627 resultados para energy security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Iris based identity verification is highly reliable but it can also be subject to attacks. Pupil dilation or constriction stimulated by the application of drugs are examples of sample presentation security attacks which can lead to higher false rejection rates. Suspects on a watch list can potentially circumvent the iris based system using such methods. This paper investigates a new approach using multiple parts of the iris (instances) and multiple iris samples in a sequential decision fusion framework that can yield robust performance. Results are presented and compared with the standard full iris based approach for a number of iris degradations. An advantage of the proposed fusion scheme is that the trade-off between detection errors can be controlled by setting parameters such as the number of instances and the number of samples used in the system. The system can then be operated to match security threat levels. It is shown that for optimal values of these parameters, the fused system also has a lower total error rate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Energy efficiency of buildings is attracting significant attention from the research community as the world is moving towards sustainable buildings design. Energy efficient approaches are measures or ways to improve the energy performance and energy efficiency of buildings. This study surveyed various energy-efficient approaches for commercial building and identifies Envelope Thermal Transfer Value (ETTV) and Green applications (Living wall, Green facade and Green roof) as most important and effective methods. An in-depth investigation was carried out on these energy-efficient approaches. It has been found that no ETTV model has been developed for sub-tropical climate of Australia. Moreover, existing ETTV equations developed for other countries do not take roof heat gain into consideration. Furthermore, the relationship of ETTV and different Green applications have not been investigated extensively in any literature, and the energy performance of commercial buildings in the presence of Living wall, Green facade and Green roof has not been investigated in the sub-tropical climate of Australia. The study has been conducted in two phases. First, the study develops the new formulation, coefficient and bench mark value of ETTV in the presence of external shading devices. In the new formulation, roof heat gain has been included in the integrated heat gain model made of ETTV. In the 2nd stage, the study presents the relationship of thermal and energy performance of (a) Living wall and ETTV (b) Green facade and ETTV (c) Combination of Living wall, Green facade and ETTV (d) Combination of Living wall, Green Roof and ETTV in new formulations. Finally, the study demonstrates the amount of energy that can be saved annually from different combinations of Green applications, i.e., Living wall, Green facade; combination of Living wall and Green facade; combination of Living wall and Green roof. The estimations are supported by experimental values obtained from extensive experiments of Living walls and Green roofs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, the influence of the impact energy on the initial fabrication of thin films formed by low energy cluster deposition was investigated by molecular dynamics simulation of All 3 clusters depositing on Ni(0 0 1) substrate. In the case of soft-landing, (0.01 eV/atom), clusters are rearranged from I-h symmetry into fcc-like clusters on the surface. Then they aggregate each other, which result in thin film growing in 3D island mode. While, growth will be in layer-by-layer mode at the impact energy of a few electron volt due to the transient lateral spread of cluster atoms induced by dense collision cascade. This effect has been traced to collision cascade inside the cluster. which is enhanced by collision with a hard Ni substrate. (C) 2002 Elsevier Science B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The deposition of hyperthermal CH3 on diamond (001)-(2×1) surface at room temperature has been studied by means of molecular dynamics simulation using the many-body hydrocarbon potential. The energy threshold effect has been observed. That is, with fixed collision geometry, chemisorption can occur only when the incident energy of CH3 is above a critical value (Eth). Increasing the incident energy, dissociation of hydrogen atoms from the incident molecule was observed. The chemisorption probability of CH3 as a function of its incident energy was calculated and compared with that of C2H2. We found that below 10 eV, the chemisorption probability of C2H2 is much lower than that of CH3 on the same surface. The interesting thing is that it is even lower than that of CH3 on a hydrogen covered surface at the same impact energy. It indicates that the reactive CH3 molecule is the more important species than C2H2 in diamond synthesis at low energy, which is in good agreement with the experimental observation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, the collision of a C36, with D6h symmetry, on diamond (001)-(/2×1) surface was investigated using molecular dynamics (MD) simulation based on the semi-empirical Brenner potential. The incident kinetic energy of the C36 ranges from 20 to 150 eV per cluster. The collision dynamics was investigated as a function of impact energy Ein. The C36 cluster was first impacted towards the center of two dimers with a fixed orientation. It was found that when Ein was lower than 30 eV, C36 bounces off the surface without breaking up. Increasing Ein to 30-45 eV, bonds were formed between C36 and surface dimer atoms, and the adsorbed C36 retained its original free-cluster structure. Around 50-60 eV, the C36 rebounded from the surface with cage defects. Above 70 eV, fragmentation both in the cluster and on the surface was observed. Our simulation supported the experimental findings that during low-energy cluster beam deposition small fullerenes could keep their original structure after adsorption (i.e. the memory effect), if Ein is within a certain range. Furthermore, we found that the energy threshold for chemisorption is sensitive to the orientation of the incident C36 and its impact position on the asymmetric surface.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the first oil crisis in 1974, economic reasons placed energy saving among the top priorities in most industrialised countries. In the decades that followed, another, equally strong driver for energy saving emerged: climate change caused by anthropogenic emissions, a large fraction of which result from energy generation. Intrinsically linked to energy consumption and its related emissions is another problem: indoor air quality. City dwellers in industrialised nations spend over 90% of their time indoors and exposure to indoor pollutants contributes to ~2.6% of global burden of disease and nearly 2 million premature deaths per year1. Changing climate conditions, together with human expectations of comfortable thermal conditions, elevates building energy requirements for heating, cooling, lighting and the use of other electrical equipment. We believe that these changes elicit a need to understand the nexus between energy consumption and its consequent impact on indoor air quality in urban buildings. In our opinion the key questions are how energy consumption is distributed between different building services, and how the resulting pollution affects indoor air quality. The energy-pollution nexus has clearly been identified in qualitative terms; however the quantification of such a nexus to derive emissions or concentrations per unit energy consumption is still weak, inconclusive and requires forward thinking. Of course, various aspects of energy consumption and indoor air quality have been studied in detail separately, but in-depth, integrated studies of the energy-pollution nexus are hard to come by. We argue that such studies could be instrumental in providing sustainable solutions to maintain the trade-off between the energy efficiency of buildings and acceptable levels of air pollution for healthy living.