930 resultados para energy security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis was a step forward in developing probabilistic assessment of power system response to faults subject to intermittent generation by renewable energy. It has investigated the wind power fluctuation effect on power system stability, and the developed fast estimation process has demonstrated the feasibility for real-time implementation. A better balance between power network security and efficiency can be achieved based on this research outcome.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Battery energy storage systems (BESS) are becoming feasible to provide system frequency support due to recent developments in technologies and plummeting cost. Adequate response of these devices becomes critical as the penetration of the renewable energy sources increases in the power system. This paper proposes effective use of BESS to improve system frequency performance. The optimal capacity and the operation scheme of BESS for frequency regulation are obtained using two staged optimization process. Furthermore, the effectiveness of BESS for improving the system frequency response is verified using dynamic simulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis examines the existing frameworks for energy management in the brewing industry and details the design, development and implementation of a new framework at a modern brewery. The aim of the research was to develop an energy management framework to identify opportunities in a systematic manner using Systems Engineering concepts and principles. This work led to a Sustainable Energy Management Framework, SEMF. Using the SEMF approach, one of Australia's largest breweries has achieved number 1 ranking in the world for water use for the production of beer and has also improved KPI's and sustained the energy management improvements that have been implemented during the past 15 years. The framework can be adapted to other manufacturing industries in the Australian context and is considered to be a new concept and a potentially important tool for energy management.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Society is increasingly calling for professionals across government, industry, business and civil society to be able to problem-solve issues related to climate change and sustainable development as part of their work. In particular there is an emerging realisation of the fundamental need to swiftly reduce the growing demand for energy across society, and to then meet the demand with low emissions options. A key ingredient to addressing such issues is equipping professionals with emerging knowledge and skills to address energy challenges in all aspects of their work. The Council of Australian Governments has recognised this need, signing the National Partnership Agreement on Energy Efficiency in July 2009, which included a commitment to assist business and industry obtain the knowledge, skills and capacity to pursue cost-effective energy efficiency opportunities.2 Engineering will play a critical part among the professions, with Engineers Australia acknowledging that, ‘The need to make changes in the way energy is used and supplied throughout the world represents the greatest challenge to engineers in moving toward sustainability.’

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report presents the findings of an investigation of energy efficiency resources for undergraduate engineering education, undertaken by web-based research, conversations with educators, and a university survey. The investigation draws on the results of a number of previous investigations undertaken by the research team for NFEE related to energy efficiency education and presents the following findings and recommendations, as explained in greater detail in the body of the report. The findings suggest that even though certain EE concepts and principles have been identified by lecturers as being important there is little to no coverage of a number of these concepts in some programs/courses. Similarly, many topics relating to the most important EE workforce skills and significant shortages as identified in industry research, do not rate highly in terms of both perceived importance by lecturers, or coverage within existing courses. Overall, these findings suggest that despite growing awareness of the importance of EE in both industry and academia, the current depth and breadth of EE content in courses does not reflect this. It confirms that efforts in these areas can be better supported.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Energy Efficiency (EE) Graduate Attributes Project focuses on engineering as a priority profession that has a significant role to play in addressing energy demand and supply issues in Australia. Specifically, this project aims to support embedding EE knowledge and skills throughout the engineering undergraduate curriculum, to help build capacity within the Australian workforce across major sectors of the economy, from mining, manufacturing and industrial applications to design, construction, maintenance and retrofitting built environments. The resultant report is intended to assist in future consultation with key groups such as Engineers Australia (EA), the Australian Council of Engineering Deans (ACED) and the eight EA colleges, to support systemic curriculum renewal and promote the design and development of high quality EE engineering education resources. The project is based on a whole-of-program outcomes-based approach to curriculum renewal, creating a transparent framework for integrating EE. This comprises collaborative consideration by academics and professional engineers who have experience in teaching and practising EE, to identify what students should learn to be equipped with relevant competencies by the time they graduate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Deep geothermal from the hot crystalline basement has remained an unsolved frontier for the geothermal industry for the past 30 years. This poses the challenge for developing a new unconventional geomechanics approach to stimulate such reservoirs. While a number of new unconventional brittle techniques are still available to improve stimulation on short time scales, the astonishing richness of failure modes of longer time scales in hot rocks has so far been overlooked. These failure modes represent a series of microscopic processes: brittle microfracturing prevails at low temperatures and fairly high deviatoric stresses, while upon increasing temperature and decreasing applied stress or longer time scales, the failure modes switch to transgranular and intergranular creep fractures. Accordingly, fluids play an active role and create their own pathways through facilitating shear localization by a process of time-dependent dissolution and precipitation creep, rather than being a passive constituent by simply following brittle fractures that are generated inside a shear zone caused by other localization mechanisms. We lay out a new theoretical approach for the design of new strategies to utilize, enhance and maintain the natural permeability in the deeper and hotter domain of geothermal reservoirs. The advantage of the approach is that, rather than engineering an entirely new EGS reservoir, we acknowledge a suite of creep-assisted geological processes that are driven by the current tectonic stress field. Such processes are particularly supported by higher temperatures potentially allowing in the future to target commercially viable combinations of temperatures and flow rates.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this thesis various schemes using custom power devices for power quality improvement in low voltage distribution network are studied. Customer operated distributed generators makes a typical network non-radial and affect the power quality. A scheme considering different algorithm of DSTATCOM is proposed for power circulation and islanded operation of the system. To compensate reactive power overflow and facilitate unity power factor, a UPQC is introduced. Stochastic analysis is carried out for different scenarios to get a comprehensive idea about a real life distribution network. Combined operation of static compensator and voltage regulator is tested for the optimum quality and stability of the system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al. [7] and the second one by Huang, Lin and Li [6]. We show that these two protocols have several weaknesses. In Huang et al.’s scheme, an adversary can determine the 32-bit secret password with a probability of 2−2 , and in Huang-Lin-Li scheme, a passive adversary can recognize a target tag with a success probability of 1−2−4 and an active adversary can determine all 32 bits of Access password with success probability of 2−4 . The computational complexity of these attacks is negligible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n -bit-iterated hash function based on an n -bit compression function and with an n -bit chaining value that is proven indifferentiable from a RO.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).