• Title/Summary/Keyword: energy security

Search Result 912, Processing Time 0.023 seconds

Processing and benchmarking of evaluated nuclear data file/b-viii.0β4 cross-section library by analysis of a series of critical experimental benchmark using the monte carlo code MCNP(X) and NJOY2016

  • Ouadie, Kabach;Abdelouahed, Chetaine;Abdelhamid, Jalil;Abdelaziz, Darif;Abdelmajid, Saidi
    • Nuclear Engineering and Technology
    • /
    • v.49 no.8
    • /
    • pp.1610-1616
    • /
    • 2017
  • To validate the new Evaluated Nuclear Data File $(ENDF)/B-VIII.0{\beta}4$ library, 31 different critical cores were selected and used for a benchmark test of the important parameter keff. The four utilized libraries are processed using Nuclear Data Processing Code (NJOY2016). The results obtained with the $ENDF/B-VIII.0{\beta}4$ library were compared against those calculated with ENDF/B-VI.8, ENDF/B-VII.0, and ENDF/B-VII.1 libraries using the Monte Carlo N-Particle (MCNP(X)) code. All the MCNP(X) calculations of keff values with these four libraries were compared with the experimentally measured results, which are available in the International Critically Safety Benchmark Evaluation Project. The obtained results are discussed and analyzed in this paper.

A New Stabilizing Method for Transiently Unstable Systems by Using Transient Energy Function (에너지함수를 이용한 과도불안정 시스템의 안정화 방법)

  • Kim, Jung-Woo;Chun, Yeong-Han
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.4
    • /
    • pp.567-575
    • /
    • 2008
  • Transient security assessment(TSA) is becoming an essential requirement not only for security monitoring but also for stabilizing control of power systems under new electricity environments. It has already been pointed out that fast transient stability study is an important part for monitoring and controlling system security. In this paper, we discuss an energy function method for stabilizing control of transiently unstable systems by introducing generator tripping system to enhance the transient stability of power systems. The stabilization with less tripped power can be obtained by tripping the generators faster than out-of-synchronism relay. Fast transient stability assessment based on the state estimation and direct transient energy function method is an important part of the stabilizing scheme. It is possible to stabilize the transiently unstable system by tripping less generators before the action of out-of-synchronism relay, especially when a group of generator are going to be out-of-synchronism. Moreover, the amount of generator output needed for tripping can be decided by Transient Energy Function(TEF) method. The main contribution of this paper is on the stabilizing scheme which can be running in the Wide Area Control System.

Self-Organized Hierarchy Tree Protocol for Energy-Efficiency in Wireless Sensor Networks

  • THALJAOUI, Adel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.230-238
    • /
    • 2021
  • A sensor network is made up of many sensors deployed in different areas to be monitored. They communicate with each other through a wireless medium. The routing of collected data in the wireless network consumes most of the energy of the network. In the literature, several routing approaches have been proposed to conserve the energy at the sensor level and overcome the challenges inherent in its limitations. In this paper, we propose a new low-energy routing protocol for power grids sensors based on an unsupervised clustering approach. Our protocol equitably harnesses the energy of the selected cluster-head nodes and conserves the energy dissipated when routing the captured data at the Base Station (BS). The simulation results show that our protocol reduces the energy dissipation and prolongs the network lifetime.

Asynchronous Key Management for Energy Efficiency over Wireless Sensor Network (유비쿼터스 센서네트워크에서 에너지효율을 고려하는 비동기적인 키관리 기법)

  • Yoon, Mi-Youn
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10C
    • /
    • pp.1011-1022
    • /
    • 2006
  • WSN(Wireless Sensor Network) performs to detect and collect environmental information for one purpose. The WSN is composed of a sink node and several sensor nodes and has a constraint in an aspect of energy consumption caused by limited battery resource. So many required mechanisms in WSN should consider the remaining energy condition. To deploy WSN, tile collected information is required to protect from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. we propose asynchronized key management considering energy efficiency over WSN. The proposed key management is focused on independence and difference of the keys used to deliver the information over several routes over the network, so disclosure of any key does not results in exposure of total key information over the overall WSN. Also, we use hash function to update key information for energy efficiency Periodically. We define the insecurity for requested security Properties and Proof that the security properties are guaranteed. Also, we evaluate and analyze the energy efficiency for the proposed mechanism.

A Study on Security Vulnerability Management in Electric Power Industry IoT (전력 산업 IoT에서의 보안 취약점 관리에 관한 연구)

  • Lee, Sang-Gi;Lee, Sei-Yoon;Kim, Jeong-Chul
    • Journal of Digital Contents Society
    • /
    • v.17 no.6
    • /
    • pp.499-507
    • /
    • 2016
  • The era of IoT, which figures exchanging data from the internet between things is coming. Recently, former electric power energy policy paradigm, namely Supply side paradigm, is changing, because electric power energy consumption is rapidly increasing. As new paradigm for this limit, convergence of existing electric power grid and ICT(Information and Communication Technology) will accelerate intellectualization of electric power device, its operation system. This change brought opened electric power grid. Consequently, attacks to the national electric power grid are increasing. On this paper, we will analyze security threats of existing IoT, discuss security weakness on electric power industry IoT and suggest needed security requirements, security technology.