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Electricity cost has become a major expense for running data centers and server consolidation using virtualization technology has been used as an important technology to improve the energy efficiency of data centers. In this research, a genetic algorithm and a simulation-annealing algorithm are proposed for the static virtual machine placement problem that considers the energy consumption in both the servers and the communication network, and a trading algorithm is proposed for dynamic virtual machine placement. Experimental results have shown that the proposed methods are more energy efficient than existing solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis is a study of whether the Australian Clean Energy Package complies with the rules of the World Trade Organization. It examines the legal framework for the Australian carbon pricing mechanism and related arrangements, using World Trade Organization law as the framework for analysis. In doing so, this thesis deconstructs the Clean Energy Package by considering the legal properties of eligible emissions units, the assistance measures introduced by the Package and the liabilities created by the carbon pricing mechanism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a distributed control approach to coordinate multiple energy storage units (ESUs) to avoid violation of voltage and thermal constraints, which are some of the main power quality challenges for future distribution networks. ESUs usually are connected to a network through voltage source converters. In this paper, both ESU converters active and reactive power are used to deal with the above mentioned power quality issues. ESUs' reactive power is proposed to be used for voltage support, while the active power is to be utilized in managing network loading. Two typical distribution networks are used to apply the proposed method, and the simulated results are illustrated in this paper to show the effectiveness of this approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Severe power quality problems can arise when a large number of single-phase distributed energy resources (DERs) are connected to a low-voltage power distribution system. Due to the random location and size of DERs, it may so happen that a particular phase generates excess power than its load demand. In such an event, the excess power will be fed back to the distribution substation and will eventually find its way to the transmission network, causing undesirable voltage-current unbalance. As a solution to this problem, the article proposes the use of a distribution static compensator (DSTATCOM), which regulates voltage at the point of common coupling (PCC), thereby ensuring balanced current flow from and to the distribution substation. Additionally, this device can also support the distribution network in the absence of the utility connection, making the distribution system work as a microgrid. The proposals are validated through extensive digital computer simulation studies using PSCADTM

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the electricity market environment, coordination of system reliability and economics of a power system is of great significance in determining the available transfer capability (ATC). In addition, the risks associated with uncertainties should be properly addressed in the ATC determination process for risk-benefit maximization. Against this background, it is necessary that the ATC be optimally allocated and utilized within relative security constraints. First of all, the non-sequential Monte Carlo stimulation is employed to derive the probability density distribution of ATC of designated areas incorporating uncertainty factors. Second, on the basis of that, a multi-objective optimization model is formulated to determine the multi-area ATC so as to maximize the risk-benefits. Then, the solution to the developed model is achieved by the fast non-dominated sorting (NSGA-II) algorithm, which could decrease the risk caused by uncertainties while coordinating the ATCs of different areas. Finally, the IEEE 118-bus test system is served for demonstrating the essential features of the developed model and employed algorithm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Transport Layer Security (TLS) protocol is the most widely used security protocol on the Internet. It supports negotiation of a wide variety of cryptographic primitives through different cipher suites, various modes of client authentication, and additional features such as renegotiation. Despite its widespread use, only recently has the full TLS protocol been proven secure, and only the core cryptographic protocol with no additional features. These additional features have been the cause of several practical attacks on TLS. In 2009, Ray and Dispensa demonstrated how TLS renegotiation allows an attacker to splice together its own session with that of a victim, resulting in a man-in-the-middle attack on TLS-reliant applications such as HTTP. TLS was subsequently patched with two defence mechanisms for protection against this attack. We present the first formal treatment of renegotiation in secure channel establishment protocols. We add optional renegotiation to the authenticated and confidential channel establishment model of Jager et al., an adaptation of the Bellare--Rogaway authenticated key exchange model. We describe the attack of Ray and Dispensa on TLS within our model. We show generically that the proposed fixes for TLS offer good protection against renegotiation attacks, and give a simple new countermeasure that provides renegotiation security for TLS even in the face of stronger adversaries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dáwat, Pamahándí, Tawíd, Ságda, Lampísa, Ibabások, Lapát, Panedlák: for most of us gathered here, these are words that we don’t usually use in our daily lives. Others may consider them as exotic, alien, funny and even backward. However, for indigenous kindred among us, these words denote an intimate identity and deep understanding of the world around them. It constitutes a broader knowledge system, be written or otherwise, which guides them in the management of resources within their ancestral land. This paper will provide a brief theoretical framework of the concepts of indigenous knowledge systems—hereinafter called IKS, and indigenous peoples food security, and hopefully a deeper or continued appreciation in the study of both concepts in general.