Search results for: Energy security
10150 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia
Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki
Abstract:
Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering
Procedia PDF Downloads 12510149 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment
Authors: Dengpan Wu, Dan Liu
Abstract:
In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.Keywords: cloud security, memory isolation, xen, virtual machine
Procedia PDF Downloads 36510148 Beyond the Economics of Food: Household Food Strategies in Clusters of the Umkhanyakude District Municipality
Authors: Mduduzi Nhlozi
Abstract:
Food insecurity continues to persist in rural areas of South Africa today. A number of factors can be attributed to this including declining rural economies, rising unemployment, natural disasters such as drought as well as shifting cultural norms, values, traditions and beliefs. This paper explores mechanisms used by rural households to achieve food security in the midst of various threats and risks to their livelihoods. The study used semi-structured questionnaire to collect information on lived experiences of households in their quest to access and ensure availability of food. The paper finds that households use a number of food strategies namely economy-related, culture-related and rite-of-passage related strategies to achieve food security. The thrust of argument in the paper is that there is a need for food security studies to move beyond the orthodox, economic analytic framework, towards new institutional economics, focusing on local governance and socio-cultural systems supporting households to achieve food security. It advocates for localised food security plans to be developed by local municipalities to improve food security status for rural households.Keywords: household, food insecurity, food strategies, new institutional economics, umkhanyakude
Procedia PDF Downloads 8710147 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon
Authors: Jessy Abouarab
Abstract:
For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women
Procedia PDF Downloads 11310146 Food Security Indicators in Deltaic and Coastal Research: A Scoping Review
Authors: Sylvia Szabo, Thilini Navaratne, Indrajit Pal, Seree Park
Abstract:
Deltaic and coastal regions are often strategically important both from local and regional perspectives. While deltas are known to be bread baskets of the world, delta inhabitants often face the risk of food and nutritional insecurity. These risks are highly exacerbated by the impacts of climate and environmental change. While numerous regional studies examined the prevalence and the determinants of food security in specific delta and coastal regions, there is still a lack of a systematic analysis of the most widely used scientific food security indicators. In order to fill this gap, a systematic review was carried out using Covidence, a Cochrane-adopted systematic review processing software. Papers included in the review were selected from the SCOPUS, Thomson Reuters Web of Science, Science Direct, ProQuest, and Google Scholar databases. Both scientific papers and grey literature (e.g., reports by international organizations) were considered. The results were analyzed by food security components (access, availability, quality, and strategy) and by world regions. Suggestions for further food security, nutrition, and health research, as well as policy-related implications, are also discussed.Keywords: delta regions, coastal, food security, indicators, systematic review
Procedia PDF Downloads 21010145 The Eco-Efficient Construction: A Review of Embodied Energy in Building Materials
Authors: Francesca Scalisi, Cesare Sposito
Abstract:
The building construction industry consumes a large amount of resources and energy, both during construction (embodied energy) and during the operational phase (operating energy). This paper presents a review of the literature on low carbon and low embodied energy materials in buildings. The embodied energy comprises the energy consumed during the extraction, processing, transportation, construction, and demolition of building materials. While designing a nearly zero energy building, it is necessary to choose and use materials, components, and technologies that allow to reduce the consumption of energy and also to reduce the emissions in the atmosphere during all the Life Cycle Assessment phases. The appropriate choice of building materials can contribute decisively to reduce the energy consumption of the building sector. The increasing worries for the environmental impact of construction materials are witnessed by a lot of studies. The mentioned worries have brought again the attention towards natural materials. The use of more sustainable construction materials and construction techniques represent a major contribution to the eco-efficiency of the construction industry and thus to a more sustainable development.Keywords: embodied energy, embodied carbon, life cycle assessment, architecture, sustainability, material construction
