• 제목/요약/키워드: energy security

검색결과 912건 처리시간 0.031초

Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter

  • Osman Goni;Md. Abu Shameem
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.141-146
    • /
    • 2024
  • A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.

변화하는 동북아시아 에너지 흐름의 정치경제지리 (Changing Political-Economic Geography of Energy Flows Northeast Asia)

  • 최병두
    • 한국지역지리학회지
    • /
    • 제12권4호
    • /
    • pp.475-495
    • /
    • 2006
  • 이 논문은 동북아시아 국가들의 에너지안보와 관련하여 새롭게 재편되고 있는 에너지 흐름의 공간을 지정학적 및 지경제학적 측면에서 분석하고자 한다. 연구는 정치생태학과 정치경제학을 통합시킨 분석 틀에 근거하며, 이는 사회와 자연 간 변증법적 관계 속에서 형성된 흐름의 공간이 국제정치의 헤게모니적 지배와 자본축적의 선도적 위상을 제공하며 이에 따라 다시 사회와 자연이 재구조화된다는 점을 함의한다. 동북아 지역의 한국, 중국, 일본은 경제성장을 위한 에너지 투입량의 증가와 유가 폭등 및 석유시장 불안정으로 에너지안보에 관해 지대한 관심을 가지고 적극적인 지정학적 전략들을 구사하고 있다. 이에 따라 동북아 지역의 에너지 흐름의 공간이 역동적으로 변화하고 있으며, 특히 러시아 동시베리아 지역의 원유 및 천연가스의 개발과 이를 수송하기 위한 파이프라인의 건설 노선을 둘러싸고 중국과 일본 간 갈등관계를 노정시키고 있다. 국제 원유가의 급등으로 경제침체가 유발될 것이라는 우려에도 불구하고, 에너지 안보를 위한 각국의 지정학적 전략과 에너지 흐름의 공간 재편은 이 지역 국가들에서 새로운 대규모 민영화된 석유기업들의 등장과 이들과 관련된 다양한 기관들을 통해 자본 축적을 지속시키고 있다.

  • PDF

확률계획법을 활용한 원자력 대체비용의 분석 (Analysis on the Replacement Cost of Nuclear Energy Using a Stochastic Programming Model)

  • 정재우;민대기
    • 경영과학
    • /
    • 제30권1호
    • /
    • pp.139-148
    • /
    • 2013
  • A nuclear energy has been one of the most important sources to securely supply electricity in South Korea. Its weight in the national electricity supply has kept increasing since the first nuclear reactor was built in 1978. The country relies on the nuclear approximately 31.4% in 2012 and it is expected to increase to 48.5% in 2024 based on the long-term electricity supply plan announced by the Korean government. However, Fukushima disaster due to 9.0 magnitude earthquake followed by the tsunami has raised deep concerns on the security of the nuclear power plants. The policy makers of the country are much interested in analyzing the cost structure of the power supply in the case that the nuclear is diminished from the current supply portion. This research uses a stochastic model that aims to evaluate the long-term power supply plan and provides an extensive cost analysis on the changes of the nuclear power supply. To evaluate a power supply plan, the research develops a few plausible energy mix scenarios by changing the installed capacities of energy sources from the long-term electricity supply plan. The analyses show that the nuclear is still the most attractive energy source since its fuel cost is very much stable compared to the other sources. Also the results demonstrate that a large amount of financial expenditure is additionally required every year if Koreans agree on the reduction of nuclear to increase national security against a nuclear disaster.

