627 resultados para energy security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The progress of technology has led to the increased adoption of energy monitors among household energy consumers. While the monitors available on the market deliver real-time energy usage feedback to the consumer, the format of this data is usually unengaging and mundane. Moreover, it fails to address consumers with different motivations and needs to save and compare energy. This paper presents a study that seeks to provide initial indications for motivation-specific design of energy-related feedback. We focus on comparative feedback supported by a community of energy consumers. In particular, we examine eco-visualisations, temporal self-comparison, norm comparison, one-on-one comparison and ranking, whereby the last three allow us to explore the potential of socialising energy-related feedback. These feedback types were integrated in EnergyWiz – a mobile application that enables users to compare with their past performance, neighbours, contacts from social networking sites and other EnergyWiz users. The application was evaluated in personal, semi-structured interviews, which provided first insights on how to design motivation-related comparative feedback.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the face of increasing concern over global warming and climate change, interest in the utilizzation of solar energy for building operations is rapidly growing. In this entry, the importance of using renewable energy in building operations is first introduced. This is followed by a general overview on the energy from the sun and the methods to utilize solar energy. Possible applications of solar energy in building operations are then discussed, which include the use of solar energy in the forms of daylighting, hot water heating, space heating and cooling, and building-integrated photovoltaics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Air quality and temperatures in classrooms are important factors influencing the student learning process. To improve the thermal comfort of classrooms for Queensland State Schools, Queensland Government initiated the "Cooler Schools Program". One of the key objectives under this program was to develop low energy cooling systems as an alternative to high energy demand conventioanl split system of air conditioning (AC) systems. In order to compare and evaluate the energy performance of different types of air conditioners installed in classrooms, monitoring systems were installed in a state primary school located in the greater outer urban area of Brisbane, Australia. It was found that the installation of monitoring systems could have a significant impact on the accuracy of the data being collected. By comparing the estimated energy efficiency ratio (EER)for four qualified air conditioners included in this study, it was also found that AC6, a hybrid air conditioner newly developed by the Queensland Department of Public Works (DPW), had the best energy performance, although the current data were not able to show the full advantages of the system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Building insulation is often used to reduce the conduction heat transfer through building envelope. With a higher level of insulation (or a greater R-value), the less the conduction heat would transfer through building envelope. In this paper, using building computer simulation techniques, the effects of building insulation levels on the thermal and energy performance of a sample air-conditioned office building in Australia are studied. It is found that depending on the types of buildings and the climates of buildings located, increasing the level of building insulation will not always bring benefits in energy saving and thermal comfort, particularly for internal-load dominated office buildings located in temperate/tropical climates. The possible implication of building insulation in face of global warming has also been examined. Compared with the influence of insulation on building thermal performance, the influence on building energy use is relatively small.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Appropriate pipe insulation on domestic, pumped storage (split), solar water heating systems forms an integral part of energy conservation measures of well engineered systems. However, its importance over the life of the system is often overlooked. This study outlines the findings of computer modelling to quantify the energy and cost savings by using pipe insulation between the collector and storage tank. System sizes of 270 Litre storage tank, together with either selectively surfaced, flat plate collectors (4m2 area), or 30 evacuated tube collectors, were used. Insulation thicknesses of 13mm and 15mm, pipe runs both ways of 10, 15 and 20 metres and both electric and gas boosting of systems were all considered. The TRNSYS program was used to model the system performance at a representative city in each of the 6 climate zones for Australia and New Zealand, according to AS/NZS4234 – Heat Water Systems – Calculation of energy consumption and the ORER RECs calculation method. The results show:  Energy savings from pipe insulation are very significant, even in mild climates such as Rockhampton. Across all climates zones, savings ranged from 0.16 to 3.5GJ per system per year, or about 2 to 23 percent of the annual load.  There is very little advantage in increasing the insulation thickness from 13 to 15mm. For electricity at 19c/kWh and gas at 2 c/MJ, cost savings of between $27 and $100 per year are achieved across the climate zones. Both energy and cost savings would increase in colder climates with increased system size, solar contribution and water temperatures.  The pipe insulation substantially improves the solar contribution (or fraction) and Renewable Energy Certificates (RECs), as well as giving small savings in circulating pump running costs in milder climates. Solar contribution increased by up to 23 percent points and RECs by over 7 in some cases.  The study highlights the need to install and maintain the integrity of appropriate pipe insulation on solar water heaters over their life time in Australia and New Zealand.