Dissertations / Theses on the topic 'Diagnostics of energy security'

To see the other types of publications on this topic, follow the link: Diagnostics of energy security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Diagnostics of energy security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Mate, Amol. "Energy analysis and diagnostics in wood manufacturing industry." Morgantown, W. Va. : [West Virginia University Libraries], 2002. http://etd.wvu.edu/templates/showETD.cfm?recnum=2455.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2002.
Title from document title page. Document formatted into pages; contains viii, 138 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 105-108).
APA, Harvard, Vancouver, ISO, and other styles
2

Mardikar, Yogesh Mukesh. "Energy analysis, diagnostics, and conservation in semiconductor manufacturing." Morgantown, W. Va. : [West Virginia University Libraries], 2004. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3748.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2004.
Title from document title page. Document formatted into pages; contains viii, 152 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 106-108).
APA, Harvard, Vancouver, ISO, and other styles
3

Seslikaya, Huseyin. "Energy security and Turkey." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FSeslikaya.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Middle East, South Asia, Sub-Saharan Africa))--Naval Postgraduate School, December 2008.
Thesis Advisor(s): Looney, Robert E. "December 2008." Description based on title screen as viewed on February 2, 2009. Includes bibliographical references (p. 65-70). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
4

Taramonli, Chryssanthi. "Energy conscious adaptive security." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/74094/.

Full text
Abstract:
The rapid growth of information and communication systems in recent years has brought with it an increased need for security. Meanwhile, encryption, which constitutes the basis of the majority of security schemes, may imply a significant amount of energy consumption. Encryption algorithms, depending on their complexity, may consume a significant amount of computing resources, such as memory, battery power and processing time. Therefore, low energy encryption is crucial, especially for battery powered and passively powered devices. Thus, it is of great importance to achieve the desired security possible at the lowest cost of energy. The approach advocated in this thesis is based on the lack of energy implication in security schemes. It investigates the optimum security mode selection in terms of the energy consumption taking into consideration the security requirements and suggests a model for energy-conscious adaptive security in communications. Stochastic and statistical methods are implemented – namely reliability, concentration inequalities, regression analysis and betweenness centrality – to evaluate the performance of the security modes and a novel adaptive system is proposed as a flexible decision making tool for selecting the most efficient security mode at the lowest cost of energy. Several symmetric algorithms are simulated and the variation of four encryption parameters is examined to conclude the selection of the most efficient algorithm in terms of energy consumption. The proposed security approach is twofold, as it has the ability to adjust dynamically the encryption parameters or the energy consumption, either according to the energy limitations or the severity of the requested service.
APA, Harvard, Vancouver, ISO, and other styles
5

Bychkova, Vladyslava. "Energy and environmental security." Thesis, Київський національний університет технологій та дизайну, 2019. https://er.knutd.edu.ua/handle/123456789/13037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Buche, Silvain. "Polymer electrolyte fuel cell diagnostics." Thesis, University of Bath, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.285318.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schirninger, Rene, and Stefan Zeppetzauer. "Wireless On-Board Diagnostics." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-193.

Full text
Abstract:

Wireless On-board diagnostics functionality, which is a future outlook to vehicle system

parameter analysis, enables measurements and controlling without the limitation of a physical

connector. Today every vehicle must by law provide the possibility to analyze engine and

emission related parameters (OBD II). The wireless connection requires a high security level

to prevent unauthorized communication establishment with the truck’s bus system. The aim

of the project is to make a survey of the available security mechanisms and to find the most

promising solutions. Furthermore, several usage scenarios and access right levels are

specified and a risk analysis of the whole system is made. The greatest challenge is the

specification and implementation of a proper key-exchange mechanism between the analyzing

device and the truck’s bus system, which is therefore carried out with the highest possible

level of awareness. Consequently several different concepts have been formulated based on

the different usage scenarios.

APA, Harvard, Vancouver, ISO, and other styles
8

Yousif, F. B. "Some atomic collisions relevant to fusion diagnostics." Thesis, Queen's University Belfast, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.375006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Estenberg, Gabriel. "The National Security Perspective Revisited. States’ Energy Security and the Environmental Security." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22800.

Full text
Abstract:
The purpose of this thesis is to counterargue Simon Dalby’s claim that the national security perspective should be replaced by a global security perspective. Dalby argues that the national security is inappropriate to capture the current issues regarding the environmental security. To counterargue Dalby’s claim, I represent the national security perspective by using the perspective of states’ energy security, and compare current trends and issues regarding states’ energy security and the environmental security. This is done to argue that states can either chose to enhance their own energy security or the environmental security. Prisoners' Dilemma is then used as a theoretical framework on an explanatory example to provide insights about a dilemma, called the Energy- Environment Dilemma in this thesis, that curbs states’ ability to commit themselves to the cause of protecting the environmental security. The explanatory example used is the strategic importance of the Northwest passage for the U.S. and Canada. The results of this thesis suggests that the national security perspective, in combination with Prisoners’ Dilemma, is useful to provide insights about the Energy-Environmental Dilemma. Replacing it with a global security perspective would be to ignore a perspective which can provide insights about a challenge for states to commit to the cause of protecting the environmental security.
APA, Harvard, Vancouver, ISO, and other styles
10

Hengel, Gabriel Josiah. "21st century energy security tensions within the transatlantic security community." Thesis, University of Aberdeen, 2017. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=235817.

Full text
Abstract:
Much has been written during this century's energy security debate about the external threats the West faces to oil and natural gas supplies. This literature is often prescriptive, offering solutions to address these assumed threats. This research takes a much-needed look inward at the pressures placed on the multi-dimensional relationships within the transatlantic security community. An original contribution to knowledge is made through the exploration of these energy security tensions within the community and how they impact the two energy security prerequisites, availability and affordability. An examination of key oil and natural gas issues in the United States, Europe and the main transatlantic institutions demonstrates that the transatlantic community is very secure and often acts inadvertently to undermine its own energy security condition. Thus, the conventional wisdom that the supply of fossil fuel energy is a leading and high-priority security issue is challenged. Contrary to most literature, the conclusion is reached that energy security is actually not a high-level concern to the transatlantic security community, and that on occasions leading members of the community, who are high energy consumers, choose to put fossil fuel energy supply at risk to pursue political and strategic policies assigned a higher priority. In practice, producer states are found to be much more dependent on uninterrupted energy trade than consumer states, positively contributing to the reliability of oil and natural gas supply. In fact, through highly competitive political engagement with Russia and the Middle East North Africa region, the transatlantic states risk undermining the energy security of the community. Nevertheless, transatlantic energy security tensions have not risen to an actionable level. When placed in the overall context of transatlantic security issues, these energy security tensions do not threaten to divide the transatlantic community in any meaningful way.
APA, Harvard, Vancouver, ISO, and other styles
11

Gunduc, Yildirim. "Energy Security And Central Asian Geopolitics." Master's thesis, METU, 2012. http://etd.lib.metu.edu.tr/upload/12615176/index.pdf.

Full text
Abstract:
Energy security has become an important part of national security policies in the last decades. Policies concerning energy security are designed and implemented in different ways by countries based on their geographical, political and economic imperatives. This thesis analyzes the securitization of energy resources in Central Asia and the roles of the US, China, India and Russia as major actors of the Central Asian energy politics in the post-Soviet period. The conditions shaping Central Asian countries decision making process&rsquo
as well as the policies and priorities of the US, China, India and Russia are analyzed in the light of latest energy policy developments and related pipeline projects in the region. While doing so, this thesis aims to compare and contrast the practices and policies of the US, China, India and Russia in securing access to energy resources of Central Asia.
APA, Harvard, Vancouver, ISO, and other styles
12

Vikström, Hanna. "Rare Metals: Energy Security and Supply." Thesis, Uppsala universitet, Institutionen för fysik och astronomi, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-168130.