Procedia PDF Downloads 30010144 Energy Trends in Rural South Africa: A Case Study of the Mnweni Rural Community in the Province of Kwazulu-Natal
Authors: Noel Chellan
Abstract:
Energy is the life-blood of development. All human societies have been and still are dependent on energy – some societies more than others. With regard to energy in South Africa, previous policies of the apartheid regime neglected the energy needs of poor black communities in general – and rural communities in particular. Since South Africa’s first democratic elections in 1994 – whilst millions of South African households have received electricity from the national electricity grid, there are still many rural communities that are still experiencing challenges in relation to both electricity deprivation as well as provision. This paper looks at the energy-mix of the Mnweni rural community in South Africa and argues that understanding energy is key to understanding the nature and forms of development of any community or country, for that matter. The paper engages with the energy trends in the rural community of Mnweni from the days of apartheid until 2021. It also looks at agricultural practises from an energy perspective. Such an energy perspective will enable one to assess the pace and scale of development in rural Mnweni.Keywords: rural, energy, development, apartheid
Procedia PDF Downloads 21410143 DG Power Plants Placement and Evaluation of its Effect on Improving Voltage Security Margin in Radial Distribution Networks
Authors: Atabak Faramarzpour, Mohsen Mohammadian
Abstract:
In this article, we introduce the stability of power system voltage and state DG power plants placement and its effect on improving voltage security margin in radial distribution networks. For this purpose, first, important definitions in voltage stability area such as small and big voltage disturbances, instability, and voltage collapse, and voltage security definitions are stated. Then, according to voltage collapse time, voltage stability is classified and each one's characteristics are stated.Keywords: DG power plants, evaluation, voltage security, radial distribution networks
Procedia PDF Downloads 62910142 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme
Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara
Abstract:
This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme
Procedia PDF Downloads 44110141 Evaluation of Research in the Field of Energy Efficiency and MCA Methods Using Publications Databases
Authors: Juan Sepúlveda
Abstract:
Energy is a fundamental component in sustainability, the access and use of this resource is related with economic growth, social improvements, and environmental impacts. In this sense, energy efficiency has been studied as a factor that enhances the positive impacts of energy in communities; however, the implementation of efficiency requires strong policy and strategies that usually rely on individual measures focused in independent dimensions. In this paper, the problem of energy efficiency as a multi-objective problem is studied, using scientometric analysis to discover trends and patterns that allow to identify the main variables and study approximations related with a further development of models to integrate energy efficiency and MCA into policy making for small communities.Keywords: energy efficiency, MCA, scientometric, trends
Procedia PDF Downloads 33910140 Advantages and Disadvantages of Hydroelectric Energy
Authors: Esther Ushike Akashie
Abstract:
No matter who you are, where you are from and irrespective of age and gender, there is a universal need for power and energy. Every year, this need grows even more urgent the more scientific and technological inventions advance. Due to this fact, we find that majority of the research related to energy and power has been focused on finding new and innovative ways to produce power. Furthermore, we observe that because of the environmental state of our world today and the impact of climate change, one of the most explored routes of study has been the use of renewable energies. In this paper, we will be looking at one of the oldest forms of renewable energy, hydroelectric energy. First off, an overview of its history, sources, technical aspects, and applications will be evaluated. After which, we will then proceed to understand the main benefits and drawbacks of this form of renewable energy and offer insights on how it can be better utilized in our world today.Keywords: hydropower, hydroelectric energy, advantages, disadvantages
Procedia PDF Downloads 11110139 Overview of Smart Grid Applications in Turkey
Authors: Onur Elma, Giray E. Kıral, Ugur S. Selamoğuları, Mehmet Uzunoğlu, Bulent Vural
Abstract:
Electrical energy has become indispensable for people's lives and with rapidly developing technology and continuously changing living standards the need for the electrical energy has been on the rise. Therefore, both energy generation and efficient use of energy are very important topics. Smart grid concept has been introduced to provide monitoring, energy efficiency, reliability and energy quality. Under smart grid concept, smart homes, which can be considered as key component in smart grid operation, have appeared as another research area. In this study, first, smart grid research in the world will be reviewed. Then, overview of smart grid applications in Turkey will be given.Keywords: energy efficiency, smart grids, smart home, applications
Procedia PDF Downloads 46910138 Uncertainty in Building Energy Performance Analysis at Different Stages of the Building’s Lifecycle
Authors: Elham Delzendeh, Song Wu, Mustafa Al-Adhami, Rima Alaaeddine
Abstract:
Over the last 15 years, prediction of energy consumption has become a common practice and necessity at different stages of the building’s lifecycle, particularly, at the design and post-occupancy stages for planning and maintenance purposes. This is due to the ever-growing response of governments to address sustainability and reduction of CO₂ emission in the building sector. However, there is a level of uncertainty in the estimation of energy consumption in buildings. The accuracy of energy consumption predictions is directly related to the precision of the initial inputs used in the energy assessment process. In this study, multiple cases of large non-residential buildings at design, construction, and post-occupancy stages are investigated. The energy consumption process and inputs, and the actual and predicted energy consumption of the cases are analysed. The findings of this study have pointed out and evidenced various parameters that cause uncertainty in the prediction of energy consumption in buildings such as modelling, location data, and occupant behaviour. In addition, unavailability and insufficiency of energy-consumption-related inputs at different stages of the building’s lifecycle are classified and categorized. Understanding the roots of uncertainty in building energy analysis will help energy modellers and energy simulation software developers reach more accurate energy consumption predictions in buildings.Keywords: building lifecycle, efficiency, energy analysis, energy performance, uncertainty
Procedia PDF Downloads 10510137 Feasibility Study of the Quadcopter Propeller Vibrations for the Energy Production
Authors: Nneka Osuchukwu, Leonid Shpanin
Abstract:
The concept of converting the kinetic energy of quadcopter propellers into electrical energy is considered in this contribution following the feasibility study of the propeller vibrations, theoretical energy conversion, and simulation techniques. Analysis of the propeller vibration performance is presented via graphical representation of calculated and simulated parameters, in order to demonstrate the possibility of recovering the harvested energy from the propeller vibrations of the quadcopter while the quadcopter is in operation. Consideration of using piezoelectric materials in such concept, converting the mechanical energy of the propeller into the electrical energy, is given. Photographic evidence of the propeller in operation is presented and discussed together with experimental results to validate the theoretical concept.Keywords: energy harvesting, piezoelectric material, propeller vibration, unmanned aerial vehicle
Procedia PDF Downloads 44410136 Status Check: Journey of India’s Energy Sustainability through Renewable Sources
Authors: Santosh Ghosh, Vinod Kumar Yadav, Vivekananda Mukherjee, Ishta Garg
Abstract:
India, akin to the rest of the world today, is grappling with balancing act between ever increasing demand for energy and alarmingly high level of green house gas emission, which is inevitable corollary of energy production in the conventional way. Researchers and energy policy makers around the world are now focusing on renewable energy (RE) technologies to find solution to this crisis. In India various agencies at both national and state level has been set up and bestowed with responsibility of development of renewable energy technologies, viz. Ministry of New Renewable Energy (MNRE), National Vidyut Vyapar Nigam Ltd. (NVVNL), Indian Renewable Energy Development Agency Limited (IREDA) and RE Development Agencies in respective states. In the present work, the preparedness of India in terms of forming institutional and policy frame work briefly discussed. Status of implementation of RE technologies state wise and of India as a whole, critically reviewed.Keywords: energy policy, energy sustainability, renewable energy, IREDA
Procedia PDF Downloads 59810135 Night Patrolling Robot for Suspicious Activity Detection
Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe
Abstract:
Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.Keywords: night patrolling, node MCU, server, security
Procedia PDF Downloads 10910134 Cyber Security in Nigeria: A Collaboration between Communities and Professionals
Authors: Alese Boniface K., Adu Michael K., Owa Victor K.