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This talk explores a new opportunity renewable energy technology has for society.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Analytical and closed form solutions are presented in this paper for the vibration response of an L-shaped plate under a point force or a moment excitation. Inter-relationships between wave components of the source and the receiving plates are clearly defined. Explicit expressions are given for the quadratic quantities such as input power, energy flow and kinetic energy distributions of the L-shaped plate. Applications of statistical energy analysis (SEA) formulation in the prediction of the vibration response of finite coupled plate structures under a single deterministic forcing are examined and quantified. It is found that the SEA method can be employed to predict the frequency averaged vibration response and energy flow of coupled plate structures under a deterministic force or moment excitation when the structural system satisfies the following conditions: (1) the coupling loss factors of the coupled subsystems are known; (2) the source location is more than a quarter of the plate bending wavelength away from the source plate edges in the point force excitation case, or is more than a quarter wavelength away from the pair of source plate edges perpendicular to the moment axis in the moment excitation case due to the directional characteristic of moment excitations. SEA overestimates the response of the L-shaped plate when the source location is less than a quarter bending wavelength away from the respective plate edges owing to wave coherence effect at the plate boundary

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper addresses the tradeoff between energy consumption and localization performance in a mobile sensor network application. The focus is on augmenting GPS location with more energy-efficient location sensors to bound position estimate uncertainty in order to prolong node lifetime. We use empirical GPS and radio contact data from a largescale animal tracking deployment to model node mobility, GPS and radio performance. These models are used to explore duty cycling strategies for maintaining position uncertainty within specified bounds. We then explore the benefits of using short-range radio contact logging alongside GPS as an energy-inexpensive means of lowering uncertainty while the GPS is off, and we propose a versatile contact logging strategy that relies on RSSI ranging and GPS lock back-offs for reducing the node energy consumption relative to GPS duty cycling. Results show that our strategy can cut the node energy consumption by half while meeting application specific positioning criteria.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a hierarchical model for assessing an object-oriented program's security. Security is quantified using structural properties of the program code to identify the ways in which `classified' data values may be transferred between objects. The model begins with a set of low-level security metrics based on traditional design characteristics of object-oriented classes, such as data encapsulation, cohesion and coupling. These metrics are then used to characterise higher-level properties concerning the overall readability and writability of classified data throughout the program. In turn, these metrics are then mapped to well-known security design principles such as `assigning the least privilege' and `reducing the size of the attack surface'. Finally, the entire program's security is summarised as a single security index value. These metrics allow different versions of the same program, or different programs intended to perform the same task, to be compared for their relative security at a number of different abstraction levels. The model is validated via an experiment involving five open source Java programs, using a static analysis tool we have developed to automatically extract the security metrics from compiled Java bytecode.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Energy conserving processes reported in undernourished women during pregnancy are a recognised strategy to provide energy required to support fetal development. Women who are obese before conceiving arguably have sufficient fat stores to support the energy demands of pregnancy without the need to provoke energy conserving mechanisms. Objective We tested the hypothesis that obese women would demonstrate behavioural adaptation (i.e. decrease in self-selected walking (SSW) speed) but not metabolic compensation (i.e. decrease in resting metabolic rate (RMR) or metabolic cost of walking) during gestation. Design RMR, SSW speed, metabolic cost of walking, and anthropometry were measured in 23 women (BMI: 33.6 ± 2.5 kg/m2; 31 ± 4 years) at approximately weeks 15 (wk 15) and 30 (wk 30) of gestation. RMR was also measured in two cohorts of non-pregnant controls matched for age, weight and height of the pregnant cohort at wk 15 (N=23) and wk 30 (N=23). Results GWG varied widely (11.3 ± 5.4 kg) and 52% of women gained more weight than is recommended. RMR increased significantly by an average 177 ± 176 kcal/d (11±12%; P<0.0001); however the within-group variability was large. Both the metabolic cost of walking and SSW speed decreased significantly (P<0.01). While RMR increased in >80% of the cohort, the net oxygen cost of walking decreased in the same proportion of women. Conclusions While the increase in RMR was greater than was explained by weight gain, there was evidence of both behavioural and biological compensation in the metabolic cost of walking in obese women during gestation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Choi et al. recently proposed an efficient RFID authentication protocol for a ubiquitous computing environment, OHLCAP(One-Way Hash based Low-Cost Authentication Protocol). However, this paper reveals that the protocol has several security weaknesses : 1) traceability based on the leakage of counter information, 2) vulnerability to an impersonation attack by maliciously updating a random number, and 3) traceability based on a physically-attacked tag. Finally, a security enhanced group-based authentication protocol is presented.