Full text
Abstract:
Lithium and neodymium are two critical materials in our modern society, many technological solutions depend on them. Lithium is used in batteries, which are used in cars and portable electronics. Neodymium, which is a rare earth element, is mainly used in permanent magnets which are used in smartphones, hard disc drives and turbines. There are many reports regarding the availability of the metals, with different results. The available data on the reserves varies considerably, from the few sources there are. In this report, based on geological availability, forecasts are done to investigate how much the production can increase and when it will peak. The prognoses are based on historic production to which different functions, the logistic, gompertz and richards, are fitted with the least square method. The production will peak in the end of this century and in the beginning of the next century for both metals. The production of lithium does not seem to be sufficient for both producing electric and hybrid cars with only li-ion batteries along with fusion. The neodymium production will be sufficient for producing a lower percentage of direct driven wind turbines and electric cars with NiMH batteries. Lithium in seawater is sometimes considered a future source. Since the lithium concentration is low, large volumes have to be processed in order to extract a reasonable amount of lithium. Currently it is not economic to extract lithium from seawater.
APA, Harvard, Vancouver, ISO, and other styles
13

Dorlhiac, Gabriella de Figueiredo. "Ethanol's impact on Brazilian energy security." Connect to Electronic Thesis (CONTENTdm), 2010. http://worldcat.org/oclc/647971342/viewonline.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Xu, Chen. "EU Energy Situations and Supply Security." Thesis, KTH, Energy Technology, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-9131.

Full text
Abstract:

Energy supply security is a hot topic today. It highly influences energy market, national security and also residents’ daily lives. However, due to different aims and study strategies, definitions of energy supply security are different. In this report, it is defined as stable energy supply processes that result from good infrastructure, delivery of energy sources, carriers and services, which are sturdily controlled by effective energy policies. Prices of energy supply system

are also maintained on a reasonable level over a continuous period thanks to the efficient crises assessment and management.

In order to make a comprehensive research, energy situation has been deeply investigated on worldwide, EU and Swedish levels, respectively. Results from these investments obviously certify that due to the big amount of populations, there are significant imbalances between energy supply and demands in developing countries. To make things better, these imbalances don’t exist in developed world, like EU Members including Sweden because of applications of advanced technologies and wide utilizations of renewable energy carriers. Oppositely, greenhouse gases emission is a severe problem in the world, which gives rise to temperature increasing year by year! Besides the global warming, some other factors also bring about uncertainties to energy supply security, so that efficient policies are necessary in order improve the recent

situations and to create a secure atmosphere for energy supply, such as

Directive 98/30/EC for natural gas supply security, Directive 2003/55/EC for integration and compatibility of the energy regulation and Directive 2003/54/EC, the first policy that regulates EU electricity market as well as IEM Directive, which is the improvement of Directive 2003/54/EC, etc.

Although several policies aiming at creation of competitive energy markets and achieving energy supply security, vulnerabilities still exist in EU energy supply system, such as limited primary energy sources and high dependence on nuclear powers, energy network capacity inadequacy, high voltage electricity transmission, etc. Concerning Swedish energy supply system, extreme low temperatures in winter, drilling technologies and high economic budgets for heat sources from underground, hurricanes, thunderstorms to wind turbines and man-made disruptions are all potential vulnerabilities. Regarding these negative aspects, recommendations are given on four different levels, which are global, EU, Swedish and individual perspectives. Specific suggestions to achieve energy supply security include independence of different energy supplies, to enhance international cooperation, periodic assessments and inspections for energy facilities, population control, to keep original energy policies updated, to enhance abilities to resist abnormal weather conditions, to develop heat pump technologies and try to use energy in efficient ways, etc.

APA, Harvard, Vancouver, ISO, and other styles
15

Deutch, John M. "Future United States Energy Security Concerns." MIT Joint Program on the Science and Policy of Global Change, 2004. http://hdl.handle.net/1721.1/5544.

Full text
Abstract:
Without energy, the economy can neither function nor grow. However, for at least the next half-century, the U.S. will not have an inexhaustible supply of inexpensive, clean energy. Dependence on energy imports, vulnerability to energy supply disruption, and issues of proliferation of nuclear material are cause for special concern. This paper addresses the geopolitical realities of and connections between energy and security, especially how the energy security issues that we face in the future differ from those we faced in the past.
Abstract in HTML and technical report in PDF available on the Massachusetts Institute of Technology Joint Program on the Science and Policy of Global Change website (http://mit.edu/globalchange/www/).
APA, Harvard, Vancouver, ISO, and other styles
16

Borzi, Eleonora, and Djiar Salim. "Energy Consumption and Security in Blockchain." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-285901.

Full text
Abstract:
Blockchain is a Distributed Ledger Technology that was popularized after the release of Bitcoin in 2009 as it was the first popular blockchain application. It is a technology for maintaining a digital and public ledger that is decentralized, which means that no single authority controls nor owns the public ledger. The ledger is formed by a chain of data structures, called blocks, that contain information. This ledger is shared publicly in a computer network where each node is called a peer. The problem that arises is how to make sure that every peer has the same ledger. This is solved with consensus mechanisms which are a set of rules that every peer must follow. Consensus mechanisms secure the ledger by ensuring that the majority of peers can reach agreement on the same ledger and that the malicious minority of peers cannot influence the majority agreement. There are many different consensus mechanisms. A problem with consensus mechanisms is that they have to make a trade-off between low energy consumption and high security. The purpose of this report is to explore and investigate the relationship between energy consumption and security in consensus mechanisms. The goal is to perform a comparative study of consensus mechanisms from an energy consumption and security perspective. The consensus mechanisms that are compared are Proof of Work, Proof of Stake and Delegated Proof of Stake. The methodology used is literature study and comparative study by using existing work and data from applications based on those consensus mechanisms. The results conclude that Proof of Work balances the trade-off by having high energy-consumption and high security, meanwhile Proof of Stake and Delegated Proof of Stake balance it by having low energy consumption but lower security level. In the analysis, a new factor arose, decentralization. The new insight in consensus mechanisms is that decentralization and security is threatened by an inevitable centralization where the ledger is controlled by few peers.
Blockchain är en så kallad distribuerad huvudbok teknologi som fick ett stort genombrott med den populära blockchain applikationen Bitcoin i 2009. Teknologin möjliggör upprätthållandet av en digital och offentlig huvudbok som är decentraliserad, vilket betyder att ingen ensam person eller organisation äger och kontrollerar den offentliga huvudboken. Huvudboken i blockchain är uppbyggt som en kedja av block, dessa block är datastrukturer som innehåller information. Huvudboken distribueras i ett nätverk av datorer som kallas för noder, dessa noder ägs av en eller flera personer. Problemet är att alla noderna i nätverket måste ha identiska huvudbok. Detta problem löses med en uppsättning av regler som noderna måste följa, denna uppsättning kallas för konsensus mekanism. Konsensus mekanismer säkrar huvudboken genom att möjliggöra en överenskommelse bland majoriteten av noderna om huvudbokens innehåll, och ser till att oärliga noder inte kan påverka majoritetens överenskommelse. Det finns flera olika konsensus mekanismer. Ett problem med konsensus mekanismer är att de är tvungna att göra en avvägning mellan låg energianvändning och hög säkerhet. Syftet med denna rapport är att undersöka och utreda relationen mellan energianvändning och säkerhet i konsensus mekanismer. Målet är att utföra en komparativ analys av konsensus mekanismer utifrån energianvändning och säkerhet. Konsensus mekanismerna som jämförs är Proof of Work, Proof of Stake och Delegated Proof of Stake. Metodologin som används är litteraturstudier och komparativ analys med hjälp av existerande metoder och data från applikationer som använder konsensus mekanismerna. Resultatet visar att Proof of Work väljer hög säkerhet på bekostnad av hög energianvändning, medan Proof of Stake och Delegated Proof of Stake väljer låg energianvändning men på bekostnad av lägre säkerhet. Analysen ger en ny inblick som visar att centralisering är en oundviklig faktor som hotar säkerheten.
APA, Harvard, Vancouver, ISO, and other styles
17

Winzer, Christian. "Defining, measuring and regulating energy security." Thesis, University of Cambridge, 2013. https://www.repository.cam.ac.uk/handle/1810/265609.