Modeling and Simulation of Smart Home Energy Consumption

  • Naziha Labiadh;Imen Amdouni;Lilia El Amraoui
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.77-82
    • /
    • 2024
  • The Smart home energy consumption represents much of the total energy consumed in advanced countries. For this reason, the main objectif of this paper is to study the energy consumption profile by day for each home appliances: controllable appliances for example Washing machine, Tumble dryer and Air conditioning and uncontrollable appliances for example TV, PC, Lighting, Refrigerator and Electric heater. In this paper, we start with presentation of a smart home energy management systems. Next, we present the modeling and simulation of controllable appliances and uncontrollable appliances. Finally, concludes this paper with some prospects. The modeling and the simulation of a Smart home appliances is based on MATLAB/Simulink software.

From Renewable Electricity to Green Hydrogen: Production and Storage Challenges for a Clean Energy Future

  • Hidouri Dalila;Rym Marouani;Cherif Adnen
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.171-179
    • /
    • 2024
  • Decentralized energy production without greenhouse gas emissions from renewable energy sources despite their advantage and environmental impact suffers from the problem of intermittent and fluctuating supply depending on weather conditions. To overcome this problem, energy storage is essential to enable reliable and continuous supply of the load. Hydrogen is one of the most promising energy storage solutions because it is easily transportable and can be used as fuel or as a raw material for the production of other chemicals.In this article, we will focus on hydrogen energy storage techniques using photovoltaic systems. We will review the different types of hydrogen storage structuresfor several applications, including residential and commercial buildings, as well as industry and transportation (electric vehicles using PEFMC fuel cells).

Security Threat and Policy Analysis to Secure the Safety and Reliability of the Smart Grid (지능형 전력망의 안전성과 신뢰성 확보를 위한 보안위협과 정책 분석)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1381-1390
    • /
    • 2021
  • Smart grid is a representative convergence new technology in the era of the 4th industry revolution that deals with three broad security areas consisting of control system, the power grid, and the consumer. As it is a convergence new technology of the 4th industrial society, it is true that it can have a positive effect on the country's technological development, growth engine, and economic feasibility in the future. However, since the smart grid is expected to cause enormous damage in the event of a security accident, energy-related organizations must prepare various security measures to predict and respond to the latest security incidents. In this paper, the current status of domestic and foreign smart grids, trends in security standards, vulnerabilities and threats, and prospects for smart grid security technologies are to be considered.

Analysis of plane frame structure using base force element method

  • Peng, Yijiang;Bai, Yaqiong;Guo, Qing
    • Structural Engineering and Mechanics
    • /
    • v.62 no.1
    • /
    • pp.11-20
    • /
    • 2017
  • The base force element method (BFEM) is a new finite element method. In this paper, a degenerated 4-mid-node plane element from concave polygonal element of BFEM was proposed. The performance of this quadrilateral element with 4 mid-edge nodes in the BFEM on complementary energy principle is studied. Four examples of linear elastic analysis for plane frame structure are presented. The influence of aspect ratio of the element is analyzed. The feasibility of the 4 mid-edge node element model of BFEM on complementary energy principles researched for plane frame problems. The results using the BFEM are compared with corresponding analytical solutions and those obtained from the standard displacement finite element method. It is revealed that the BFEM has better performance compared to the displacement model in the case of large aspect ratio.

An Energy-Efficient Clustering Design Apply Security Method in Ubiquitous Sensor Networks (USN에서 보안을 적용한 에너지 효율적 클러스터링 설계)

  • Nam, Do-Hyun;Min, Hong-Ki
    • Journal of IKEEE
    • /
    • v.11 no.4
    • /
    • pp.205-212
    • /
    • 2007
  • The ubiquitous sensor network consists of micro sensors with wireless communication capabilities. Compared to wired communication, wireless communication is more subject to eavesdropping as well as data variation and manipulation. Accordingly, there must be efforts to secure the information delivered over the sensor network. Providing security to the sensor network, however, requires additional energy consumption, which is an important issue since energy transformation is difficult to implement in a sensor network. This paper proposes a routing mechanism based on the energy-efficient cluster that features security functions capable of safely processing the data acquired from the sensor network. The proposed algorithm reduces energy consumption by fixing the clusters formed at the initial stage and using the pre-distribution scheme so that the cluster and node keys generated and exchanged at the initial stage are not re-generated or re-exchanged. Simulation experiments confirmed that the proposed approach reduces energy consumption compared to implementing security measures to the conventional cluster-based routing mechanism.

  • PDF