• Title/Summary/Keyword: energy security

Search Result 912, Processing Time 0.025 seconds

Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter

  • Osman Goni;Md. Abu Shameem
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.141-146
    • /
    • 2024
  • A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.

Changing Political-Economic Geography of Energy Flows Northeast Asia (변화하는 동북아시아 에너지 흐름의 정치경제지리)

  • Choi, Byung-Doo
    • Journal of the Korean association of regional geographers
    • /
    • v.12 no.4
    • /
    • pp.475-495
    • /
    • 2006
  • This paper is to analyse a changing space of energy flows in Northeast Asia from geopolitical and geoeconomic perspectives that have been recently promoted for energy security of countries in this region. The research is based on an analytical framework in an integration of political ecology and political economy. Because of an ever-increasing input of energy resources for economic growth and of dramatically increasing price of crude oil and recent instability of oil market, South Korea, China and Japan have been deeply concerned with energy security and conducted very actively geopolitical strategies. And hence the space of energy flows in the region is now in a process of dynamic reconfiguration, in which the project for development of oil and natural gas fields in East Siberia and construction of pipelines to transport them can be seen as one of competitive issues among these countries. In spite of worrying about stagflation due to rapid increase of oil price, such geo-strategies for energy security and reconfiguration of space of energy flows seem to keep the accumulation of capital in this region continue with generation of huge privatized oil companies.

  • PDF

Analysis on the Replacement Cost of Nuclear Energy Using a Stochastic Programming Model (확률계획법을 활용한 원자력 대체비용의 분석)

  • Chung, Jaewoo;Min, Daiki
    • Korean Management Science Review
    • /
    • v.30 no.1
    • /
    • pp.139-148
    • /
    • 2013
  • A nuclear energy has been one of the most important sources to securely supply electricity in South Korea. Its weight in the national electricity supply has kept increasing since the first nuclear reactor was built in 1978. The country relies on the nuclear approximately 31.4% in 2012 and it is expected to increase to 48.5% in 2024 based on the long-term electricity supply plan announced by the Korean government. However, Fukushima disaster due to 9.0 magnitude earthquake followed by the tsunami has raised deep concerns on the security of the nuclear power plants. The policy makers of the country are much interested in analyzing the cost structure of the power supply in the case that the nuclear is diminished from the current supply portion. This research uses a stochastic model that aims to evaluate the long-term power supply plan and provides an extensive cost analysis on the changes of the nuclear power supply. To evaluate a power supply plan, the research develops a few plausible energy mix scenarios by changing the installed capacities of energy sources from the long-term electricity supply plan. The analyses show that the nuclear is still the most attractive energy source since its fuel cost is very much stable compared to the other sources. Also the results demonstrate that a large amount of financial expenditure is additionally required every year if Koreans agree on the reduction of nuclear to increase national security against a nuclear disaster.

An Energy Efficient Clustering Algorithm in Mobile Adhoc Network Using Ticket Id Based Clustering Manager

  • Venkatasubramanian, S.;Suhasini, A.;Vennila, C.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.341-349
    • /
    • 2021
  • Many emerging mobile ad-hoc network application communications are group-oriented. Multicast supports group-oriented applications efficiently, particularly in a mobile environment that has a limited bandwidth and limited power. Energy effectiveness along with safety are 2 key problem in MANET design. Within this paper, MANET is presented with a stable, energy-efficient clustering technique. In this proposed work advanced clustering in the networks with ticket ID cluster manager (TID-CMGR) has formed in MANET. The proposed routing scheme makes secure networking the shortest route possible. In this article, we propose a Cluster manager approach based on TICKET-ID to address energy consumption issues and reduce CH workload. TID-CMGR includes two mechanism including ticket ID controller, ticketing pool, route planning and other components. The CA (cluster agent) shall control and supervise the functions of nodes and inform to TID-CMGR. The CH conducts and transfers packets to the network nodes. As the CH energy level is depleted, CA elects the corresponding node with elevated energy values, and all new and old operations are simultaneously stored by CA at this time. A simulation trial for 20 to 100 nodes was performed to show the proposed scheme performance. The suggested approach is used to do experimental work using the NS- simulator. TIDCMGR is compared with TID BRM and PSO to calculate the utility of the work proposed. The assessment shows that the proposed TICKET-ID scheme achieves 90 percent more than other current systems.

Opportunity Coefficient for Cluster-Head Selection in LEACH Protocol

  • Soh, Ben;AlZain, Mohammed;Lozano-Claros, Diego;Adhikari, Basanta
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.6-11
    • /
    • 2021
  • Routing protocols play a pivotal role in the energy management and lifespan of any Wireless Sensor Network. Lower network lifetime has been one of the biggest concerns in LEACH protocol due to dead nodes. The LEACH protocol suffers from uneven energy distribution problem due to random selection of a cluster head. The cluster head has much greater responsibility compared to other non- cluster head nodes and consumes greater energy for its roles. This results in early dead nodes due to energy lost for the role of cluster- head. This study proposes an approach to balance the energy consumption of the LEACH protocol by using a semi-deterministic opportunity coefficient to select the cluster head. This is calculated in each node with the battery energy level and node ID. Ultimately, based on the opportunity cost, cluster head will be selected and broadcasted for which other nodes with higher opportunity cost will agree. It minimizes the chances of nodes with lower battery level being elected as cluster head. Our simulation experiments demonstrate that cluster heads chosen using our proposed algorithm perform better than those using the legacy LEACH protocol.

