• 제목/요약/키워드: energy security

검색결과 912건 처리시간 0.022초

Material Discrimination Using X-Ray and Neutron

  • Jaehyun Lee;Jinhyung Park;Jae Yeon Park;Moonsik Chae;Jungho Mun;Jong Hyun Jung
    • Journal of Radiation Protection and Research
    • /
    • 제48권4호
    • /
    • pp.167-174
    • /
    • 2023
  • Background: A nondestructive test is commonly used to inspect the surface defects and internal structure of an object without any physical damage. X-rays generated from an electron accelerator or a tube are one of the methods used for nondestructive testing. The high penetration of X-rays through materials with low atomic numbers makes it difficult to discriminate between these materials using X-ray imaging. The interaction characteristics of neutrons with materials can supplement the limitations of X-ray imaging in material discrimination. Materials and Methods: The radiation image acquisition process for air-cargo security inspection equipment using X-rays and neutrons was simulated using a GEometry ANd Tracking (Geant4) simulation toolkit. Radiation images of phantoms composed of 13 materials were obtained, and the R-value, representing the attenuation ratio of neutrons and gamma rays in a material, was calculated from these images. Results and Discussion: The R-values were calculated from the simulated X-ray and neutron images for each phantom and compared with those obtained in the experiments. The R-values obtained from the experiments were higher than those obtained from the simulations. The difference can be due to the following two causes. The first reason is that there are various facilities or equipment in the experimental environment that scatter neutrons, unlike the simulation. The other is the difference in the neutron signal processing. In the simulation, the neutron signal is the sum of the number of neutrons entering the detector. However, in the experiment, the neutron signal was obtained by superimposing the intensities of the neutron signals. Neutron detectors also detect gamma rays, and the neutron signal cannot be clearly distinguished in the process of separating the two types of radiation. Despite these differences, the two results showed similar trends and the viability of using simulation-based radiation images, particularly in the field of security screening. With further research, the simulation-based radiation images can replace ones from experiments and be used in the related fields. Conclusion: The Korea Atomic Energy Research Institute has developed air-cargo security inspection equipment using neutrons and X-rays. Using this equipment, radiation images and R-values for various materials were obtained. The equipment was reconstructed, and the R-values were obtained for 13 materials using the Geant4 simulation toolkit. The R-values calculated by experiment and simulation show similar trends. Therefore, we confirmed the feasibility of using the simulation-based radiation image.

빌딩 보안 어플리케이션의 적응 오류제어와 적응 변조의 에너지 효율에 관한 연구 (Energy Efficiency for Building Security Application of Adaptive Error Control and Adaptive Modulation)

  • 롱보라;강희조
    • 한국항행학회논문지
    • /
    • 제11권4호
    • /
    • pp.423-429
    • /
    • 2007
  • 무선 스마트카드는 빌딩 보안 어플리케이션에 주된 역할을 하고 있다. 본 연구는 사용자에게 보다 편리함을 주고 스마트카드 시스템의 성능 개선을 제안한다. 스마트카드는 카드 리더기에 삽입을 하지 않고 장치에서 수센티미터 떨어져도 접근이 허용된다. 적응형 변조와 오류 제어를 통해 전력소비를 제어하는 성능은 필요하다. 본 논문에서는 적응형 리드 솔로몬 코드 기반의 FEC와 링크에서 M계수를 변화시킨 M-FSK변조에 대하여 연구한다. 적응형 변조와 적응형 오류 정정은 다른 다양한 정적스키마와 에너지 효율을 비교한 결과 50% 이상 에너지를 저장한다.

  • PDF

목질계 바이오매스를 이용한 바이오에너지 기술개발 동향 (Trend on Technology Development of Bioenergy from Woody Biomass)

  • 권구중;김남훈
    • Journal of Forest and Environmental Science
    • /
    • 제25권2호
    • /
    • pp.131-138
    • /
    • 2009
  • Recently, various efforts for the extended utilization of woody biomass has been attempted due to the fact that global warming, energy and environmental problems are urgent ones to be solved. Development of new energy sources at our national security level is desperately needed as we depend on almost all of energies supplied from other countries, let alone the economic crisis caused by oil price hike. Woody biomass can be converted to energy by means of thermochemical, biological, or direct combustion processes. Many processes are available for producing bioenergy, such as bioethanol, wood pellet, wood chip, combined heat, and power system. Political support and R&D investment should be provided that can boost the utilization of the wood biomass, the eco-environment, and recyclable and alternative energy resources for national power security. In addition, a long-term strategy that can utilize unused and low efficient woody biomass resources, and systematically collect and manage them in a national level should be set up. Even though the possibility in total exchange of fossil oil with woody biomass is quite low, technology developments of woody biomass for the solution to global warming and environmental problem through its commercialization are expected to grow steadily.