Abstract:
Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.Keywords: security, cybercrime, internet, government, stakeholders, partnerships
Procedia PDF Downloads 50010133 Survey of Access Controls in Cloud Computing
Authors: Monirah Alkathiry, Hanan Aljarwan
Abstract:
Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.Keywords: access controls, cloud computing, confidentiality, identity and access management
Procedia PDF Downloads 10210132 Enhanced Visual Sharing Method for Medical Image Security
Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar
Abstract:
In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.Keywords: information security, medical images, cryptography, visual sharing
Procedia PDF Downloads 37610131 The Effect of Maritime Security on National Development in Nigeria
Authors: Adegboyega Adedolapo Ola
Abstract:
Globally, a country’s maritime security has a significant impact on its national development because it serves as a major source of a commercial contact and food supply. However, the country has been faced with a number of problems, such as piracy, kidnapping, illegal bunkering and oil theft. As such, the study examined the contribution and the relationship between maritime security and Nigeria’s development, as well as the prospects and challenges of maritime security in Nigeria. The study utilized a questionnaire and focused group discussion/interview as instruments for data collection. The method of analysis employed in the study is descriptive. A total of Three Hundred and Ninety (390) respondents were randomly selected. The result of the study showed that maritime security contributes to national development in Nigeria by guaranteeing food security in Nigeria, creating employment opportunities as well as increasing the Gross Domestic Product (GDP) of the economy. It was also found that maritime security is yet to provide sufficient support for national development in Nigeria. It is further established that it has prospects for development through the creation of employment opportunities, increase in foreign earnings, and fostering improved living standards for citizens. The study concluded that the high level of corruption, piracy and kidnapping, lack of political will by the government and the porosity of the Nigerian borders are serious obstacles, among others. In attempting to solve the problem of piracy and kidnapping in Nigerian maritime, to contribute to National development, it is primordial to address the cancer of corruption, poverty, and youth unemployment. In view of this, the study recommends: among other things, that the maritime industry should be well secured by removing its constraints/bottlenecks so as to enhance its contributions to national development.Keywords: maritime security, national development, terrorism, piracy
Procedia PDF Downloads 4810130 The Environmental Challenges of Energy Generation and Usage in Nigeria
Authors: Aliyu Mohammed Lawal, Dahiru Ya'u Gital
Abstract:
The problems placed on the environment as a result of energy generation and usage in Nigeria are: Potential damage to the environment health by Co, Co2, Sox and Nox effluent gas emissions and global warming. For instance in the year 2004 in Nigeria energy consumption was 58% oil and 34% natural gas but about 94 million metric tons of Co2 was emitted out of which 64% came from fossil fuels while about 35% came from fuel wood. The findings from this research on how to alleviate these problems are that long term sustainable development solutions should be enhanced globally; energy should be used more rationally renewable energy resources should be exploited and the existing emissions should be controlled to tolerate limits because the increase in energy demand in Nigeria places enormous strain on current energy facilities.Keywords: energy generation, environmental health, effluent gas emission, global warming, fossil fuel
Procedia PDF Downloads 42510129 The Analysis of Solar Radiation Exergy in Hakkari
Authors: Hasan Yildizhan
Abstract:
According to the Solar Energy Potential Atlas (GEPA) prepared by Turkish Ministry of Energy, Hakkari is ranked first in terms of sunshine duration and it is ranked eighth in terms of solar radiation energy. Accordingly, Hakkari has a rich potential of investment with regard to solar radiation energy. The part of the solar radiation energy arriving on the surface of the earth which is transposable to useful work is determined by means of exergy analysis. In this study, the radiation exergy values for Hakkari have been calculated and evaluated by making use of the monthly average solar radiation energy and temperature values measured by General Directorate of State Meteorology.Keywords: solar radiation exergy, Hakkari, solar energy potential, Turkey
Procedia PDF Downloads 68210128 Can Career Advancement and Job Security Act as Collaterals for Commitment? Evidence from the Hotel Industry of Malaysia
Authors: Aizzat Md. Nasurdin, Noor Hazlina Ahmad, Cheng Ling Tan
Abstract:
This study aims to examine the role of career advancement and job security as predictors of employee commitment to their organization. Data was collected from 580 frontline employees attached to two departments of 29 luxury hotels in Peninsular Malaysia. Statistical results using Partial Least Squares technique provided support for the proposed hypotheses. In view of the findings, theoretical and practical implications are discussed.Keywords: organizational commitment, career advancement, job security, frontline employees, luxury hotels, Malaysia
Procedia PDF Downloads 35610127 Scenarios of Societal Security and Business Continuity Cycles
