order to maximize the total system profit.Keywords: distributed generators, firefly algorithm, IEEE 37-node feeder, profit maximization
Procedia PDF Downloads 44322746 The Establishment and Application of TRACE/FRAPTRAN Model for Kuosheng Nuclear Power Plant
Authors: S. W. Chen, W. K. Lin, J. R. Wang, C. Shih, H. T. Lin, H. C. Chang, W. Y. Li
Abstract:
Kuosheng nuclear power plant (NPP) is a BWR/6 type NPP and located on the northern coast of Taiwan. First, Kuosheng NPP TRACE model were developed in this research. In order to assess the system response of Kuosheng NPP TRACE model, startup tests data were used to evaluate Kuosheng NPP TRACE model. Second, the over pressurization transient analysis of Kuosheng NPP TRACE model was performed. Besides, in order to confirm the mechanical property and integrity of fuel rods, FRAPTRAN analysis was also performed in this study.Keywords: TRACE, safety analysis, BWR/6, FRAPTRA
Procedia PDF Downloads 56322745 Identification of Key Parameters for Benchmarking of Combined Cycle Power Plants Retrofit
Authors: S. Sabzchi Asl, N. Tahouni, M. H. Panjeshahi
Abstract:
Benchmarking of a process with respect to energy consumption, without accomplishing a full retrofit study, can save both engineering time and money. In order to achieve this goal, the first step is to develop a conceptual-mathematical model that can easily be applied to a group of similar processes. In this research, we have aimed to identify a set of key parameters for the model which is supposed to be used for benchmarking of combined cycle power plants. For this purpose, three similar combined cycle power plants were studied. The results showed that ambient temperature, pressure and relative humidity, number of HRSG evaporator pressure levels and relative power in part load operation are the main key parameters. Also, the relationships between these parameters and produced power (by gas/ steam turbine), gas turbine and plant efficiency, temperature and mass flow rate of the stack flue gas were investigated.Keywords: combined cycle power plant, energy benchmarking, modelling, retrofit
Procedia PDF Downloads 30522744 Ternary Content Addressable Memory Cell with a Leakage Reduction Technique
Authors: Gagnesh Kumar, Nitin Gupta
Abstract:
Ternary Content Addressable Memory cells are mainly popular in network routers for packet forwarding and packet classification, but they are also useful in a variety of other applications that require high-speed table look-up. The main TCAM-design challenge is to decrease the power consumption associated with the large amount of parallel active circuitry, without compromising with speed or memory density. Furthermore, when the channel length decreases, leakage power becomes more significant, and it can even dominate dynamic power at lower technologies. In this paper, we propose a TCAM-design technique, called Virtual Power Supply technique that reduces the leakage by a substantial amount.Keywords: match line (ML), search line (SL), ternary content addressable memory (TCAM), Leakage power (LP)
Procedia PDF Downloads 29922743 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme
Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey
Abstract:
In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID
Procedia PDF Downloads 29922742 Development of a Myocardial Patch with 3D Hydrogel Electrical Stimulation System
Authors: Yung-Gi Chen, Pei-Leun Kang, Yu-Hsin Lin, Shwu-Jen Chang
Abstract:
Myocardial tissue has limited self-repair ability due to its loss of differentiation characteristic for most mature cardiomyocytes. Therefore, the effective use of stem cell technology in regenerative medicine is an important development to alleviate the current difficulties in cardiac disease treatment. The main purpose of this project was to develop a 3-D hydrogel electrical stimulating system for promoting the differentiation of stem cells into myocardial cells, and the patch will be used to repair damaged myocardial tissue. This project was focused on the preparation of the electrical stimulation system with carbon/CaCl₂ electrodes covered with carbon nanotube-hydrogel. In this study, we utilized screen imprinting techniques and used Poly(lactic-co-glycolic acid)(PLGA) membranes as printing substrates to fabricate a carbon/CaCl₂ interdigitated electrode that covered with alginate/carbon nanotube hydrogels. The single-walled carbon nanotube was added in the hydrogel to enhance the mechanical strength and conductivity of hydrogel. In this study, we used PLGA (85:15) as electrode preparing substrate. The CaCl₂/ EtOH solution (80% w/v) was mixed into carbon paste to prepare various concentration calcium-containing carbon paste (2.5%, 5%, 7.5%, 10% v/v). Different concentrations of alginate (1%, 1.5%, 2% v/v) and SWCNT(Diameter < 2nm, length between 5-15μm) (1, 1.5, 3 mg/ml) are gently immobilized on the electrode by cross-linking with calcium chloride. The three-dimensional hydrogel electrode was tested for its redox efficiency by cyclic voltammetry to determine the optimal parameters for the hydrogel electrode preparation. From the result of the final electrodes, it indicated that the electrode was not easy to maintain the pattern of the interdigitated electrode when the concentration of calcium of chloride was more than 10%. According to the gel rate test and cyclic voltammetry experiment results showed the SWCNT could increase the electron conduction of hydrogel electrodes significantly. So far the 3D electrode system has been completed, 2% alginate mixed with 3mg SWCNT is the optimal condition to construct the most complete structure for the hydrogel preparation.Keywords: myocardial tissue engineering, screen printing technology, poly (lactic-co-glycolic acid), alginate, single walled carbon nanotube