An Energy Efficient Clustering Algorithm in Mobile Adhoc Network Using Ticket Id Based Clustering Manager

  • Venkatasubramanian, S.;Suhasini, A.;Vennila, C.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.341-349
    • /
    • 2021
  • Many emerging mobile ad-hoc network application communications are group-oriented. Multicast supports group-oriented applications efficiently, particularly in a mobile environment that has a limited bandwidth and limited power. Energy effectiveness along with safety are 2 key problem in MANET design. Within this paper, MANET is presented with a stable, energy-efficient clustering technique. In this proposed work advanced clustering in the networks with ticket ID cluster manager (TID-CMGR) has formed in MANET. The proposed routing scheme makes secure networking the shortest route possible. In this article, we propose a Cluster manager approach based on TICKET-ID to address energy consumption issues and reduce CH workload. TID-CMGR includes two mechanism including ticket ID controller, ticketing pool, route planning and other components. The CA (cluster agent) shall control and supervise the functions of nodes and inform to TID-CMGR. The CH conducts and transfers packets to the network nodes. As the CH energy level is depleted, CA elects the corresponding node with elevated energy values, and all new and old operations are simultaneously stored by CA at this time. A simulation trial for 20 to 100 nodes was performed to show the proposed scheme performance. The suggested approach is used to do experimental work using the NS- simulator. TIDCMGR is compared with TID BRM and PSO to calculate the utility of the work proposed. The assessment shows that the proposed TICKET-ID scheme achieves 90 percent more than other current systems.

Opportunity Coefficient for Cluster-Head Selection in LEACH Protocol

  • Soh, Ben;AlZain, Mohammed;Lozano-Claros, Diego;Adhikari, Basanta
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.6-11
    • /
    • 2021
  • Routing protocols play a pivotal role in the energy management and lifespan of any Wireless Sensor Network. Lower network lifetime has been one of the biggest concerns in LEACH protocol due to dead nodes. The LEACH protocol suffers from uneven energy distribution problem due to random selection of a cluster head. The cluster head has much greater responsibility compared to other non- cluster head nodes and consumes greater energy for its roles. This results in early dead nodes due to energy lost for the role of cluster- head. This study proposes an approach to balance the energy consumption of the LEACH protocol by using a semi-deterministic opportunity coefficient to select the cluster head. This is calculated in each node with the battery energy level and node ID. Ultimately, based on the opportunity cost, cluster head will be selected and broadcasted for which other nodes with higher opportunity cost will agree. It minimizes the chances of nodes with lower battery level being elected as cluster head. Our simulation experiments demonstrate that cluster heads chosen using our proposed algorithm perform better than those using the legacy LEACH protocol.

Supervisory Control for Energy Management of Islanded Hybrid AC/DC Microgrid

  • Mansour, Henda Ben;Chaarabi, Lotfi;Jelassi, Khaled;Guerrero, Josep M.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.355-363
    • /
    • 2022
  • This paper presents the modeling for islanded hybrid AC/DC microgrid and the verification of the proposed supervisory controller for energy management for this microgrid. The supervisory controller allows the microgrid system to operate in different power flows through the proposed control algorithm, it has several roles in the management of the energy flow between the different components of the microgrid for reliable operation. The proposed microgrid has both essential objectives such as the maximum use of renewable energies resources and the reduction of multiple conversion processes in an individual AC or DC microgrids. The microgrid system considered for this study has a solar photovoltaic (PV), a wind turbine (WT), a battery (BT), and a AC/DC loads. A small islanded hybrid AC/DC microgrid has been modeled and simulated using the MATLAB-Simulink. The simulation results show that the system can maintain stable operation under the proposed supervisory controller when the microgrid is switched from one operating mode of energy flow to another.