Supervisory Control for Energy Management of Islanded Hybrid AC/DC Microgrid

  • Mansour, Henda Ben;Chaarabi, Lotfi;Jelassi, Khaled;Guerrero, Josep M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.355-363
    • /
    • 2022
  • This paper presents the modeling for islanded hybrid AC/DC microgrid and the verification of the proposed supervisory controller for energy management for this microgrid. The supervisory controller allows the microgrid system to operate in different power flows through the proposed control algorithm, it has several roles in the management of the energy flow between the different components of the microgrid for reliable operation. The proposed microgrid has both essential objectives such as the maximum use of renewable energies resources and the reduction of multiple conversion processes in an individual AC or DC microgrids. The microgrid system considered for this study has a solar photovoltaic (PV), a wind turbine (WT), a battery (BT), and a AC/DC loads. A small islanded hybrid AC/DC microgrid has been modeled and simulated using the MATLAB-Simulink. The simulation results show that the system can maintain stable operation under the proposed supervisory controller when the microgrid is switched from one operating mode of energy flow to another.

Load Control between PV Power Plants and Diesel Generators

  • Mohamed Khalil Abdalla MohamedAli;AISHA HASSAN ABDALLA HASHIM;OTHMAN KHALIFA
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.33-40
    • /
    • 2024
  • Introducing renewable energy sources, such as wind and photovoltaic arrays, in microgrids that supply remote regions with electricity represents a significant leap in electricity generation. Combining photovoltaic panels and diesel engines is one of the most common ways to supply electricity to rural communities. Such hybrid systems can reduce the cost of electricity generation in these remote power systems because they use free energy to balance the power generated by diesel engines. However, the combination of renewable energy sources and diesel engines tends to complicate the sizing and control of the entire system due to the intermittent nature of renewable energy sources. This study sought to investigate this issue in depth. It proposes a robust hybrid controller that can be used to facilitate optimum power sharing between a PV power source and diesel generators based on the dynamics of the available PV energy at any given time. The study also describes a hybrid PV-diesel power plant's essential functional parts that produce electricity for a microgrid using a renewable energy source. Power control needs to be adjusted to reduce the cost of power generation.

An Efficient Public Key Based Security Architecture for Wireless Sensor Networks

  • Haque, Mokammel;Pathan, Al-Sakib Khan;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1098-1099
    • /
    • 2007
  • In this paper, we propose a public key based security architecture for Wireless Sensor Networks (WSNs). The basic architecture comprises of two schemes; a key handshaking scheme based on simple linear operations for fast computation and an identity based cryptosystem which does not require any certificate authority. Our analysis shows that, the combined scheme ensures a good level of security and is very much suitable for the energy constrained trend of wireless sensor network.

  • PDF

A LOW-COST PROTOCOL IN SENSOR NETWORK UBIQUITOUS ENVIRONMENT

  • Lee Dong-heui;Cho Young-bok;Kim Dong-myung;Lee Sang-ho
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.766-769
    • /
    • 2005
  • In a ubiquitous environment made up of multiple sensors, most sensors participate in communications with limited battery, and the sensor node isn't able to participate in communications when all the battery is used up. When an existing authentication method is used for the sensor node which has to participate in a long term communication with limited battery, it creates a problem by making the length of network maintenance or sensor node's operation time relatively shorte. Therefore, a network structure where RM (Register Manager) node and AM (Authentication Manager) node are imported to solve the energy consumption problem during a communication process is presented in this thesis. This offers a low power protocol based on safety through a mutual authentication during communications. Through registration and authentication manager nodes, each sensor nodes are ensured of safety and the algorithm of key's generation, encryption/descramble and authentication is processed with faster operation speed. So the amount of electricity used up during the communications between sensor nodes has been evaluated. In case of the amount of electrical usage, an average of $34.783\%$ for the same subnet and 36.855 for communications with two different subnets, are reduced. The proposed method is a protocol which maintains the limited battery for a long time to increase the effectiveness of energy usage in sensor nodes and can also increase the participation rate of communication by sensor nodes.

  • PDF

Probabilistic Filtering Method for Efficient Sensor Network Security (효율적인 센서 네트워크 보안을 위한 확률적인 필터링 기법)

  • Kim, Jin-Su;Shin, Seung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.1
    • /
    • pp.382-389
    • /
    • 2012
  • The fabricated report attack will not only cause false alarms that waste real-world response efforts such as sending response teams to the event location, but also drains the finite amount of energy in a wireless sensor network. In this paper, we propose a probabilistic filtering method for sensor network security (PFSS) to deal with filtering for the fabricated report. On the basis of filtering scheme, PFSS combines cluster-based organization and probabilistic verification node assignment using distance of from cluster head to base station for energy efficiency and hot spot problem. Through both analysis and simulation, we demonstrate that PFSS could achieve efficient protection against fabricated report attack while maintaining a sufficiently high filtering power.