Full text
Abstract:
Energy security is one of the three pillars of energy policy next to environmental sustainability and economic efficiency. Despite its importance for policy making, there is no agreement about the definition of energy security and the metrics that could be used to measure the efficiency of different policies. As a result of this, it may be that both a political intervention in one direction and an intervention in the opposite direction could be justified on grounds of energy security. In our thesis we review the multitude of definitions of energy security. They can be characterized according to the sources of risk, the scope of the impacts, and the severity filters in the form of the speed, size, sustention, spread, singularity and sureness of impacts. Using a stylized case study for three European countries, we illustrate how the selection of conceptual boundaries along these dimensions determines the outcome. In order to reduce the overlap between security of supply and other policy objectives we propose the definition of energy security as the continuity of energy supplies relative to demand. The choice of the conceptual boundaries along the other dimensions remains a subjective decision that has to be taken by policy makers in a dialogue with society. Based on the definition of energy security as the continuity of supplies relative to demand, we examine how accurately different modelling approaches and metrics capture this concept. We find most of the wide-spread indicators, such as import shares, concentration measures and composite indicators based on expert elicitation are very rough heuristics that can easily be shown to produce inaccurate results. Simple modelling approaches such as analysis based on portfolio theory, or electricity system simulations offer some improvement, but still suffer from structural shortcomings and limitations in the way they model interdependencies. In this thesis we suggest a modelling approach which allows us to capture the interdependencies between natural, technical and human risk sources and quantify their combined impact on the continuity of energy supplies within a fixed infrastructure system. We use a case study of Italy to compare the outputs of our model with alternative metrics and simplified modelling approaches. Finally, we investigate the degree and the cost at which regulatory interventions in the form of so-called capacity mechanisms may increase the continuity of supplies in the electricity market. In contrast to previous research we find that the choice of a capacity mechanism may both be influenced by the extent to which it should be robust towards different regulatory errors as well as by the question whether it is evaluated from the perspective of consumer cost or from a welfare perspective.
APA, Harvard, Vancouver, ISO, and other styles
18

Olvegård, Maja. "Emittance and Energy Diagnostics for Electron Beams with Large Momentum Spread." Doctoral thesis, Uppsala universitet, Högenergifysik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-198080.

Full text
Abstract:
Following the discovery of the Higgs-like boson at the Large Hadron Collider, there is demand for precision measurements on recent findings. The Compact Linear Collider, CLIC, is a candidate for a future linear electron-positron collider for such precision measurements. In CLIC, the beams will be brought to collisions in the multi-TeV regime through high gradient acceleration with high frequency RF power. A high intensity electron beam, the so-called drive beam, will serve as the power source for the main beam, as the drive beam is decelerated in special structures, from which power is extracted and transfered to the main beam. When the drive beam is decelerated the beam quality deteriorates and the momentum spread increases, which makes the beam transport challenging. Dedicated diagnostics to monitor the momentum profile along each bunch train and transverse profile diagnostics will be needed to guarantee the reliability of the decelerator and consequently the power source of the main beam acceleration. A test facility, CTF3, has been constructed at CERN to validate key technical aspects of the CLIC concept. The beam quality in the decelerator will be investigated in the test beam line, TBL, where several power extraction structures reduce the drive beam energy by up to 55%. At the same time, the single-bunch rms energy spread grows from the initial value of 1% to almost 6%. To monitor the parameters of such a beam is challenging but crucial for the optimization of the beamline. In this thesis we report on progress made on adapting generally used methods for beam profile measurements to the demanding conditions of a wide momentum profile. Two detector technologies are used for measuring transverse profile and momentum profile and we discuss the performance of these instruments, in the view of the large momentum spread and with the outlook towards equivalent beam profile monitors in the CLIC decelerator.
APA, Harvard, Vancouver, ISO, and other styles
19

Carnell, Mark Thomas. "The application of optical diagnostics to high energy electromagnetic acoustic transducers." Thesis, Loughborough University, 1995. https://dspace.lboro.ac.uk/2134/11239.

Full text
Abstract:
This thesis is concerned with the design and construction of an electromagnetic acoustic transducer (EMAT) and the characterisation of its acoustic field both conventionally, using a hydrophone and with high resolution laser illuminated schlieren techniques. During the early 80s the introduction of the EMA T along with the other types of shock wave source used for lithotripsy, revolutionised the treatment of stone disease. The process of shock wave induced destruction of calculi and the use of shock waves in other areas of medicine will be discussed, along with the causes and effects of stone disease in man. For the first time high temporal and spatial resolution schlierenimages of the shock waves and there interaction with simulation kidney stones have been recorded. The technique provides a clearer picture of the fragmentation process and may assist research into the suitability of shock wave treatment in other areas of medicine currently under investigation. Schlieren studies of the acoustic field have shown the complex structure of not only the EMA T shock wave, but also that associated with cavitation in the field. The primary source of cavitation is due to the rupture and subsequent collapse of bubbles generated in the water by the strong rarefaction phase of the shock wave. The images give evidence for the interaction of these 'primary' cavitation shocks with bubbles in the field, the collapse of some of these bubbles giving rise to additional or 'secondary' cavitation shocks. An optical lensing effect introduced by the shock has also been investigated. Objects seen through or immersed in the field of an EMAT shock wave such as cavitation, appear highly distorted, due to the strong positive and negative lensing effects associated with the changing refractive index of the compression and rarefaction cycles of the shock wave.
APA, Harvard, Vancouver, ISO, and other styles
20

ROCHA, JOSE EDUARDO NUNES DA. "INTELLIGENT ENERGY SYSTEM DIAGNOSTICS AND ANALYSIS OF INVESTMENTS IN ENERGY EFFICIENCY PROJECTS MANAGED BY DEMAND SIDE." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2013. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=35343@1.