Load Control between PV Power Plants and Diesel Generators

  • Mohamed Khalil Abdalla MohamedAli;AISHA HASSAN ABDALLA HASHIM;OTHMAN KHALIFA
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.33-40
    • /
    • 2024
  • Introducing renewable energy sources, such as wind and photovoltaic arrays, in microgrids that supply remote regions with electricity represents a significant leap in electricity generation. Combining photovoltaic panels and diesel engines is one of the most common ways to supply electricity to rural communities. Such hybrid systems can reduce the cost of electricity generation in these remote power systems because they use free energy to balance the power generated by diesel engines. However, the combination of renewable energy sources and diesel engines tends to complicate the sizing and control of the entire system due to the intermittent nature of renewable energy sources. This study sought to investigate this issue in depth. It proposes a robust hybrid controller that can be used to facilitate optimum power sharing between a PV power source and diesel generators based on the dynamics of the available PV energy at any given time. The study also describes a hybrid PV-diesel power plant's essential functional parts that produce electricity for a microgrid using a renewable energy source. Power control needs to be adjusted to reduce the cost of power generation.

An Efficient Public Key Based Security Architecture for Wireless Sensor Networks

  • Haque, Mokammel;Pathan, Al-Sakib Khan;Hong, Choong-Seon
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 춘계학술발표대회
    • /
    • pp.1098-1099
    • /
    • 2007
  • In this paper, we propose a public key based security architecture for Wireless Sensor Networks (WSNs). The basic architecture comprises of two schemes; a key handshaking scheme based on simple linear operations for fast computation and an identity based cryptosystem which does not require any certificate authority. Our analysis shows that, the combined scheme ensures a good level of security and is very much suitable for the energy constrained trend of wireless sensor network.

  • PDF

A LOW-COST PROTOCOL IN SENSOR NETWORK UBIQUITOUS ENVIRONMENT

  • Lee Dong-heui;Cho Young-bok;Kim Dong-myung;Lee Sang-ho
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2005년도 Proceedings of ISRS 2005
    • /
    • pp.766-769
    • /
    • 2005
  • In a ubiquitous environment made up of multiple sensors, most sensors participate in communications with limited battery, and the sensor node isn't able to participate in communications when all the battery is used up. When an existing authentication method is used for the sensor node which has to participate in a long term communication with limited battery, it creates a problem by making the length of network maintenance or sensor node's operation time relatively shorte. Therefore, a network structure where RM (Register Manager) node and AM (Authentication Manager) node are imported to solve the energy consumption problem during a communication process is presented in this thesis. This offers a low power protocol based on safety through a mutual authentication during communications. Through registration and authentication manager nodes, each sensor nodes are ensured of safety and the algorithm of key's generation, encryption/descramble and authentication is processed with faster operation speed. So the amount of electricity used up during the communications between sensor nodes has been evaluated. In case of the amount of electrical usage, an average of $34.783\%$ for the same subnet and 36.855 for communications with two different subnets, are reduced. The proposed method is a protocol which maintains the limited battery for a long time to increase the effectiveness of energy usage in sensor nodes and can also increase the participation rate of communication by sensor nodes.

  • PDF

효율적인 센서 네트워크 보안을 위한 확률적인 필터링 기법 (Probabilistic Filtering Method for Efficient Sensor Network Security)

  • 김진수;신승수
    • 한국산학기술학회논문지
    • /
    • 제13권1호
    • /
    • pp.382-389
    • /
    • 2012
  • 위조된 보고서 공격은 무선 센서 네트워크에서 이벤트가 발생한 위치에 대한 송신 응답과 같은 거짓 경보를 야기하는 것뿐만 아니라 제한된 량의 에너지를 고갈시킨다. 본 논문에서는 위조된 보고서를 필터링하기 위해 확률적인 보안 필터링 기법(PFSS: Probabilistic Filtering method for Sensor network Security)을 제안한다. 제안 내용은 클러스터 헤드와 기지국과의 거리를 이용하여 기지국까지의 중간 클러스터 헤드가 검증 노드인지를 확률적으로 선택하여 보안 검증에 필요한 에너지를 줄이고, 보안 처리에 따른 핫 스팟 문제를 완화시킨다. 제안된 기법의 성능은 수식 분석과 실험을 통하여 분석하였으며, 이를 통하여 제안된 기법이 기존의 보안 검증 처리에 비해 효율적임을 알 수 있다.