Search results for: energy security policy
11861 Externalised Migration Controls and the Deportation of Minors and Potential Refugees from Mexico
Authors: Vickie Knox
Abstract:
Since the ‘urgent humanitarian crisis’ of the arrival of tens of thousands of Central American minors at the Mexico-US border in early 2014, the USA has increasingly externalised migration controls to Mexico. Although the resulting policy ‘Plan Frontera Sur’ claimed to protect migrants’ human rights, it has manifested as harshly delivered in-country controls and an alarming increase in deportations, particularly of minors. This is of particular concern given the ongoing situation of forced migration caused by criminal violence in Central America because these deportations do not all comply with Mexico’s international obligations and with its own legal framework for international protection that allows inter alia verbal asylum claims and grants minors additional protection against deportation. Notably, the volume of deportations, the speed with which they are carried out and the lack of adequate screening indicate non-compliance with the principle of non-refoulement and the right to claim asylum or other forms of protection. Based on qualitative data gathered in fieldwork in 2015 and quantitative data covering the period 2014-2016, this research details three types of adverse outcome resulting from these externalised controls: human rights violations perpetrated in order to deliver the policy–namely, deportations that may not comply with the principle of non-refoulement or the protection of minors; human rights violations perpetrated in the execution of policy–such as violations by state actors during apprehension and detention; and adverse consequences of the policy – such as increased risk during transit. This research has particular resonance as the Trump era brings tighter enforcement in the region, and has broader relevance for the study of externalisation tools on a global level.Keywords: deportation, externalisation, forced migration, non-refoulement
Procedia PDF Downloads 15111860 A Study of Industrial Symbiosis and Implementation of Indigenous Circular Economy Technique on an Indian Industrial Area
Authors: A. Gokulram
Abstract:
Industrial waste is often categorized as commercial and non-commercial waste by market value. In many Indian industries and other industrialized countries, the commercial value waste is capitalized and non-commercial waste is dumped to landfill. A lack of adequate research on industrial waste leads to the failure of effective resource management and the non-commercial waste are being considered as commercially non-viable residues. The term Industrial symbiosis refers to the direct inter-firm reuse or exchange of material and energy resource. The resource efficiency of commercial waste is mainly followed by an informal symbiosis in our research area. Some Industrial residues are reused within the facility where they are generated, others are reused directly nearby industrial facilities and some are recycled via the formal and informal market. The act of using industrial waste as a resource for another product faces challenges in India. This research study has observed a major negligence of trust and communication among several bodies to implement effective circular economy in India. This study applies interviewing process across researchers, government bodies, industrialist and designers to understand the challenges of circular economy in India. The study area encompasses an industrial estate in Ahmedabad in the state of Gujarat which comprises of 1200 industries. The research study primarily focuses on making industrial waste as commercial ready resource and implementing Indigenous sustainable practice in modern context to improve resource efficiency. This study attempted to initiate waste exchange platform among several industrialist and used varied methodologies from mail questionnaire to telephone survey. This study makes key suggestions to policy change and sustainable finance to improve circular economy in India.Keywords: effective resource management, environmental policy, indigenous technique, industrial symbiosis, sustainable finance
Procedia PDF Downloads 13511859 Double Layer Security Authentication Model for Automatic Dependent Surveillance-Broadcast
Authors: Buse T. Aydin, Enver Ozdemir
Abstract:
An automatic dependent surveillance-broadcast (ADS-B) system has serious security problems. In this study, a double layer authentication scheme between the aircraft and ground station, aircraft to aircraft, ground station to ATC tower is designed to prevent any unauthorized aircrafts from introducing themselves as friends. This method can be used as a solution to the problem of authentication. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or unknown according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as friend. As a result, the ADS-B messages coming from this authenticated friendly aircraft will be processed. In this method, even if the embedded key is captured by the unknown aircraft, without the information of the second layer, the unknown aircraft can easily be determined. Overall, in this work, we present a reliable system by adding physical layer in the authentication process.Keywords: ADS-B, authentication, communication with physical layer security, cryptography, identification friend or foe
Procedia PDF Downloads 17911858 Impact of Egypt’s Energy Demand on Oil and Gas Power Systems Environment
Authors: Moustafa Osman Mohamed
Abstract:
This paper will explore the influence of energy sector in Arab Republic of Egypt which has shared its responsibilities of many environmental challenges as the second largest economy in the Middle East (after Iran). Air and water pollution, desertification, inadequate disposal of solid waste and damage to coral reefs are serious problems that influence environmental management in Egypt. The intensive reliance of high population density and strong industrial growth are wearing Egypt's resources, and the rapidly-growing population has forced Egypt to breakdown agricultural land to residential and relevant use of commercial ingestion. The depletion effects of natural resources impose the government to apply innovation techniques in emission control and focus on sustainability. The cogeneration will be presented to control thermal losses and increase efficiency of energy power system.Keywords: cogeneration, environmental management, power electricity, energy indicators
Procedia PDF Downloads 27411857 Economic Policy Promoting Economically Rational Behavior of Start-Up Entrepreneurs in Georgia
Authors: Gulnaz Erkomaishvili
Abstract:
Introduction: The pandemic and the current economic crisis have created problems for entrepreneurship and, therefore for start-up entrepreneurs. The paper presents the challenges of start-up entrepreneurs in Georgia in the time of pandemic and the analysis of the state economic policy measures. Despite many problems, the study found that in 54.2% of start-ups surveyed under the pandemic, innovation opportunities were growing. It can be stated that the pandemic was a good opportunity to increase the innovative capacity of the enterprise. 52% of the surveyed start-up entrepreneurs managed to adapt to the current situation and increase the sale of their products/services through remote channels. As for the assessment of state support measures by start-up entrepreneurs, a large number of Georgian start-ups do not assess the measures implemented by the state positively. Methodology: The research process uses methods of analysis and synthesis, quantitative and qualitative, interview/survey, grouping, relative and average values, graphing, comparison, data analysis, and others. Main Findings: Studies have shown that for the start-up entrepreneurs, the main problem remains: inaccessible funding, workers' qualifications gap, inflation, taxes, regulation, political instability, inadequate provision of infrastructure, amount of taxes, and other factors. Conclusions: The state should take the following measures to support business start-ups: create an attractive environment for investment, availability of soft loans, creation of an insurance system, infrastructure development, increase the effectiveness of tax policy (simplicity of the tax system, clarity, optimal tax level ); promote export growth (develop strategy for opening up international markets, build up a broad marketing network, etc.).Keywords: start-up entrepreneurs, startups, start-up entrepreneurs support programs, start-up entrepreneurs support economic policy
Procedia PDF Downloads 11611856 Energy Conservation and H-Theorem for the Enskog-Vlasov Equation
Authors: Eugene Benilov, Mikhail Benilov
Abstract:
The Enskog-Vlasov (EV) equation is a widely used semi-phenomenological model of gas/liquid phase transitions. We show that it does not generally conserve energy, although there exists a restriction on its coefficients for which it does. Furthermore, if an energy-preserving version of the EV equation satisfies an H-theorem as well, it can be used to rigorously derive the so-called Maxwell construction which determines the parameters of liquid-vapor equilibria. Finally, we show that the EV model provides an accurate description of the thermodynamics of noble fluids, and there exists a version simple enough for use in applications.Keywords: Enskog collision integral, hard spheres, kinetic equation, phase transition
Procedia PDF Downloads 15311855 Use and Health Effects of Caffeinated Beverages in Omani Students
Authors: Nasiruddin Khan
Abstract:
The increased use of caffeinated beverages and energy drink is posing threat to all ages and gender especially, younger adults. There is a lack of scientific evidence in Oman regarding caffeine and energy drink consumption. Our study aims to demonstrate the prevalence, pattern, knowledge and awareness, and side effects of caffeine intake among university students. This cross-sectional study including (N=365) apparently healthy male and female Omani university students aged 18-30 years, was carried out from February 2018-June 2018. A self-administered questionnaire with various sections was used to obtain information. The prevalence of caffeinated beverage consumption was commonly high among participants (97%). The males preferred Nescafe, coffee (both p < 0.001), espresso (p < 0.022), and soda (p < 0.008) while females consumed more tea (p < 0.029). The awareness about negative health impact of caffeine intake was significantly higher in females rather than males (p < 0.002). The overall prevalence of energy drink consumption was 42.1% (n=149), and higher in males (75%, p < 0.001). More males consumed 3-5 and > 5 cans/day while females used 1-2 cans/day. The starting age of energy drink use was higher in females (16-20 years (51.1%)) as compared to males (11-15 years (33.3%)). Females were more aware of caffeine as energy drink ingredient (p < 0.036) than males. The major source of information about enery drink was family and friends (58.3%). Red Bull was the commonly used brand (55.5%) among participants. Common reasons for high energy drink consumption were energy boost (68.4 %), taste (62.9%), reduce fatigue (52.1%), and better performance (47.3%). Females reported breathing problem, and abnormal heart beat (p < 0.004, 0.054, respectively), while more males reported irritability than females (p < 0.052). The prevalence of caffeinated beverage and energy drink consumption is high among participants. The awareness, and knowledge among university student is not satisfactory and needs immediate action to avoid excess use of such consumption.Keywords: energy drink, caffeinated beverages, awareness, Oman