Procedia PDF Downloads 11322741 In a Situation of Great Distress: Cross Border Migration and the Quest for Enduring Security in North-East Nigeria
Authors: Nuhu Bitrus Mailabari
Abstract:
Nigeria is a highly multifarious nation trapped between affluence and affliction. On one hand, the state has vast territorial size, economic strength, relative internal cohesion, and good external linkages. On the other, it is bedeviled with enormous challenges. It is common knowledge that the North-East geo-political zone has suffered colossal destruction for the most part of the last ten years due to the activities of the insurgent group Boko Haram. Several factors (political, economic, religious, socio-cultural) have been credited with the heightened insecurity in the region. Without a doubt, the security crisis in the region has rekindled several discussions critical to Nigeria’s security architecture. However, the debate on finding an enduring solution to the devastation in the North East continually neglects the nexus between cross border migration and national security. Using content analysis, this paper debates two main issues that continue to affect security in the North East. One, the cumulative impact of the Economic Community of West African States (ECOWAS) protocol on the free movement of people and goods. Two, the porous nature of Nigeria’s borders. Theoretically, the paper will rely on the systems theory because of its broad focus on structure, linkage, and process. The work concludes in twofold. First, that cross border migration and poor border management processes further worsened the political and socio-economic conditions of a region that is already in a bad state. Secondly, in addition to the existing strategies, Nigeria must develop a holistic approach including new methods of handling cross border movements in solving the security issues.Keywords: border, cross border, migration, Nigeria, northeast region, security
Procedia PDF Downloads 16422740 UML Model for Double-Loop Control Self-Adaptive Braking System
Authors: Heung Sun Yoon, Jong Tae Kim
Abstract:
In this paper, we present an activity diagram model for double-loop control self-adaptive braking system. Since activity diagram helps to improve visibility of self-adaption, we can easily find where improvement is needed on double-loop control. Double-loop control is adopted since the design conditions and actual conditions can be different. The system is reconfigured in runtime by using double-loop control. We simulated to verify and validate our model by using MATLAB. We compared single-loop control model with double-loop control model. Simulation results show that double-loop control provides more consistent brake power control than single-loop control.Keywords: activity diagram, automotive, braking system, double-loop, self-adaptive, UML, vehicle
Procedia PDF Downloads 41622739 Application of Exhaust Gas-Air Brake System in Petrol and Diesel Engine
Authors: Gurlal Singh, Rupinder Singh
Abstract:
The possible role of the engine brake is to convert a power-producing engine into a power-absorbing retarding mechanism. In this braking system, exhaust gas (EG) from the internal combustion (IC) engines is used to operate air brake in the automobiles. Airbrake is most used braking system in vehicles. In the proposed model, instead of air brake, EG is used to operate the brake lever and stored in a specially designed tank. This pressure of EG is used to operate the pneumatic cylinder and brake lever. Filters used to remove the impurities from the EG, then it is allowed to store in the tank. Pressure relief valve is used to achieve a specific pressure in the tank and helps to avoid further damage to the tank as well as in an engine. The petrol engine is used in the proposed EG braking system. The petrol engine is chosen initially because it produces less impurity in the exhaust than diesel engines. Moreover, exhaust brake system (EBS) for the Diesel engines is composed of gate valve, pneumatic cylinder and exhaust brake valve with the on-off solenoid. Exhaust brake valve which is core component of EBS should have characteristics such as high reliability and long life. In a diesel engine, there is butterfly valve in exhaust manifold connected with solenoid switch which is used to on and off the butterfly valve. When butterfly valve closed partially, then the pressure starts built up inside the exhaust manifold and cylinder that actually resist the movement of piston leads to crankshaft getting stops resulting stopping of the flywheel. It creates breaking effect in a diesel engine. The exhaust brake is a supplementary breaking system to the service brake. It is noted that exhaust brake increased 2-3 fold the life of service brake may be due to the creation of negative torque which retards the speed of the engine. More study may also be warranted for the best suitable design of exhaust brake in a diesel engine.Keywords: exhaust gas, automobiles, solenoid, airbrake
Procedia PDF Downloads 26022738 The Impact of Undocumented Migration on Human Security in Northern Nigeria
Authors: Targba Aondowase
Abstract:
Undocumented migration along Nigeria’s boarder with Cameroon, Chad and Niger is a key issue in tackling the human security challenges in the region as the security situation cannot be contained without proper boarder control. The paper adopts migration systems theory which asserts that migration alters the social, cultural, economic, and institutional conditions at both the sending and receiving ends to explain the influence of unregistered migrants on institutional changes as it affects the security situation in Northern Nigeria. It was found that undocumented migration is majorly influenced by poverty, illegal trade, wars and asylum. The study also discovers that Nigerian boarders are porous with over 250 footpaths that link directly to Cameroon, Chad and Niger, making the proliferation of small arms and light weapons a transnational organized crime in the region. These porous borders are unmanned by security operatives with limited government presence in the boarder communities. The study also found that undocumented immigrants are easily integrated into the northern communities due to common religious beliefs and race where they carry out normal and civic functions without obstruction. The paper concluded that the level of undocumented migration in Northern Nigeria is high due to unmanned and porous borders. The paper therefore recommended that the security agencies should be strengthened through adequate funding, innovative technology, sound policies and proficient processes that will help protect the country’s borders. The National Populations Commission and the National Identity Management Commission should be strengthened to have a good data base of the country’s citizens and there should be international cooperation between the neighbouring countries to tackle illegal migration and illegal trade along the borders. The findings and recommendations of this paper will serve as a guide towards curtailing the impact of undocumented migration on human security in Northern Nigeria.Keywords: human security, impact, migration, undocumented
Procedia PDF Downloads 33422737 Wastewater Treatment and Bio-Electricity Generation via Microbial Fuel Cell Technology Operating with Starch Proton Exchange Membrane
Authors: Livinus A. Obasi, Augustine N. Ajah
Abstract:
Biotechnology in recent times has tried to develop a mechanism whereby sustainable electricity can be generated by the activity of microorganisms on waste and renewable biomass (often regarded as “negative value”) in a device called microbial fuel cell, MFC. In this paper, we established how the biocatalytic activities of bacteria on organic matter (substrates) produced some electrons with the associated removal of some water pollution parameters; Biochemical oxygen demand (BOD), chemical oxygen demand (COD) to the tune of 77.2% and 88.3% respectively from a petrochemical sanitary wastewater. The electricity generation was possible by conditioning the bacteria to operate anaerobically in one chamber referred to as the anode while the electrons are transferred to the fully aerated counter chamber containing the cathode. Power densities ranging from 12.83 mW/m2 to 966.66 mW/m2 were achieved using a dual-chamber starch membrane MFC experimental set-up. The maximum power density obtained in this research shows an improvement in the use of low cost MFC set up to achieve power production. Also, the level of organic matter removal from the sanitary waste water by the operation of this device clearly demonstrates its potential benefit in achieving an improved benign environment. The beauty of the MFCs is their potential utility in areas lacking electrical infrastructures like in most developing countries.Keywords: bioelectricity, COD, microbial fuel cell, sanitary wastewater, wheat starch
Procedia PDF Downloads 25722736 Assessing the Effectiveness of Machine Learning Algorithms for Cyber Threat Intelligence Discovery from the Darknet
Authors: Azene Zenebe
Abstract:
Deep learning is a subset of machine learning which incorporates techniques for the construction of artificial neural networks and found to be useful for modeling complex problems with large dataset. Deep learning requires a very high power computational and longer time for training. By aggregating computing power, high performance computer (HPC) has emerged as an approach to resolving advanced problems and performing data-driven research activities. Cyber threat intelligence (CIT) is actionable information or insight an organization or individual uses to understand the threats that have, will, or are currently targeting the organization. Results of review of literature will be presented along with results of experimental study that compares the performance of tree-based and function-base machine learning including deep learning algorithms using secondary dataset collected from darknet.Keywords: deep-learning, cyber security, cyber threat modeling, tree-based machine learning, function-based machine learning, data science
Procedia PDF Downloads 15422735 Balancing Act: Political Dynamics of Economic and Climatological Security in the Politics of the Middle East
Authors: Zahra Bakhtiari
Abstract:
Middle East countries confront a multitude of main environmental challenges which are inevitable. The unstable economic and political structure which dominates numerous middle East countries makes it difficult to react effectively to unfavorable climate change impacts. This study applies a qualitative methodology and relies on secondary literature aimed to investigate how countries in the Middle East are balancing economic security and climatic security in terms of budgeting, infrastructure investment, political engagement (domestically through discourses or internationally in terms of participation in international organizations or bargaining, etc.) There has been provided an outline of innovative measures in both economic and environmental fields that are in progress in the Middle East countries and what capacity they have for economic development and environmental adaptation, as well as what has already been performed. The primary outcome is that countries that rely more on infrastructure investment such as negative emissions technologies (NET) through green social capital enterprises and political engagement, especially nationally determined contributions (NDCs) commitments and United Nations Framework Convention on Climate Change (UNFCCC), experience more economic and climatological security balance in the Middle East. Since implementing these measures is not the same in all countries in the region, we see different levels of balance between climate security and economic security. The overall suggestion is that the collaboration of both the bottom-up and top-down approaches helps create strategic environmental strategies which are in line with the economic circumstances of each country and creates the desired balance.Keywords: climate change, economic growth, sustainability, the Middle East, green economy, renewable energy
Procedia PDF Downloads 8122734 Design of Direct Power Controller for a High Power Neutral Point Clamped Converter Using Real-Time Simulator
Authors: Amin Zabihinejad, Philippe Viarouge
Abstract:
In this paper, a direct power control (DPC) strategies have been investigated in order to control a high power AC/DC converter with time variable load. This converter is composed of a three level three phase neutral point clamped (NPC) converter as rectifier and an H-bridge four quadrant current control converter. In the high power application, controller not only must adjust the desired outputs but also decrease the level of distortions which are injected to the network from the converter. Regarding this reason and nonlinearity of the power electronic converter, the conventional controllers cannot achieve appropriate responses. In this research, the precise mathematical analysis has been employed to design the appropriate controller in order to control the time variable load. A DPC controller has been proposed and simulated using Matlab/Simulink. In order to verify the simulation result, a real-time simulator- OPAL-RT- has been employed. In this paper, the dynamic response and stability of the high power NPC with variable load has been investigated and compared with conventional types using a real-time simulator. The results proved that the DPC controller is more stable and has more precise outputs in comparison with the conventional controller.Keywords: direct power control, three level rectifier, real time simulator, high power application
Procedia PDF Downloads 51722733 Security Analysis of SIMSec Protocol
Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci
Abstract:
Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.Keywords: End-to-end encryption, key exchange, SIM card, smart card
Procedia PDF Downloads 28422732 Grid Architecture Model for Smart Grid
Authors: Nick Farid, Roghoyeh Salmeh
Abstract:
The planning and operation of the power grid is becoming much more complex because of the introduction of renewable energy resources, the digitalization of the electricity industry, as well as the coupling of efficiency and greener energy trends. These changes, along with new trends, make interactions between grid users and the other stakeholders more complex. This paper focuses on the main “physical” and “logical” interactions between grid users and the grid stakeholders, both from power system equipment and information management standpoints, and proposes a new interoperability model for Smart Grids.Keywords: user interface, interoperability layers, grid architecture framework, smart grid
Procedia PDF Downloads 9522731 Dual Set Point Governor Control Structure with Common Optimum Temporary Droop Settings for both Islanded and Grid Connected Modes
Authors: Deepen Sharma, Eugene F. Hill
Abstract:
For nearly 100 years, hydro-turbine governors have operated with only a frequency set point. This natural governor action means that the governor responds with changing megawatt output to disturbances in system frequency. More and more, power system managers are demanding that governors operate with constant megawatt output. One way of doing this is to introduce a second set point in the control structure called a power set point. The control structure investigated and analyzed in this paper is unique in the way that it utilizes a power reference set point in addition to the conventional frequency reference set point. An optimum set of temporary droop parameters derived based on the turbine-generator inertia constant and the penstock water start time for stable islanded operation are shown to be also equally applicable for a satisfactory rate of generator loading during its grid connected mode. A theoretical development shows why this is the case. The performance of the control structure has been investigated and established based on the simulation study made in MATLAB/Simulink as well as through testing the real time controller performance on a 15 MW Kaplan Turbine and generator. Recordings have been made using the labVIEW data acquisition platform. The hydro-turbine governor control structure and its performance investigated in this paper thus eliminates the need to have a separate set of temporary droop parameters, one valid for islanded mode and the other for interconnected operations mode.Keywords: frequency set point, hydro governor, interconnected operation, isolated operation, power set point
Procedia PDF Downloads 367