Full text
Abstract:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO
PROGRAMA DE EXCELENCIA ACADEMICA
Os Projetos de Eficiência Energética Gerenciados pelo Lado da Demanda (GLD), bem como todo projeto de engenharia, requerem decisões de investimentos que possuem incertezas associadas. As incertezas econômicas devem-se a fatores exógenos ao projeto sendo, em geral, representadas por oscilações estocásticas dos custos da energia elétrica. As incertezas técnicas estão associadas a fatores internos, como o desempenho dos projetos em função da tecnologia eficiente escolhida, da sua operação e manutenção. A decisão dos clientes e investidores na aquisição de Projetos de Eficiência Energética depende do retorno esperado nos ganhos com a energia economizada, como por exemplo, na venda desta energia no mercado de curto prazo. Esta tese investiga uma nova metodologia que, considerando as incertezas técnicas e econômicas, efetua uma análise mais abrangente e realista do cenário complexo de negócios que envolvem os Projetos de Eficiência Energética no Brasil. A metodologia contribui para a tomada de decisão considerando a flexibilidade gerencial e a avaliação dos riscos específicos dos projetos. Esta se baseia em técnicas inteligentes para a otimização de diagnósticos energéticos associados à análise de opções reais e avaliação econômica de Projetos de Eficiência Energética Gerenciados pelo Lado da Demanda (GLD), aplicados ao setor de energia elétrica no Brasil. A metodologia é avaliada em dois Projetos de Eficiência Energética, para os usos finais de Iluminação e Climatização de Ambientes, em uma unidade consumidora da classe Comercial, localizada na Cidade do Rio de Janeiro e conectada ao sistema de distribuição em Média Tensão (13,8kV). Os resultados revelaram que a partir da aplicação de Algoritmos Genéticos na otimização de diagnósticos energéticos puderam-se construir subprojetos originados de um projeto maior, mantendo-se, ou até ampliando-se a Relação Custo vs. Beneficio (RCB). E, desta forma, contribuir para a viabilização de alternativas ótimas de projetos que incentivam a aplicação da Eficiência Energética no Brasil.
The Energy Efficiency Projects Managed by Demand Side (DSM), as well as all engineering design, require investment decisions that have associated uncertainties. Economic uncertainties are due to factors exogenous to the project being generally represented by stochastic fluctuations of electricity costs. The technical uncertainties are associated with internal factors such as performance of the projects on the basis of efficient technology chosen, its operation and maintenance. The decision of customers and investors in the acquisition of Energy Efficiency Projects depends on the expected return on the earnings of the energy saved, for example, the sale of this energy in the short term. This thesis investigates a new methodology which, considering the technical and economic uncertainties, performs a more comprehensive and realistic business complex scenario involving the Energy Efficiency Projects in Brazil. The methodology helps decision making considering managerial flexibility and risk assessment of specific projects. This is based on intelligent techniques for optimizing energy diagnoses associated with real options analysis and economic evaluation of Energy Efficiency Projects Managed by Demand Side (DSM), applied to the electricity sector in Brazil. The methodology is evaluated in two Energy Efficiency Projects for the end uses of lighting and Air Conditioning, in a consumer unit of the Commercial category, located in the city of Rio de Janeiro and connected to the distribution system in Medium Voltage (13.8kV). The results showed that with the application of genetic algorithms in optimization of energy diagnoses subprojects originated from a larger project could be built, maintaining or even widening the Cost vs. Value. Benefit (RCB) ratio. And in this way, contribute to the viability of alternative optimal designs that encourage the implementation of Energy Efficiency in Brazil.
APA, Harvard, Vancouver, ISO, and other styles
21

Söderquist, Mårten. "Tiny Security : Evaluating energy use for security in an IoT application." Thesis, Mittuniversitetet, Institutionen för data- och systemvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36860.

Full text
Abstract:
IoT devices are   increasingly used in the process of gathering scientific data. In   environmental monitoring IoT devices can be used as remote sensing devices to   collect information about e.g. temperature. To keep data reliable, various   security aspects have to be considered. Constrained devices are limited by   memory size and battery life, a security solution has to be developed with   this in mind. In this study an IoT security solution was developed in collaboration   with a research group in environmental science at Umeå University. We   selected commonly used algorithms and compared them with the goal to provide   authentication and integrity for an IoT application, while minimizing energy   use running on an Atmega 1284P. The results showed that the encryption   algorithm AES-256-GCM is a good choice for a total security solution.   AES-256-GCM provides authenticated encryption with additional data while, in   relation to the other tested algorithms, using energy at a low level and   leaving a small program size footprint.
APA, Harvard, Vancouver, ISO, and other styles
22

Kaibjian, Jeff. "Enhancing Security in Telemetry Post-Processing Environments with Continuous Diagnostics and Mitigation (CDM)." International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577520.

Full text
Abstract:
ITC/USA 2014 Conference Proceedings / The Fiftieth Annual International Telemetering Conference and Technical Exhibition / October 20-23, 2014 / Town and Country Resort & Convention Center, San Diego, CA
While great strides have been made in recent years by government agencies in deploying proactive network security tools, the federal government as a whole desires to continue to press the state of the art in protecting its IT infrastructure. To this end, the US Department of Homeland Security (DHS) has created the Continuous Diagnostic and Mitigation (CDM) program [1] (also known as Continuous Monitoring, CM). It strives to establish a technology framework whereby agency federal government IT networks can be continuously monitored for threats and vulnerabilities, providing an analysis and correlation capability that will enable entities to better evaluate risk. It also defines a hierarchical dash-boarding capability that facilitates both aggregation and communication of each agency's network health status into abstracted levels of summary so the federal system as a whole can be better evaluate their IT security posture. Going forward, these technologies will dramatically impact all government agencies, the Department of Defense (DOD), and commercial entities.
APA, Harvard, Vancouver, ISO, and other styles
23

Camilleri, James. "India's energy security : understanding its strategic condition." Thesis, University of Aberdeen, 2011. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=186862.

Full text
Abstract:
This thesis considers India's pursuit of energy security. Defining energy security within traditional parameters of supply, delivery, diversification of fuels and suppliers, and affordable prices; the work considers India's energy security condition by surveying the core energy sectors including coal, oil and gas, hydroelectricity, nuclear power and renewables. India's pursuit of energy security is then disaggregated into domestic and international arenas and both are analysed in turn. Considerable attention is paid to the international dimension where India's quest to acquire energy resources is contextualised within bilateral relations with specific countries. What the proceeding analysis makes clear is that the international arena offers considerable opportunities, but also constraints on, the realisation of greater energy security. Chapter one analyses global trends in the main energy sectors of coal, oil, natural gas, hydroelectricity, nuclear power and renewables. Historically, the fortunes of the global energy sectors have mirrored trends in the global economy. Since 2008, most of the world's major industrialised economies have experienced negative or greatly reduced levels of growth. This is primarily due to the proliferation of vast quantities of debt that have capsized several financial institutions and are adversely affecting the liquidity and solvency of many developed governments. The global energy sectors have also been deeply affected by the economic downturn with access to funds for the development of new infrastructure squeezed. The recent poor economic growth of these countries has further accentuated the downward trend they have experienced in energy consumption. Nevertheless, many parts of the developing world, including India, have only been marginally affected by the global economic downturn and continue to develop rapidly. Consequentially most of the growth in demand for energy is coming from developing countries, particularly India. Although there are slight variations depending on sector, this dual trend of stagnation in the developed world and rapid growth in the developing is one ofthe recurring themes in the global energy markets. It is within this context that the second chapter considers India's energy security condition. Detailed analysis of the coal, oil, gas, hydroelectric and renewable sectors demonstrate succinctly that India is experiencing considerable growing pains. While several challenges are unique to each sector the chapter also identifies several systemic problems, including insufficient supply, rampant demand, a tendency to import.
APA, Harvard, Vancouver, ISO, and other styles
24

Melin, Erik. "Depoliticising Energy : A Review of Energy Security in Swedish Policy-Making." Thesis, Uppsala universitet, Institutionen för arkeologi och antik historia, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-353430.

Full text
Abstract:
In order to cope with the changing climate, there will be a need for mitigating transformations of a scope, speed and magnitude that are unprecedented in human history, but the consensus- and market-driven approach is inhibiting this transformation. This thesis reviews how various discourses and debates on energy policy within Swedish governments have changed between 1974 and 2017, through the lenses of energy security and depoliticisation, and how a better understanding of these debates and discourses may inform the impending large-scale transformation required to meet the challenge of climate change. Some of the main findings are that (1) nuclear power and the result of the nuclear power referendum have been decisive for energy policy, and that nuclear power will remain of vital importance in the twenty-first century. (2) Energy has become increasingly depoliticised since the 1980s, ensuing the referendum on nuclear power. (3) The discourse on energy security has shifted towards market-based solutions: in the 2000s, climate change is to be mitigated through consumer- oriented solutions such as green certificates. Through privatisation, it essentially has become up to the consumer, deciding whether to participate in mitigation of climate change.
APA, Harvard, Vancouver, ISO, and other styles
25

Strydom, John. "Energy and security : the role of renewable energy in South Africa." Diss., University of Pretoria, 2015. http://hdl.handle.net/2263/52327.