Procedia PDF Downloads 13111854 Application of Logistics Regression Model to Ascertain the Determinants of Food Security among Households in Maiduguri, Metropolis, Borno State, Nigeria
Authors: Abdullahi Yahaya Musa, Harun Rann Bakari
Abstract:
The study examined the determinants of food security among households in Maiduguri, Metropolis, Borno State, Nigeria. The objectives of the study are to: examine the determinants of food security among households; identify the coping strategies employed by food-insecure households in Maiduguri, Metropolis, Borno State, Nigeria. The population of the study is 843,964 respondents out of which 400 respondents were sampled. The study used a self-developed questionnaire to collect data from four hundred (400) respondents. Four hundred (400) copies of questionnaires were administered and all were retrieved, making 100% return rate. The study employed descriptive and inferential statistics for data analysis. Descriptive statistics (frequency counts and percentages) was used to analyze the socio-economic characteristics of the respondents and objective four, while inferential statistics (logit regression analysis) was used to analyze one. Four hundred (400) copies of questionnaires were administered and all the four hundred (400) were retrieved, making a 100% return rate. The results were presented in tables and discussed according to the research objectives. The study revealed that HHA, HHE, HHSZ, HHSX, HHAS, HHI, HHFS, HHFE, HHAC and HHCDR were the determinants of food security in Maiduguri Metropolis. Relying on less preferred foods, purchasing food on credit, limiting food intake to ensure children get enough, borrowing money to buy foodstuffs, relying on help from relatives or friends outside the household, adult family members skipping or reducing a meal because of insufficient finances and ration money to household members to buy street food were the coping strategies employed by food-insecure households in Maiduguri metropolis. The study recommended that Nigeria Government should intensify the fight against the Boko haram insurgency. This will put an end to Boko Haram Insurgency and enable farmers to return to farming in Borno state.Keywords: internally displaced persons, food security, coping strategies, descriptive statistics, logistics regression model, odd ratio
Procedia PDF Downloads 14711853 Challenges and Pitfalls of Nutrition Labeling Policy in Iran: A Policy Analysis
Authors: Sareh Edalati, Nasrin Omidvar, Arezoo Haghighian Roudsari, Delaram Ghodsi, Azizollaah Zargaran
Abstract:
Background and aim: Improving consumer’s food choices and providing a healthy food environment by governments is one of the essential approaches to prevent non-communicable diseases and to fulfill the sustainable development goals (SDGs). The present study aimed to provide an analysis of the nutrition labeling policy as one of the main components of the healthy food environment to provide learning lessons for the country and other low and middle-income countries. Methods: Data were collected by reviewing documents and conducting semi-structured interviews with stakeholders. Respondents were selected through purposive and snowball sampling and continued until data saturation. MAXQDA software was used to manage data analysis. A deductive content analysis was used by applying the Kingdon multiple streams and the policy triangulation framework. Results: Iran is the first country in the Middle East and North Africa region, which has implemented nutrition traffic light labeling. The implementation process has gone through two phases: voluntary and mandatory. In the voluntary labeling, volunteer food manufacturers who chose to have the labels would receive an honorary logo and this helped to reduce the food-sector resistance gradually. After this phase, the traffic light labeling became mandatory. Despite these efforts, there has been poor involvement of media for public awareness and sensitization. Also, the inconsistency of nutrition traffic light colors which are based on food standard guidelines, lack of consistency between nutrition traffic light colors, the healthy/unhealthy nature of some food products such as olive oil and diet cola and the absence of a comprehensive evaluation plan were among the pitfalls and policy challenges identified. Conclusions: Strengthening the governance through improving collaboration within health and non-health sectors for implementation, more transparency of truthfulness of nutrition traffic labeling initiating with real ingredients, and applying international and local scientific evidence or any further revision of the program is recommended. Also, developing public awareness campaigns and revising school curriculums to improve students’ skills on nutrition label applications should be highly emphasized.Keywords: nutrition labeling, policy analysis, food environment, Iran
Procedia PDF Downloads 19211852 Transcendental Birth of the Column from the Full Jar Expressed at the Notre Dame of Paris and Saint Germain-des-Pres
Authors: Kang Woobang
Abstract:
The base of the column is not only a support but also the embodiment of profound symbolism full of cosmic energy. Finding the full jars from which various energy emanate at the Notre Dame of Paris and Saint-Germain-des-Pres in France, the author was so shocked. As the column is cosmic tree, from the Full Jar full with cosmic energy emerges the cosmic tree composed of shaft and capital.Keywords: full picher or jar, transcendental or supernatural birth from yonggi, yonggimun, yonggissak