  • PDF

WSN에서 전파범위 기반의 저 전력 클러스터링 알고리즘 (A Low-Power Clustering Algorithm Based on Fixed Radio Wave Radius in WSN)

  • 이충세
    • 융합보안논문지
    • /
    • 제15권3_1호
    • /
    • pp.75-82
    • /
    • 2015
  • 최근 무선 센서 네트워크(WSN : Wireless Sensor Network)에서 센서노드의 에너지 소모 균등성과 효율성을 향상시켜 전제 네트워크의 수명을 최대화하기 위한 다양한 계층적 라우팅 프로토콜들이 제안되고 있다. 특히, 멀티홉기법이 향상된 에너지 효율성과 실제 적용 가능한 모델로 큰 각광받고 있다. 멀티-홉 기법에서는 센서 노드사이 거리에 따라 발송 에너지 능동조절 가능하다고 가정한다. 그러나 무선센서의 물리적 특성을 고려해보면 멀티-홉 기법의 이 가정은 현재 기술로 실제 실현하기 어렵다. 이 논문에서는 센서노드의 전파범위를 기반으로 에너지 효율성을 향상시킨 저 전력 클러스터링 기법을 제안한다. 제안기법은 에너지 효율적이고 기존기법보다 실제 무선센서네트워크에 적용하기 용이하다.

Toward Energy-Efficient Task Offloading Schemes in Fog Computing: A Survey

  • Alasmari, Moteb K.;Alwakeel, Sami S.;Alohali, Yousef
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.163-172
    • /
    • 2022
  • The interconnection of an enormous number of devices into the Internet at a massive scale is a consequence of the Internet of Things (IoT). As a result, tasks offloading from these IoT devices to remote cloud data centers become expensive and inefficient as their number and amount of its emitted data increase exponentially. It is also a challenge to optimize IoT device energy consumption while meeting its application time deadline and data delivery constraints. Consequently, Fog Computing was proposed to support efficient IoT tasks processing as it has a feature of lower service delay, being adjacent to IoT nodes. However, cloud task offloading is still performed frequently as Fog computing has less resources compared to remote cloud. Thus, optimized schemes are required to correctly characterize and distribute IoT devices tasks offloading in a hybrid IoT, Fog, and cloud paradigm. In this paper, we present a detailed survey and classification of of recently published research articles that address the energy efficiency of task offloading schemes in IoT-Fog-Cloud paradigm. Moreover, we also developed a taxonomy for the classification of these schemes and provided a comparative study of different schemes: by identifying achieved advantage and disadvantage of each scheme, as well its related drawbacks and limitations. Moreover, we also state open research issues in the development of energy efficient, scalable, optimized task offloading schemes for Fog computing.

Prediction of Energy Consumption in a Smart Home Using Coherent Weighted K-Means Clustering ARIMA Model

  • Magdalene, J. Jasmine Christina;Zoraida, B.S.E.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.177-182
    • /
    • 2022
  • Technology is progressing with every passing day and the enormous usage of electricity is becoming a necessity. One of the techniques to enjoy the assistances in a smart home is the efficiency to manage the electric energy. When electric energy is managed in an appropriate way, it drastically saves sufficient power even to be spent during hard time as when hit by natural calamities. To accomplish this, prediction of energy consumption plays a very important role. This proposed prediction model Coherent Weighted K-Means Clustering ARIMA (CWKMCA) enhances the weighted k-means clustering technique by adding weights to the cluster points. Forecasting is done using the ARIMA model based on the centroid of the clusters produced. The dataset for this proposed work is taken from the Pecan Project in Texas, USA. The level of accuracy of this model is compared with the traditional ARIMA model and the Weighted K-Means Clustering ARIMA Model. When predicting,errors such as RMSE, MAPE, AIC and AICC are analysed, the results of this suggested work reveal lower values than the ARIMA and Weighted K-Means Clustering ARIMA models. This model also has a greater loglikelihood, demonstrating that this model outperforms the ARIMA model for time series forecasting.