Full text
Abstract:
Conceptualising energy security is of the upmost importance when considering any definition of energy security applicable to a country or geographical context. This conceptualisation leads to the definition and allocation of applicable influencing elements, that ultimately underpin this definition, but more importantly lead to policy and the associated legislation formulation. A major contributing factor to energy security for any country is the understanding of the relationship between economic growth and energy consumption. There are various phases (Growth, Conservation, Neutral and Feedback hypothesis) of this relationship and each is represented by a different causal direction. This relationship forms a critical factor to consider when conceptualising energy security. A Second critical factor underpinning energy security is the selection of the appropriate electricity generation mix. Currently South Africa is dominated by coal as energy source, with nuclear, gas, diesel and recently renewable sources that contribute electricity to the national grid. Much of the worlds, including South Africa, generation fleet is reaching end of life and is standing at a pivotal point having to decide on the appropriate energy mix that allows transitioning to an environmentally friendly generation fleet. This research set out to review the South African energy policies to ascertain whether the encapsulated elements are still valid and current, to review the historical 3 :2 economic growth and energy consumption relationship utilised in the Integrated Resource Plan 2010 formulation to determine its validity and ultimately to explore the possibility of a 100% renewable energy generation profile for South Africa. A case study methodology was employed, where interviews with industry experts were analysed and validity of emerging themes plaid with the introduction of secondary data. The research has found that i) the current definition of energy security, as stipulated in the South Africa Energy Master Plan (2007), is out of date and needs revision, ii) the historical 3 :2 economic growth and energy consumption relationship is out of date and it is recommended that a bottom up sectoral analysis be done to determine the current relationship and iii) the a 100% renewable energy generation profile for South Africa is not currently feasible until such time as electricity storage becomes an economical viable option.
Mini-disseration (MBA)--University of Pretoria, 2015.
nk2016
Gordon Institute of Business Science (GIBS)
MBA
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
26

Fuentes, Ruiz Sergio. "Energy security in power systems within the frame of energy transitions." Doctoral thesis, Universitat Politècnica de Catalunya, 2021. http://hdl.handle.net/10803/672889.

Full text
Abstract:
Climate change is real. Global human population is growing as never before. Natural resources are limited. These factors have taken different countries to embrace new pathways in order to fulfill the energy needs of their population, understanding that energy is a fundamental instrument for achieving sustainable development. Since each economy decides, according to its needs, possibilities and interests, its own shift of energy production and consumption, this tendency has received the name of energy transitions. Energy transitions, through digitalization, decentralization and decarbonization of the energy system, have placed the power sector as the center of modern infrastructures, making it imperative to procure its security in the long-term. This thesis is focused on the security of electrical systems, for which, after performing a thorough review on energy policies of different economies, it presents a multi-dimensional index as a tool for policy makers aimed to assess long-term security of power systems. The composed index is subsequently applied to different nations from two different approaches: the tracking of a country’s development and the evaluation, comparison and ranking of different economies in a specific time frame. The designed tool represents a comprehensive framework for assessing -and improving- energy security in power systems, being this precisely the main contribution of the present thesis: the development and proposal of an instrument that contributes, through the betterment of energy systems by making them more secure, to achieve sustainable development.
El cambio climático es real. La población humana global está creciendo como nunca antes. Los recursos naturales son limitados. Estos factores han llevado a los distintos países a adoptar distintas rutas encaminadas a satisfacer las necesidades energéticas de su población, entendiendo a la energía como un instrumento fundamental para alcanzar el desarrollo sostenible. Debido a que cada economía decide, de acuerdo a sus necesidades, posibilidades e intereses, su propio cambio en producción y consumo de energía, esta tendencia ha recibido el nombre de transiciones energéticas. Estas, a través de la digitalización, descentralización y descarbonización del sistema energético, han colocado al sistema eléctrico como el centro de las infraestructuras modernas, haciendo imperativo el procurar su seguridad en el largo plazo. La presente tesis está enfocada en la seguridad de los sistemas eléctricos, para lo que, luego de una exhaustiva revisión de políticas energéticas de distintas economías, se presenta un índice multidimensional como herramienta para los encargados de la elaboración de políticas orientadas a procurar la seguridad de los sistemas eléctricos. El índice compuesto es posteriormente aplicado a diferentes naciones desde dos perspectivas distintas: el seguimiento temporal del desarrollo de un país y la evaluación, comparación y jerarquización de diferentes economías en un tiempo específico. La herramienta diseñada representa un marco integral para la evaluación y mejoramiento de la seguridad energética de los sistemas eléctricos, siento precisamente esta la mayor contribución de la presente tesis: el desarrollo y propuesta de un instrumento que contribuya, a través del mejoramiento de los sistemas energéticos, haciéndolos más seguros, a alcanzar el desarrollo sostenible.
Enginyeria elèctrica
APA, Harvard, Vancouver, ISO, and other styles
27

Mardikar, Yogesh Mukesh. "Establishing baseline electrical energy consumption in wood processing sawmills a model based on energy analysis and diagnostics /." Morgantown, W. Va. : [West Virginia University Libraries], 2007. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=5412.

Full text
Abstract:
Thesis (Ph. D.)--West Virginia University, 2007.
Title from document title page. Document formatted into pages; contains xvi, 222 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 203-207).
APA, Harvard, Vancouver, ISO, and other styles
28

Angalev, Mikhail. "Energy saving at gas compressor stations through the use of parametric diagnostics." Thesis, KTH, Energiteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-101061.

Full text
Abstract:
Increasingly growing consumption of natural gas all around the world requires development of new transporting equipment and optimization of existing pipelines and gas pumping facilities. As a special case, Russian gas pumping system has the longest pipes with large diameter, which carry great amounts of natural gas. So, as reconstruction and modernization needs large investments, a need of more effective and low cost tool appeared. As a result diagnostics became the most wide-spread method for lifecycle assessment, and lifecycle extension for gas pumping units and pipelines.One of the most effective method for diagnostics of gas pumping units is parametric diagnostics. It is based on evaluation of measurement of several termo-gas dynamic parameters of gas pumping units, such as pressures, temperatures and rotational speed of turbines and compressors.In my work I developed and examined a special case of parametric diagnostics – methodic for evaluation of technical state and output parameters for gas pumping unit “Ural-16”. My work contains detailed analysis of various defects, classified by different GPU’s systems. The results of this analysis are later used in development of the methodic for calculation of output parameters for gas pumping unit.GPU is an extremely complex object for diagnostics. Around 200 combinations of Gas Turbine engines with centrifugal superchargers, different operational conditions and other aspects require development of separate methodic almost for each gas pumping unit type.Development of each methodic is a complex work which requires gathering of all possible parametric and statistical data for the examined gas pumping unit. Also parameters of compressed gas are measured. Thus as a result a number of equations are formed which finally allow to calculate such parameters as efficiency, fuel gas consumption and technical state coefficient which couldn’t be measured directly by existing measuring equipment installed on the gas compressor station.
APA, Harvard, Vancouver, ISO, and other styles
29

Yang, Fan, and Dongcan Wang. "Challenges and countermeasures of China's energy security." Thesis, Högskolan i Gävle, Avdelningen för bygg- energi- och miljöteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-20547.