Authors: Jiří F. Urbánek, Jiří Barta
Abstract:
Societal security, continuity scenarios, and methodological cycling approach understands in this article. Namely, societal security organizational challenges ask implementation of international standards BS 25999-2 and global ISO 22300 which is a family of standards for business continuity management system. Efficient global organization system is distinguished of high entity´s complexity, connectivity, and interoperability, having not only cooperative relations in a fact. Competing business have numerous participating ´enemies´, which are in apparent or hidden opponent and antagonistic roles with prosperous organization systems, resulting to a crisis scene or even to a battle theater. Organization business continuity scenarios are necessary for such ´a play´ preparedness, planning, management, and overmastering in real environments.Keywords: business continuity, societal security, crisis scenarios cycles, interoperability
Procedia PDF Downloads 35610126 The Impact of Water Reservoirs on Biodiversity and Food Security and the Creation of Adaptation Mechanisms
Authors: Inom S. Normatov, Abulqosim Muminov, Parviz I. Normatov
Abstract:
Problems of food security and the preservation of reserved zones in the region of Central Asia under the conditions of the climate change induced by the placement and construction of large reservoirs are considered. The criteria for the optimum placement and construction of reservoirs that entail the minimum impact on the environment are established. The need for the accounting of climatic parameters is shown by the calculation of the water quantity required for the irrigation of agricultural lands.Keywords: adaptation, biodiversity, food security, water reservoir, risk
Procedia PDF Downloads 22610125 Detentions in Kashmir: A Review of Impact of J&K PSA, 1978
Authors: Naseer Ahmad Bhat
Abstract:
Jammu and Kashmir Public Safety Act, 1978 provides for administrative detention in Jammu and Kashmir, a disputed region between India & Pakistan, since 1947. This paper shall critically analyse the working of PSA (Public Safety Act) in this J&K since 1978, since its inception. Detentions under this Act traverse between the security of the State and Liberty of citizens but over decades, has this Act served its purpose in Kashmir or not shall be analysed in this paper. J&K PSA is used to detain political workers, Over-Ground Workers and Stone Pelters who pose a direct threat to the ‘security of the State.’ Detentions under J&K PSA are a good measure in the hands of Security agencies to bring calm during periods of turmoil, but it has socio-economic consequences for detainees as well as families. This paper shall highlight the Socio-Economic impact of detentions under J&K PSA on individuals and families.Keywords: detentions, Kashmir, public safety act, liberty, security
Procedia PDF Downloads 19710124 Evaluating the Energy Efficiency Measures for an Educational Building in a Hot-Humid Region
Authors: Rafia Akbar
Abstract:
This paper assesses different Energy Efficiency Measures (EEMs) and their impact on energy consumption and carbon footprint of an educational building located in Islamabad. A base case was first developed in accordance with typical construction practices in Pakistan. Several EEMs were separately applied to the baseline design to quantify their impact on operational energy reduction of the building and the resultant carbon emissions. Results indicate that by applying these measures, there is a potential to reduce energy consumption up to 49% as compared to the base case. It was observed that energy efficient ceiling fans and lights, insulation of the walls and roof and an efficient air conditioning system for the building can provide significant energy savings. The results further indicate that the initial investment cost of these energy efficiency measures can be recovered within 6 to 7 years of building’s service life.Keywords: CO2 savings, educational building, energy efficiency measures, payback period
Procedia PDF Downloads 13310123 Assessment of Energy Use and Energy Efficiency in Two Portuguese Slaughterhouses
Authors: M. Feliciano, F. Rodrigues, A. Gonçalves, J. M. R. C. A. Santos, V. Leite
Abstract:
With the objective of characterizing the profile and performance of energy use by slaughterhouses, surveys and audits were performed in two different facilities located in the northeastern region of Portugal. Energy consumption from multiple energy sources was assessed monthly, along with production and costs, for the same reference year. Gathered data was analyzed to identify and quantify the main consuming processes and to estimate energy efficiency indicators for benchmarking purposes. Main results show differences between the two slaughterhouses concerning energy sources, consumption by source and sector, and global energy efficiency. Electricity is the most used source in both slaughterhouses with a contribution of around 50%, being essentially used for meat processing and refrigeration. Natural gas, in slaughterhouse A, and pellets, in slaughterhouse B, used for heating water take the second place, with a mean contribution of about 45%. On average, a 62 kgoe/t specific energy consumption (SEC) was found, although with differences between slaughterhouses. A prominent negative correlation between SEC and carcass production was found specially in slaughterhouse A. Estimated Specific Energy Cost and Greenhouse Gases Intensity (GHGI) show mean values of about 50 €/t and 1.8 tCO2e/toe, respectively. Main results show that there is a significant margin for improving energy efficiency and therefore lowering costs in this type of non-energy intensive industries.Keywords: meat industry, energy intensity, energy efficiency, GHG emissions