Graph Assisted Resource Allocation for Energy Efficient IoT Computing

  • Mohammed, Alkhathami
    • International Journal of Computer Science & Network Security
    • /
    • 제23권1호
    • /
    • pp.140-146
    • /
    • 2023
  • Resource allocation is one of the top challenges in Internet of Things (IoT) networks. This is due to the scarcity of computing, energy and communication resources in IoT devices. As a result, IoT devices that are not using efficient algorithms for resource allocation may cause applications to fail and devices to get shut down. Owing to this challenge, this paper proposes a novel algorithm for managing computing resources in IoT network. The fog computing devices are placed near the network edge and IoT devices send their large tasks to them for computing. The goal of the algorithm is to conserve energy of both IoT nodes and the fog nodes such that all tasks are computed within a deadline. A bi-partite graph-based algorithm is proposed for stable matching of tasks and fog node computing units. The output of the algorithm is a stable mapping between the IoT tasks and fog computing units. Simulation results are conducted to evaluate the performance of the proposed algorithm which proves the improvement in terms of energy efficiency and task delay.

Analysis and Prediction of Energy Consumption Using Supervised Machine Learning Techniques: A Study of Libyan Electricity Company Data

  • Ashraf Mohammed Abusida;Aybaba Hancerliogullari
    • International Journal of Computer Science & Network Security
    • /
    • 제23권3호
    • /
    • pp.10-16
    • /
    • 2023
  • The ever-increasing amount of data generated by various industries and systems has led to the development of data mining techniques as a means to extract valuable insights and knowledge from such data. The electrical energy industry is no exception, with the large amounts of data generated by SCADA systems. This study focuses on the analysis of historical data recorded in the SCADA database of the Libyan Electricity Company. The database, spanned from January 1st, 2013, to December 31st, 2022, contains records of daily date and hour, energy production, temperature, humidity, wind speed, and energy consumption levels. The data was pre-processed and analyzed using the WEKA tool and the Apriori algorithm, a supervised machine learning technique. The aim of the study was to extract association rules that would assist decision-makers in making informed decisions with greater efficiency and reduced costs. The results obtained from the study were evaluated in terms of accuracy and production time, and the conclusion of the study shows that the results are promising and encouraging for future use in the Libyan Electricity Company. The study highlights the importance of data mining and the benefits of utilizing machine learning technology in decision-making processes.

Review on Energy Efficient Clustering based Routing Protocol

  • Kanu Patel;Hardik Modi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.169-178
    • /
    • 2023
  • Wireless sensor network is wieldy use for IoT application. The sensor node consider as physical device in IoT architecture. This all sensor node are operated with battery so the power consumption is very high during the data communication and low during the sensing the environment. Without proper planning of data communication the network might be dead very early so primary objective of the cluster based routing protocol is to enhance the battery life and run the application for longer time. In this paper we have comprehensive of twenty research paper related with clustering based routing protocol. We have taken basic information, network simulation parameters and performance parameters for the comparison. In particular, we have taken clustering manner, node deployment, scalability, data aggregation, power consumption and implementation cost many more points for the comparison of all 20 protocol. Along with basic information we also consider the network simulation parameters like number of nodes, simulation time, simulator name, initial energy and communication range as well energy consumption, throughput, network lifetime, packet delivery ration, jitter and fault tolerance parameters about the performance parameters. Finally we have summarize the technical aspect and few common parameter must be fulfill or consider for the design energy efficient cluster based routing protocol.

시변민감도를 이용한 안전도제약 최적조류계산의 On-Line 적용 알고리즘 (The On-Line Application Algorithm of SCOPE Using Time-varying Sensitivities)

  • 김발호;신영균
    • 에너지공학
    • /
    • 제13권1호
    • /
    • pp.60-67
    • /
    • 2004
  • 규제완화된 경쟁적 전력시장으로의 이행은 전력계통의 운영 및 계획에 있어서 기존의 중앙급전방식과는 다른 새로운 개념을 필요로 하고 있다. 경쟁적 전력시장에서의 전력계통 운영은 경제적 측면을 충분히 고려하여 보다 적은 여유로 운영될 것으로 예상된다. 따라서 SCOPF(Security Constrained Optimal Power Flow서 역할이 커지면서 실시간 안전도 처리에 대한 중요성이 보다 부각되고 있다. 본 논문은 On-Line 상의 적용을 가능하게 하는 SCOP떠 응용을 다룬다. 전력계통의 안전도 여유는 계통의 조건과 부하상황에 따라 시시각각 변화한다. 따라서 안전도 처리를 위한 민감도 계수 역시 전력계통 상태에 따라 재계산되고 적용 시에 갱신 처리되어야 한다. 본 논문의 목적은 안전도 처리를 위한 민감도 계수의 효율적인 사용을 통해 적정 안전도를 확보하여 이 알고리즘을 계통운영상에 실시간으로 적용 가능토록 하기 위함이다. 사례연구에서는 제안된 메커니즘을 간단한 예제계통에 적용하여, 상정사고에 대한 보다 안정적인 결과가 나타남을 보였다.