Full text
Abstract:
To ensure energy security, the first to know what is energy, and second, what are the factors of non-security, means that the challenge of energy security. Finally, puts forward some policy or in the case of a reasonable method to solve it according to these problems. At present, energy security is facing two challenges of structural crisis and crisis management system. Concretely, main problems in that security are analyzed, which are considered to affect China and mostly embody in such four big areas as the great pressure in energy supply, the scarcity of relative energy resources, foreign oil dependence is too large, crisis management systems of energy security, the shortage of green energy. Furthermore the counter measures concerned are proposed, including saving energy and increasing the energy utilization rate, to establish strategic energy reserves, strengthening environmental protection and adjusting the primary energy structure. China's rapid economic growth lead to sharp increase in oil imports. Due to China relies on a single chokepoint, the Malacca Strait, which has caused a high degree of concern about the safety of its energy. Nearly three-quarters of its oil imports flowing through the Strait. In view of its strategic importance to China and China’s little sway on the waterway, this view is mainly focused on China’s energy demand and supply in two aspects of concern. The paper analysis of whether the current energy structure is appropriate and sustainable. Because the energy security is facing China's energy is more and more dependent on imported fuel and the need to convert energy to meet the demand of modern society and the rapid growth of the requirements of the economic challenges. Concludes that the China's new policy should focus on energy efficiency, energy saving, renewable energy and turned to the main energy source of natural gas.
APA, Harvard, Vancouver, ISO, and other styles
30

Elgaber, Adel. "Security / energy compromise in wireless sensor network." Thesis, Besançon, 2014. http://www.theses.fr/2014BESA2054.

Full text
Abstract:
L’utilisation des réseaux de capteurs offre de nouvelles perspectives dans de nombreux domaines (médecine, militaire, etc.). Les données récoltées par ces capteurs circulent en clair sur les réseaux de capteurs et peuvent être interceptées par un espion. Selon le domaine d’utilisation, le niveau de sécurité souhaité peut être élevé, ce qui peut provoquer une hausse de la consommation d’énergie sur les nœuds. Ces deux contraintes, sécurité et énergie, sont difficilement conciliables. Il y a donc un compromis à trouver entre l’économie d’énergie qui va conditionner la durée de vie du réseau, et le niveau de sécurité souhaité par l’application. L’objectif de cette thèse est d’étudier les compromis à trouver entre ces deux contraintes, à la fois d’un point de vue théorique et d’un point de vue pratique (par une implémentation des algorithmes et des tests réels sur des réseaux de capteurs par choisissant les algorithmes DES et AES). L’algorithme de cryptographie symétrique DES a ´ et ´e choisi comme objet d’étude. Les résultats obtenus sur la plateforme académique Senslab ont permis de déterminer une relation précise entre la consommation d’énergie et le nombre de rondes de DES et donc le niveau de sécurité. Ces expériences ont été renouvelées avec l’algorithme AES, plus récent et plus sûr, mais aussi plus consommateur en énergie. Puis, à partir des résultats obtenus, un modèle générique de consommation pour les algorithmes cryptographiques a été construit pour un réseau complet. L’utilisation complémentaire de la compression des données a permis de réduire cet impact de manière intéressante. Enfin, l’utilisation de la mémoire et l’évaluation du temps de chiffrement et de compression ont été évalué de manière à rester dans des fourchettes réalistes d’utilisation réaliste
Wireless sensor networks give us opportunities to improve many applications in many fields(medicine, military, etc.). The data collected by sensor node flies as plain text on sensor networkand can be intercepted by a spy. Depending on the importance of data, the wanted level of securitycould be high which may impact the energy consumption of sensor nodes. These two constraints,security and energy are difficult to combine. There is a trade-off between energy savings that willdetermine the lifetime of the network and the level of security desired by the application.The objective of this thesis is to study the trade-off between these two constraints, both from atheoretical perspective and from a practical point of view (with an implementation of algorithms andreal tests on sensor networks). The DES symmetric cryptographic algorithm was chosen as a casestudy. The results obtained on the academic platform Senslab have shown a clear relationshipbetween energy consumption and the number of rounds of DES and therefore the level of security.These experiments were repeated with the AES algorithm, newer and safer, but also more energyconsumer.Then, from the results, a generic model of consumption for cryptographic algorithms has been builtfor a complete network. The complementary use of data compression has reduced this impact ofenergy consumption in an interesting way. Finally, the memory usage and the time of encryption andcompression were evaluated in order to stay within realistic ranges of use
APA, Harvard, Vancouver, ISO, and other styles
31

Sjöblom, Karl. "Energy Security Scenarios in the Baltic States." Thesis, KTH, Energiteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Mohd, Amin Mohd Farid. "Energy planning and energy policy analysis for Malaysia." Thesis, University of Sussex, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.360504.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Guta, Dawit [Verfasser]. "Bio–Based Energy, Rural livelihoods, and Energy Security in Ethiopia / Dawit Guta." Bonn : Universitäts- und Landesbibliothek Bonn, 2015. http://d-nb.info/1077269528/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ergen, Gaye. "Eu Energy Security And The Middle East Oil." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12609089/index.pdf.

Full text
Abstract:
This thesis aims to analyze oil as a security challenge for the European Union. The energy security policy is getting more and more important with the decrease of energy sources, which holds and shapes the balance of power in the world. Especially in the future, energy sources will be the key to political strategies. The European nations have created energy security policies in order to protect their benefits. The central argument of this thesis is that although the EU has attempted to create a common EU energy policy throughout its history, it could not escape from the impact of the national energy policy of the member states. The main focus is on the oil policy of the community. Thus, the aim of the thesis is to explore the policies created for oil security, especially in the Middle East, and why the EU could not implement these policies it created.
APA, Harvard, Vancouver, ISO, and other styles
35

Winterroth, Seth D. "U.S. Energy Security: Reducing Dependence on Foreign Oil." Scholarship @ Claremont, 2012. http://scholarship.claremont.edu/cmc_theses/481.

Full text
Abstract:
U.S. energy security and the need for greater energy independence is one of the most important issues facing the United States today. Failure to address the U.S.’s energy dependence has undermined foreign policy, increased threats to national security, and created an inflexible hydrocarbon dependent economy. In 2010 the Energy Information Administration reported that U.S petroleum consumption had reached an average of 19.15 million barrels per day.[1] More importantly, 49 percent of daily consumption is imported and this creates an energy dependency that cannot be presently avoided. Dependence on foreign oil imports has resulted in America’s politics, economic vitality, environmental sustainability, and social culture being directly influenced by the countries that control our oil supply. [1] "Petroleum Statistics," Energy Information Administration, Updated July 2011
APA, Harvard, Vancouver, ISO, and other styles
36

Bindhammer, Anita. "EU Energy Security Europe's difficult relationship with Russia /." St. Gallen, 2008. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/06608145001/$FILE/06608145001.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Thibeaux, Allen L. "Nuclear and solar energy implications for homeland security." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FThibeaux.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2008.
Thesis Advisor(s): Moran, Daniel ; Nussbaum, Daniel. "December 2008." Description based on title screen as viewed on February 17, 2009. Includes bibliographical references (p. 91-101). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
38

Bechkit, Walid. "Security and energy saving in wireless sensor networks." Compiègne, 2012. http://www.theses.fr/2012COMP2045.