Procedia PDF Downloads 41211851 Influence of Scalable Energy-Related Sensor Parameters on Acoustic Localization Accuracy in Wireless Sensor Swarms
Authors: Joyraj Chakraborty, Geoffrey Ottoy, Jean-Pierre Goemaere, Lieven De Strycker
Abstract:
Sensor swarms can be a cost-effectieve and more user-friendly alternative for location based service systems in different application like health-care. To increase the lifetime of such swarm networks, the energy consumption should be scaled to the required localization accuracy. In this paper we have investigated some parameter for energy model that couples localization accuracy to energy-related sensor parameters such as signal length,Bandwidth and sample frequency. The goal is to use the model for the localization of undetermined environmental sounds, by means of wireless acoustic sensors. we first give an overview of TDOA-based localization together with the primary sources of TDOA error (including reverberation effects, Noise). Then we show that in localization, the signal sample rate can be under the Nyquist frequency, provided that enough frequency components remain present in the undersampled signal. The resulting localization error is comparable with that of similar localization systems.Keywords: sensor swarms, localization, wireless sensor swarms, scalable energy
Procedia PDF Downloads 42211850 Performance Analysis of Traffic Classification with Machine Learning
Authors: Htay Htay Yi, Zin May Aye
Abstract:
Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.Keywords: false negative rate, intrusion detection system, machine learning methods, performance
Procedia PDF Downloads 11811849 An Analysis of Innovative Cloud Model as Bridging the Gap between Physical and Virtualized Business Environments: The Customer Perspective
Authors: Asim Majeed, Rehan Bhana, Mak Sharma, Rebecca Goode, Nizam Bolia, Mike Lloyd-Williams
Abstract:
This study aims to investigate and explore the underlying causes of security concerns of customers emerged when WHSmith transformed its physical system to virtualized business model through NetSuite. NetSuite is essentially fully integrated software which helps transforming the physical system to virtualized business model. Modern organisations are moving away from traditional business models to cloud based models and consequently it is expected to have a better, secure and innovative environment for customers. The vital issue of the modern age race is the security when transforming virtualized through cloud based models and designers of interactive systems often misunderstand privacy and even often ignore it, thus causing concerns for users. The content analysis approach is being used to collect the qualitative data from 120 online bloggers including TRUSTPILOT. The results and finding provide useful new insights into the nature and form of security concerns of online users after they have used the WHSmith services offered online through their website. Findings have theoretical as well as practical implications for the successful adoption of cloud computing Business-to-Business model and similar systems.Keywords: innovation, virtualization, cloud computing, organizational flexibility
Procedia PDF Downloads 38411848 Power Line Communication Integrated in a Wireless Power Transfer System: Feasibility of Surveillance Movement
Authors: M. Hemnath, S. Kannan, R. Kiran, K. Thanigaivelu
Abstract:
This paper is based on exploring the possible opportunities and applications using Power Line Communication (PLC) for security and surveillance operations. Various research works are done for introducing PLC into onboard vehicle communication and networking (CAN, LIN etc.) and various international standards have been developed. Wireless power transfer (WPT) is also an emerging technology which is studied and tested for recharging purposes. In this work we present a system which embeds the detection and the response into one which eliminates the need for dedicated network for data transmission. Also we check the feasibility for integrating wireless power transfer system into this proposed security system for transmission of power to detection unit wirelessly from the response unit.Keywords: power line communication, wireless power transfer, surveillance
Procedia PDF Downloads 53511847 Affordances in Boating Performative Practices: The Case of Leisure Boating from the Swedish West Coast
Authors: Neva Leposa
Abstract:
While environmental policy makers are trying to increase pro-environmental behavior among tourists or outdoor recreation users through changing users’ attitudes, the focus of this paper is turned to the importance of so far marginalized – materiality in the users’ practices. The case study of leisure boating in Sweden used in this paper demonstrates how through the change of materiality (i.e. equipment and physical size of the leisure boats) emergent affordances in materially bound practices are transformed, and the boater-boat-sea nexus is redefined. Participatory observation and in-depth interviewing of Swedish West Coast visitors reveal two stories, first one points to the fact that sail boating practice is becoming increasingly motorized and second one describes how leisure boats are becoming increasingly perceived and used as mobile summer houses. Hence, such practice increases energy and matter consumption. This paper describes how that change happens through practice theory and affordance theory, thus points to visibility and the importance of materiality in shaping human nature nexus. Boating practice changes through the change of the materiality of the boats. In particular, energy consumption increases through the change of engagement with the matter. This study puts focus environmental attitudes focused strivings in question, for the fact that it is too individual-centered and lacks contextual understanding of the materially bound practices and may fail in the very thing it is aiming to do - reduce the environmental impacts.Keywords: practice theory, affordance theory, leisure boating, materiality