Procedia PDF Downloads 33510122 Solar-Powered Smart Irrigation System as an Adaptation Strategy under Climate Change: A Case Study to Develop Medicinal Security Based on Ancestral Knowledge
Authors: Luisa Cabezas, Karol Leal, Harold Mendoza, Fabio Trochez, Angel Lozada
Abstract:
According to the 2030 Agenda for Sustainable Development Goals (SDG) in which equal importance is given to economic, social, and environmental dimensions where the equality and dignity of each human person is placed at the center of discussion, changing the development concept for one with more responsibility with the environment. It can be found that the energy and food systems are deeply entangled, and they are transversal to the 17 proposed SDG. In this order of ideas, a research project is carried out at Unidad Central del Valle del Cauca (UCEVA) with these two systems in mind, on one hand the energy transition and, on the other hand the transformation of agri-food systems. This project it could be achieved by automation and control irrigation system of medicinal, aromatic, and condimentary plants (MACP) area within the UCEVA Agroecological Farm and located in rural area of Tulua municipality (Valle del Cauca Department, Colombia). This system have allowed to stablish a remote monitoring of MACP area, including MACP moisture measurement, and execute the required system actions. In addition, the electrical system of irrigation control system is powered by a scalable photovoltaic solar energy system based on its specifications. Thus, the developed system automates and control de irrigation system, which is energetically self-sustainable and allows to satisfy the MACP area requirements. Is important to highlight that at MACP area, several medicinal, aromatic, and condimentary plants species are preserved to become primary sources for the pharmaceutical industry and, in many occasions, the only medicines for many communities. Therefore, preserve medicinal plants area would generates medicinal security and preserve cultural heritage as these plants are part of ancestral knowledge that penetrate academic and research communities at UCEVA campus to other society sectors.Keywords: ancestral knowledge, climate change, medicinal plants, solar energy
Procedia PDF Downloads 19610121 Sustaining Efficiency in Electricity Distribution to Enhance Effective Human Security for the Vulnerable People in Ghana
Authors: Anthony Nyamekeh-Armah Adjei, Toshiaki Aoki
Abstract:
The unreliable and poor efficiency of electricity distribution leading to frequent power outages and high losses are the major challenge facing the power distribution sector in Ghana. Distribution system routes electricity from the power generating station at a higher voltage through the transmission grid and steps it down through the low voltage lines to end users. Approximately all electricity problems and disturbances that have increased the call for renewable and sustainable energy in recent years have their roots in the distribution system. Therefore, sustaining electricity distribution efficiency can potentially contribute to the reserve of natural energy resources use in power generation, reducing greenhouse gas emission (GHG), decreasing tariffs for consumers and effective human security. Human Security is a people-centered approach where individual human being is the principal object of concern, focuses on protecting the vital core of all human lives in ways for meeting basic needs that enhance the safety and protection of individuals and communities. The vulnerability is the diminished capacity of an individual or group to anticipate, resist and recover from the effect of natural, human-induced disaster. The research objectives are to explore the causes of frequent power outages to consumers, high losses in the distribution network and the effect of poor electricity distribution efficiency on the vulnerable (poor and ordinary) people that mostly depend on electricity for their daily activities or life to survive. The importance of the study is that in a developing country like Ghana where raising a capital for new infrastructure project is difficult, it would be beneficial to enhance the efficiency that will significantly minimize the high energy losses, reduce power outage, to ensure safe and reliable delivery of electric power to consumers to secure the security of people’s livelihood. The methodology used in this study is both interview and questionnaire survey to analyze the response from the respondents on causes of power outages and high losses facing the electricity company of Ghana (ECG) and its effect on the livelihood on the vulnerable people. Among the outcome of both administered questionnaire and the interview survey from the field were; poor maintenance of existing sub-stations, use of aging equipment, use of poor distribution infrastructure and poor metering and billing system. The main observation of this paper is that the poor network efficiency (high losses and power outages) affects the livelihood of the vulnerable people. Therefore, the paper recommends that policymakers should insist on all regulation guiding electricity distribution to improve system efficiency. In conclusion, there should be decentralization of off-grid solar PV technologies to provide a sustainable and cost-effective, which can increase daily productivity and improve the quality of life of the vulnerable people in the rural communities.Keywords: electricity efficiency, high losses, human security, power outage
Procedia PDF Downloads 248