Full text
Abstract:
Les réseaux de capteurs sans fil (RCSF) présentent de nos jours des avantages indéniables dans plusieurs domaines. Compte tenu des champs d'application critiques d'une part et des limitations de ressources (énergie. Mémoire, etc. ) d'autre part, un compromis doit être trouvé entre la sécurité ct l'efficacité dans ces réseaux. C'est dans ce cadre que s'inscrit cette thèse qui s'attaque à ces deux volets majeurs des RCSF: la sécurité et l'efficacité énergétique. Dans le premier volet, nous nous sommes intéressés à la gestion de clés, une brique de base pour les autres services de sécurité. Nous avons proposé une nouvelle approche scalable de sécurité basée sur une théorie de la conception combinatoire dite "unital design". Notre solution offre une bonne couverture sécurisée des RCSF à grande échelle avec un faible coût de stockage. Nous avons aussi proposé une classe générique de gestion de clés qui améliore la résilience des schémas existants. Dans le deuxième volet qui traite la conservation d'énergie dans les RCSF, nous avons modélisé l'impact de la température sur les communications et proposé des solutions permettant d'économiser l'énergie en adaptant l'activité des émetteurs-récepteurs en fonction de la température. Nous avons, par ailleurs, proposé un protocole de routage efficace qui prend mieux en compte la nature concentrique des RCSF afin d'économiser l'énergie. Nous présentons enfin le projet AgroSens (Picardie / FEDER) dans lequel nous avons conçu et dévelopé une plateforme de RCSF pour l'agriculture. Nous discutons les différentes étapes du projet ainsi que l'implémentation de notre architecture et les fonctionnalités du prototype que nous avons mis en place
Wireless sensor networks (WSN) arc set to become one of the technologies which invade our everyday life. These networks suffer from several constraints mainly related to the resource limitations (energy, memory, etc. ) and to the harsh deployment environment. These limitations, coupled with the required security levels and network autonomy, create a clash between two key design issues : security and efficiency. Ln this thesis, we tackle these two design objectives and propose secure and energy saving solutions for smooth operation of WSN. We focus in the first part on key management which lays the foundation of security in WSN. We develop a new scalable key management scheme which makes use of unital design theory. Our scheme provides a good secure coverage of large scale networks with a low key storage overhead. We also address the problem of network resiliency through a generic class of hash-chain based key management schemes. Ln the second part, we address the energy saving challenging issue. We model the impact of the temperature on the radio communications in WSN and we propose new fully distributed temperature-aware connectivity-driven algorithms for energy saving in WSN. Furthermore, we address the energy aware routing and we propose a new weighted shortest path tree for convergecast traffic routing in WSN. We finally present AgroSens project funded by the ERDF and the Picardy regional council. Ln this project, we design and develop a WSN system for agriculture in Picardy. We present in this thesis the main project phases and we discuss the implementation of our architecture and communication protocols. We also present the main features of the testbed that we set up
APA, Harvard, Vancouver, ISO, and other styles
39

Chisom, Christopher M., and Jack C. II Templenton. "Analysis of Marine Corps renewable energy planning to meet installation energy security requirements." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/38899.

Full text
Abstract:
Approved for public release; distribution is unlimited.
The purpose of this thesis is to analyze Marine Corps installation energy consumption and the pursuit of increased renewable energy generation goals across Marine Corps installations. The main objective of this report is to determine the cost of interruption and the net present value (NPV) of renewable energy generation needed to meet the Marine Corps energy security objectives. First, we determine installation-specific energy consumption, resource requirements, and current renewable energy generation projects. Second, we analyze current Marine Corps installation energy portfolios to determine shortfalls from minimum energy targets and the cost to generate those shortfalls through renewable energy technologies. Finally, we identify installation energy security requirements, determine cost of interruption, and conduct a sensitivity analysis of the cost-benefit of renewable energy generation alternatives to meet energy security requirements. This study determines how investment in renewable energy to meet baseline energy consumption requirements increases energy security across Marine Corps installations. Furthermore, considering the cost of interruption, the investment in renewable energy technologies yields a positive NPV at the majority of Marine Corps installations. Based on this research, we recommend that the Marine Corps develops a quantitative method for assessing energy security and invest to meet energy security goals at each installation.
APA, Harvard, Vancouver, ISO, and other styles
40

Guta, Dawit Diriba [Verfasser]. "Bio-Based Energy, Rural Livelihoods and Energy Security in Ethiopia / Dawit Diriba Guta." Frankfurt : Peter Lang GmbH, Internationaler Verlag der Wissenschaften, 2015. http://d-nb.info/1080461035/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Landström, Tomas. "Energy Agreements enabling mechanisms of normative power Europe? : Conceptualising energy security in Ukraine." Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148935.

Full text
Abstract:
This paper analyse how two agreements can be understood to facilitate the normative power (NP) of the EU by illuminating how they can enable four different NP mechanisms and thus influence and shape Ukraine’s notions and norms concerning energy security (ES). The study it draws on information from two agreements, i.e. Memorandum of Understanding on a Strategic Energy Partnership of 2016 (MoU) and the treaty establishing the Energy Community (TEC). If we understand NP as the ability to define what passes for normal and that NP suggests that the EU exerts influence by shaping the values and behaviour of other actors by redefining international norms in their own image. Then these two agreements are interesting as they constitute a nexus between the EU and Ukraine which could potentially enable that power as they can proliferate norms and notions of the EU concerning ES. Considering how the TEC has the goal to extend their principle and rule of the EU and how the MoU is created with the EU´s energy union as reference point the agreements might enable that influence This paper combines critical discourse analysis (CDA) with an ideal type analysis where the four NP mechanism constitute the analytical tool. The study reveals how the agreements can enable the EU´s NP by facilitating the NP mechanism, as they manage to proliferate the norms and notion of the EU. However, the aptitude of the different NP mechanism differ between the two agreements. Additionally, the study also reveals how the application of this ideal type is more suitable for examining organisation rather than agreements alone, as the full spectrum of the NP mechanisms potential cannot be illuminated. Although, the study reveal how agreements could be understood as potential tools, even if they don’t enable all NP mechanism equally.
APA, Harvard, Vancouver, ISO, and other styles
42

Reaves, Jeff W. "European Union Policy Against Energy Coercion: An Analysis of EU Energy Security Policy." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/89671.

Full text
Abstract:
Energy Security is a necessity of modern society and as technology and society evolve so does the requirement to secure energy to provide stability for state governments. Europe is in a transition period of increasing cohesion and integration, and Russia is leveraging its natural resources to conduct disruption campaigns coupled with energy coercion tactics. The EU is developing and has implemented policies conducive of energy security that requires member-states to enhance stability through energy security both through supply and demand. The European Energy Security Strategy established a system of pillars that was designed to increase overall energy security through a multidimensional approach. The effectiveness of EU energy policy is a critical issue that must be examined in order to establish that European energy security policy can be used as an effective countermeasure to Russian energy coercion and initiatives.
Master of Arts
This study focused on energy security policies in the European Union as a countermeasure to energy coercion. While this project sought to identify the effectiveness of the EU’s current policy, there were two outcomes. First, the thesis provided strong evidence to support that EU energy security policy is an effective countermeasure against energy coercion tactics. The second outcome was a model that enables the analysis of policy implementation in Europe. Topics discussed throughout this thesis include: Russian energy strategy, EU energy security policy, energy efficiency, and policy implementation. This study ultimately focused on the European Energy Security Strategy, which established a system of pillars that was designed to increase overall energy security through a multidimensional approach. The importance lies in the effectiveness of EU energy policy as a critical issue that must be examined to establish that European energy security policy can be used as an effective countermeasure to Russian energy coercion and initiatives.
APA, Harvard, Vancouver, ISO, and other styles
43

Jeffrey, Bernard Kucharski. "Energy security in Japan in the context of a planned energy system transition." Kyoto University, 2016. http://hdl.handle.net/2433/217192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Johnson, Olga. "The concept of energy security : implications of EU-Russia energy relations, 2004-2012." Thesis, University of Leeds, 2016. http://etheses.whiterose.ac.uk/14357/.