Procedia PDF Downloads 26911846 The Effect of Taxpayer Political Beliefs on Tax Evasion Behavior: An Empirical Study Applied to Tunisian Case
Authors: Nadia Elouaer
Abstract:
Tax revenue is the main state resource and one of the important variables in tax policy. Nevertheless, this resource is continually decreasing, so it is important to focus on the reasons for this decline. Several studies show that the taxpayer is reluctant to pay taxes, especially in countries at risk or in countries in transition, including Tunisia. This study focuses on the tax evasion behavior of a Tunisian taxpayer under the influence of his political beliefs, as well as the influence of different tax compliance variables. Using a questionnaire, a sample of 500 Tunisian taxpayers is used to examine the relationship between political beliefs and taxpayer affiliations and tax compliance variables, as well as the study of the causal link between political beliefs and fraudulent behavior. The data were examined using correlation, factor, and regression analysis and found a positive and statistically significant relationship between the different tax compliance variables and the tax evasion behavior. There is also a positive and statistically significant relationship between tax evasion and political beliefs and affiliations. The study of the relationship between political beliefs and compliance variables shows that they are closely related. The conclusion is to admit that tax evasion and political beliefs are closely linked, and the government should update its tax policy and modernize its administration in order to strengthen the credibility and disclosure of information in order to restore a relationship of trust between public authorities and the taxpayer.Keywords: fiscal policy, political beliefs, tax evasion, taxpayer behavior
Procedia PDF Downloads 14711845 Energy Saving, Heritage Conserving Renovation Methods in Case of Historical Building Stock
Authors: Viktória Sugár, Zoltán Laczó, András Horkai, Gyula Kiss, Attila Talamon
Abstract:
The majority of the building stock of Budapest inner districts was built around the turn of the 19th and 20th century. Although the structural stability of the buildings is not questioned, as the load bearing structures are in sufficient state, the secondary structures are aged, resulting unsatisfactory energetic state. The renovation of these historical buildings requires special methodology and technology: their ornamented facades and custom-made fenestration cannot be insulated or exchanged with conventional solutions without damaging the heritage values. The present paper aims to introduce and systematize the possible technological solutions for heritage respecting energy retrofit in case of a historical residential building stock. Through case study, the possible energy saving potential is also calculated using multiple renovation scenarios.Keywords: energy efficiency, heritage, historical building, renovation
Procedia PDF Downloads 29511844 Digital Twin for Retail Store Security
Authors: Rishi Agarwal
Abstract:
Digital twins are emerging as a strong technology used to imitate and monitor physical objects digitally in real time across sectors. It is not only dealing with the digital space, but it is also actuating responses in the physical space in response to the digital space processing like storage, modeling, learning, simulation, and prediction. This paper explores the application of digital twins for enhancing physical security in retail stores. The retail sector still relies on outdated physical security practices like manual monitoring and metal detectors, which are insufficient for modern needs. There is a lack of real-time data and system integration, leading to ineffective emergency response and preventative measures. As retail automation increases, new digital frameworks must control safety without human intervention. To address this, the paper proposes implementing an intelligent digital twin framework. This collects diverse data streams from in-store sensors, surveillance, external sources, and customer devices and then Advanced analytics and simulations enable real-time monitoring, incident prediction, automated emergency procedures, and stakeholder coordination. Overall, the digital twin improves physical security through automation, adaptability, and comprehensive data sharing. The paper also analyzes the pros and cons of implementation of this technology through an Emerging Technology Analysis Canvas that analyzes different aspects of this technology through both narrow and wide lenses to help decision makers in their decision of implementing this technology. On a broader scale, this showcases the value of digital twins in transforming legacy systems across sectors and how data sharing can create a safer world for both retail store customers and owners.Keywords: digital twin, retail store safety, digital twin in retail, digital twin for physical safety
Procedia PDF Downloads 7211843 Strategy of Balancing in Russian Energy Diplomacy toward Middle East
Authors: Davood Karimipour
Abstract:
Since long ago, Russia has been one of the most influential actors in regional equations in South West Asia. The geographic affinity of its vital interests with Western Asia has caused Moscow to have a high sensitivity to the balance of power in the Middle East, as its role in the Syrian crisis clearly demonstrated the importance. In recent years, Moscow has tried to use the energy diplomacy tool in maintaining the balance of power between the major powers in the region. The paper, based on the qualitative case study method, investigates how Russia’s energy diplomacy plays a role in the balance of regional forces in the Middle East, studying the country’s conduct towards Iran, Saudi Arabia, Turkey, and Israel. The hypothesis presented that Russia, using energy tools, is trying to push the regional powers toward cooperation in order to increase the influence in the region, increase power in global markets, and controlling the US to restore power balance in the region. Its cooperation in the Iranian gas industry, the country’s relations with Saudis in the framework of OPEC, cooperation with the Turkish Kurds and the presence in the Israeli gas industry are an example of these Russian energy diplomacy initiatives in West Asia, which is the common point of the Moscow approach to South West Asia.Keywords: Russia, balance of power, energy diplomacy, Middle East
Procedia PDF Downloads 16511842 Heat Transfer and Friction Factor Study for Triangular Duct Solar Air Heater Having Discrete V-Shaped Ribs
Authors: Varun Goel
Abstract:
Solar energy is a good option among renewable energy resources due to its easy availability and abundance. The simplest and most efficient way to utilize solar energy is to convert it into thermal energy and this can be done with the help of solar collectors. The thermal performance of such collectors is poor due to less heat transfer from the collector surface to air. In this work, experimental investigations of single pass solar air heater having triangular duct and provided with roughness element on the underside of the absorber plate. V-shaped ribs are used for investigation having three different values of relative roughness pitch (p/e) ranges from 4-16 for a fixed value of angle of attack (α), relative roughness height (e/Dh) and a relative gap distance (d/x) values are 60°, 0.044 and 0.60 respectively. Result shows that considerable augmentation in heat transfer has been obtained by providing roughness.Keywords: artificial roughness, solar air heater, triangular duct, V-shaped ribs
Procedia PDF Downloads 45211841 Trade Policy Incentives and Economic Growth in Nigeria
Authors: Emmanuel Dele Balogun
Abstract:
This paper analyzes, using descriptive statistics and econometrics data which span the period 1981 to 2014 to gauge the effects of trade policy incentives on economic growth in Nigeria. It argues that the provided incentives penalize economic growth during pre-trade liberalization eras, but stimulated a rapid increase in total factor productivity during the post-liberalization period of 2000 to 2014. The trend analysis shows that Nigeria maintained high tariff walls in economic regulation eras which became low in post liberalization era. The protections were in favor of infant industries, which were mainly appendages of multinationals but against imports of competing food and finished consumer products. The trade openness index confirms the undue exposure of Nigeria’s economy to the vagaries of international market shocks; while banking sector recapitalization and new listing of telecommunications companies deepened the financial markets in post-liberalization era. The structure of economic incentives was biased in favor of construction, trade and services, but against the real sector despite protectionist policies. Total Factor Productivity (TFP) estimates show that the Nigerian economy suffered stagnation in pre-liberalization eras, but experienced rapid growth rates in post-liberalization eras. The regression results relating trade policy incentives to TFP growth rate yielded a significant but negative intercept suggesting that a non-interventionist policy could be detrimental to economic progress, while protective tariff which limits imports of competing products could spur productivity gains in domestic import substitutes beyond factor growth with market liberalization. The main constraint to the effectiveness of trade policy incentives is the failure of benefiting industries to leverage on the domestic factor endowments of the nation. This paper concludes that there is the need to review the current economic transformation strategies urgently with a view to provide policymakers with a better understanding of the most viable options that could make for rapid success.Keywords: economic growth, macroeconomic incentives, total factor productivity, trade policies
Procedia PDF Downloads 32211840 Lightweight and Seamless Distributed Scheme for the Smart Home
Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro
Abstract:
Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.Keywords: authentication, key-session, security, wireless sensors
Procedia PDF Downloads 31811839 Design and Optimization of Sustainable Buildings by Combined Cooling, Heating and Power System (CCHP) Based on Exergy Analysis
Authors: Saeed Karimi, Ali Behbahaninia
Abstract:
In this study, the design and optimization of combined cooling, heating, and power system (CCHP) for a sustainable building are dealt with. Sustainable buildings are environmentally responsible and help us to save energy also reducing waste, pollution and environmental degradation. CCHP systems are widely used to save energy sources. In these systems, electricity, cooling, and heating are generating using just one primary energy source. The selection of the size of components based on the maximum demand of users will lead to an increase in the total cost of energy and equipment for the building complex. For this purpose, a system was designed in which the prime mover (gas turbine), heat recovery boiler, and absorption chiller are lower than the needed maximum. The difference in months with peak consumption is supplied with the help of electrical absorption chiller and auxiliary boiler (and the national electricity network). In this study, the optimum capacities of each of the equipment are determined based on Thermo economic method, in a way that the annual capital cost and energy consumption will be the lowest. The design was done for a gas turbine prime mover, and finally, the optimum designs were investigated using exergy analysis and were compared with a traditional energy supply system.Keywords: sustainable building, CCHP, energy optimization, gas turbine, exergy, thermo-economic
Procedia PDF Downloads 9311838 Construction Sustainability Improvement through Using Recycled Aggregates in Concrete Production
Authors: Zhiqiang Zhu, Khalegh Barati, Xuesong Shen
Abstract:
Due to the energy consumption caused by the construction industry, the public is paying more and more attention to the sustainability of the buildings. With the advancement of research on recycled aggregates, it has become possible to replace natural aggregates with recycled aggregates and to achieve a reduction in energy consumption of materials during construction. The purpose of this paper is to quantitatively compare the emergy consumption of natural aggregate concrete (NAC) and recycled aggregate concrete (RAC). To do so, the emergy analysis method is adopted. Using this technique, it can effectively analyze different forms of energy and substance. The main analysis object is the direct and indirect emergy consumption of the stages in concrete production. Therefore, for indirect energy, consumption of production machinery and transportation vehicle also need to be considered. Finally, the emergy values required to produce the two concrete types are compared to analyze whether the RAC can reduce emergy consumption.Keywords: sustainable construction, NAC, RAC, emergy, concrete
Procedia PDF Downloads 15011837 Nanotechnolgy for Energy Harvesting Applications
Authors: Eiman Nour
Abstract:
The rising interest in harvesting power is because of the capabilities application of expanding self-powered systems based on nanostructures. Using renewable and self-powered sources is necessary for the growth of green electronics and could be of the capability to wireless sensor networks. The ambient mechanical power is among the ample sources for various power harvesting device configurations that are published. In this work, we design and fabricate a paper-based nanogenerator (NG) utilizing piezoelectric zinc oxide (ZnO) nanowires (NWs) grown hydrothermally on a paper substrate. The fabricated NG can harvest ambient mechanical energy from various kinds of human motions, such as handwriting. The fabricated NG from a single ZnO NWs/PVDF-TrFE NG has been used firstly as handwriting-driven NG. The mechanical pressure applied on the paper platform while handwriting is harvested by the NG to deliver electrical energy; depending on the mode of handwriting, a maximum harvested voltage of 4.8 V was obtained.Keywords: nanostructure, zinc oxide, nanogenerator, energy harvesting
Procedia PDF Downloads 6311836 Energy Absorption Capacity of Aluminium Foam Manufactured by Kelvin Model Loaded Under Different Biaxial Combined Compression-Torsion Conditions
Authors: H. Solomon, A. Abdul-Latif, R. Baleh, I. Deiab, K. Khanafer
Abstract:
Aluminum foams were developed and tested due to their high energy absorption abilities for multifunctional applications. The aim of this research work was to investigate experimentally the effect of quasi-static biaxial loading complexity (combined compression-torsion) on the energy absorption capacity of highly uniform architecture open-cell aluminum foam manufactured by kelvin cell model. The two generated aluminum foams have 80% and 85% porosities, spherical-shaped pores having 11mm in diameter. These foams were tested by means of several square-section specimens. A patented rig called ACTP (Absorption par Compression-Torsion Plastique), was used to investigate the foam response under quasi-static complex loading paths having different torsional components (i.e., 0°, 37° and 53°). The main mechanical responses of the aluminum foams were studied under simple, intermediate and severe loading conditions. In fact, the key responses to be examined were stress plateau and energy absorption capacity of the two foams with respect to loading complexity. It was concluded that the higher the loading complexity and the higher the relative density, the greater the energy absorption capacity of the foam. The highest energy absorption was thus recorded under the most complicated loading path (i.e., biaxial-53°) for the denser foam (i.e., 80% porosity).Keywords: open-cell aluminum foams, biaxial loading complexity, foams porosity, energy absorption capacity, characterization
Procedia PDF Downloads 13011835 Analyzing the Results of Buildings Energy Audit by Using Grey Set Theory
Authors: Tooraj Karimi, Mohammadreza Sadeghi Moghadam
Abstract:
Grey set theory has the advantage of using fewer data to analyze many factors, and it is therefore more appropriate for system study rather than traditional statistical regression which require massive data, normal distribution in the data and few variant factors. So, in this paper grey clustering and entropy of coefficient vector of grey evaluations are used to analyze energy consumption in buildings of the Oil Ministry in Tehran. In fact, this article intends to analyze the results of energy audit reports and defines most favorable characteristics of system, which is energy consumption of buildings, and most favorable factors affecting these characteristics in order to modify and improve them. According to the results of the model, ‘the real Building Load Coefficient’ has been selected as the most important system characteristic and ‘uncontrolled area of the building’ has been diagnosed as the most favorable factor which has the greatest effect on energy consumption of building. Grey clustering in this study has been used for two purposes: First, all the variables of building relate to energy audit cluster in two main groups of indicators and the number of variables is reduced. Second, grey clustering with variable weights has been used to classify all buildings in three categories named ‘no standard deviation’, ‘low standard deviation’ and ‘non- standard’. Entropy of coefficient vector of Grey evaluations is calculated to investigate greyness of results. It shows that among the 38 buildings surveyed in terms of energy consumption, 3 cases are in standard group, 24 cases are in ‘low standard deviation’ group and 11 buildings are completely non-standard. In addition, clustering greyness of 13 buildings is less than 0.5 and average uncertainly of clustering results is 66%.Keywords: energy audit, grey set theory, grey incidence matrixes, grey clustering, Iran oil ministry
Procedia PDF Downloads 37311834 Simulation, Optimization, and Analysis Approach of Microgrid Systems
Authors: Saqib Ali
Abstract:
Sources are classified into two depending upon the factor of reviving. These sources, which cannot be revived into their original shape once they are consumed, are considered as nonrenewable energy resources, i.e., (coal, fuel) Moreover, those energy resources which are revivable to the original condition even after being consumed are known as renewable energy resources, i.e., (wind, solar, hydel) Renewable energy is a cost-effective way to generate clean and green electrical energy Now a day’s majority of the countries are paying heed to energy generation from RES Pakistan is mostly relying on conventional energy resources which are mostly nonrenewable in nature coal, fuel is one of the major resources, and with the advent of time their prices are increasing on the other hand RES have great potential in the country with the deployment of RES greater reliability and an effective power system can be obtained In this thesis, a similar concept is being used and a hybrid power system is proposed which is composed of intermixing of renewable and nonrenewable sources The Source side is composed of solar, wind, fuel cells which will be used in an optimal manner to serve load The goal is to provide an economical, reliable, uninterruptable power supply. This is achieved by optimal controller (PI, PD, PID, FOPID) Optimization techniques are applied to the controllers to achieve the desired results. Advanced algorithms (Particle swarm optimization, Flower Pollination Algorithm) will be used to extract the desired output from the controller Detailed comparison in the form of tables and results will be provided, which will highlight the efficiency of the proposed system.Keywords: distributed generation, demand-side management, hybrid power system, micro grid, renewable energy resources, supply-side management
Procedia PDF Downloads 9711833 Modelling and Simulation of Biomass Pyrolysis
Authors: P. Ahuja, K. S. S. Sai Krishna
Abstract:
There is a concern over the energy shortage in the modern societies as it is one of the primary necessities. Renewable energy, mainly biomass, is found to be one feasible solution as it is inexhaustible and clean energy source all over the world. Out of various methods, thermo chemical conversion is considered to be the most common and convenient method to extract energy from biomass. The thermo-chemical methods that are employed are gasification, liquefaction and combustion. On gasification biomass yields biogas, on liquefaction biomass yields bio-oil and on combustion biomass yields bio-char. Any attempt to biomass gasification, liquefaction or combustion calls for a good understanding of biomass pyrolysis. So, Irrespective of the method used the first step towards the thermo-chemical treatment of biomass is pyrolysis. Pyrolysis mainly converts the solid mass into liquid with gas and residual char as the byproducts. Liquid is used for the production of heat, power and many other chemicals whereas the gas and char can be used as fuels to generate heat.Keywords: biomass, fluidisation, pyrolysis, simulation
Procedia PDF Downloads 34211832 4P-Model of Information Terrorism
Authors: Nataliya Venelinova
Abstract:
The paper proposes a new interdisciplinary model of reconsidering the role of mass communication effects by coverage of terrorism. The idea of 4P model is based on the synergy, created by the information strategy of threat, predominantly used by terrorist groups, the effects of mediating the symbolic action of the terrorist attacks or the taking of responsibility of any attacks, and the reshaped public perception for security after the attacks being mass communicated. The paper defines the mass communication cycle of terrorism, which leads not only to re-agenda setting of the societies, but also spirally amplifying the effect of propagating fears by over-informing on terrorism attacks. This finally results in the outlining of the so called 4P-model of information terrorism: mass propaganda, panic, paranoia and pandemic.Keywords: information terrorism, mass communication cycle, public perception, security
Procedia PDF Downloads 173