Full text
Abstract:
This research project presents a novel and fundamental understanding of energy security and threat perceptions by analysing the EU-Russia energy relationship concerning gas supply during the period 2004-2012. The ultimate goal of this thesis is to address the two-fold research question of why differences exist in the threat perceptions and understandings of energy security among member states of the EU, and how they affect EU’s energy stance and its gas relations with Russia. Encountering endemic problems with the coherence of EU energy policy towards Russia, the research focuses on two case studies, those of Poland and Germany, based on identifying their energy interests and identities and the previous patterns of energy interactions with Russia as an explanatory basis for the construction of threat perceptions.
APA, Harvard, Vancouver, ISO, and other styles
45

Fedoruk, M. "Energy efficiency in buildings as one of the solutions for achieving energy security." Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/36062.

Full text
Abstract:
Energy is essential for economic development, food production and global security. According to the UN, the world will need at least 45% more energy by 2030. It is well known that resources we are using today for the energy production have very negative impact on the planet, especially for the climate change. Alternative resources that are renewable and don't have CO2 emission also have own disadvantages. For example, solar panels are quite expensive, depend on climate, need a lot of place and also there is a big issue with utilization of panels in the end of their life cycle. Wind farmas and hydroelectric power stations are located to far from consumers and transmission looses are very high in these cases. Indeed, in future scientists will solve these problems, but so far we have to deal with them. It means that the best solution would be to combine alternative energy resources and energy saving. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/36062
APA, Harvard, Vancouver, ISO, and other styles
46

Kelshall, Jason R. "Natural gas and energy security in Trinidad and Tobago, and their impact on U.S. energy security and stability in the Caribbean." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Dec%5FKelshall.pdf.

Full text
Abstract:
Thesis (M.S. in National Security Affairs)--Naval Postgraduate School, December 2005.
Thesis Advisor(s): Robert Mc Nab, Maria Rasmussen. Includes bibliographical references (p. 93-97). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
47

Chebbo, Ahmad Mustapha. "Security constrained reactive power dispatch in electrical power systems." Thesis, Durham University, 1990. http://etheses.dur.ac.uk/6580/.

Full text
Abstract:
With the increased loading and exploitation of the power transmission system and also due to improved optimised operation, the problem of voltage stability and voltage collapse attracts more and more attention . A voltage collapse can take place in systems or subsystems and can appear quite abruptly. Continuous monitoring of the system state is therefore required. The cause of the 1977 New York black out has been proved to be the reactive power problem. The 1987 Tokyo black out was believed to be due to reactive power shortage and to a voltage collapse at summer peak load. These facts have strongly indicated that reactive power planning and dispatching play an important role in the security of modern power systems. A proper compensation of system voltage profiles will enhance the system securities in the operation and will reduce system losses. In this thesis, some aspects of reactive power dispatch and voltage control problem have been investigated. The research has focused on the following three issues: Firstly, the steady-state stability problem has been tackled where, a voltage collapse proximity indicator based on the optimal impedance solution of a two bus system has been generalised to an actual system and the performance of this indicator has been investigated over the whole range (stable and unstable region) to see how useful this indicator can be for an operator at any operating point. Then we went further to implement a linear reactive power dispatch algorithm in which this indicator was used for the first time to attempt to prevent a voltage collapse in the system. Secondly, a new efficient technique for N-1 security has been incorporated aiming at either maximising the reactive power reserve margin for the generators or minimising active power losses during normal as well as outage conditions (single line outage) .The reactive power redistribution after an outage is based on the S-E graph adopted by Phadke and Spong[72].Thirdly, the dispatch (N-1 security excluded) has been incorporated on line in the O.C.E.P.S. control package to improve the quality of the service and system security by optimally controlling the generator voltages (potentially the reactive control system is able to control transformers, switchable capacitors and reactors). A new function called load voltage control (similar to the load frequency control function) has been introduced to allow smooth variation of the reactive control signals towards their targets.
APA, Harvard, Vancouver, ISO, and other styles
48

McQuinn, Matthew E. "Energy regulation effects on critical infrastructure protection." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FMcQuinn.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2008.
Thesis Advisor(s): Lewis, Theodore G. "December 2008." Description based on title screen as viewed on January 30, 2009. Includes bibliographical references (p. 71-76). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
49

Karlsson, David. "Is energy in Sweden secure? : The use of quantitative indicators for analyzing energy security." Thesis, Uppsala University, Global Energy Systems, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-129969.

Full text
Abstract:

The global energy consumption is increasing rapidly and will likely continue to do so for many years to come. At the same time the world's fossil energy resources, today supplying more than 80% of this demand, are in depletion. This means we face the risk of having a shortage in the global energy supply within just a few years. Countries have lately become more aware of this problematic situation, and have come to realize the importance of energy security and securing their supply of energy.

The aim of this thesis is to study energy security from a Swedish perspective. This has been done by comparing the main different energy forms used regarding certain security aspects. The thesis as well presents methods to be used for quantitative comparison of various energy alternatives or suppliers in the energy mix, which could be applied to any jurisdiction.

A division into three main energy services has been done because of their different characteristics; transport, space and water heating, and electricity. Some of the main results from this study are construction of energy security indices for the alternative energy sources used within these services. Also some recommendations for a more secure energy supply are presented and discussed in the thesis, and outlook for the future Swedish energy requirements in 2020.

APA, Harvard, Vancouver, ISO, and other styles
50

Santhana, Krishnan Archanaa. "Surplus and Scarce Energy: Designing and Optimizing Security for Energy Harvested Internet of Things." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/83450.

Full text
Abstract:
Internet of Things require a continuous power supply for longevity and energy harvesting from ambient sources enable sustainable operation of such embedded devices. Using selfpowered power supply gives raise two scenarios, where there is surplus or scarce harvested energy. In situations where the harvester is capable of harvesting beyond its storage capacity, the surplus energy is wasted. In situations where the harvester does not have sufficient resources, the sparse harvested energy can only transiently power the device. Transiently powered devices, referred to as intermittent computing devices, ensure forward progress by storing checkpoints of the device state at regular intervals. Irrespective of the availability of energy, the device should have adequate security. This thesis addresses the security of energy harvested embedded devices in both energy scenarios. First, we propose precomputation, an optimization technique, that utilizes the surplus energy. We study two cryptographic applications, namely bulk encryption and true random number generation, and we show that precomputing improves energy efficiency and algorithm latency in both applications. Second, we analyze the security pitfalls in transiently powered devices. To secure transiently powered devices, we propose the Secure Intermittent Computing Protocol. The protocol provides continuity to underlying application, atomicity to protocol operations and detects replay and tampering of checkpoints. Both the proposals together provide comprehensive security to self-powered embedded devices.
Master of Science
Internet of Things(IoT) is a collection of interconnected devices which collects data from its surrounding environment. The data collected from these devices enable emerging technologies like smart home and smart cities, where objects are controlled remotely. With the increase in the number of such devices, there is a demand for self-powered devices to conserve electrical energy. Energy harvesters are suitable for this purpose because they convert ambient energy into electrical energy to be stored in an energy buffer, which is to be used when required by the device. Using energy harvesters as power supply presents us with two scenarios. First, when there is sufficient ambient energy, the surplus energy, which is the energy harvested beyond the storage capacity of the buffer, is not consumed by the device and thus, wasted. Second, when the harvested energy is scarce, the device is forced to shutdown due to lack of power. In this thesis, we consider the overall security of an energy harvested IoT device in both energy scenarios. We optimize cryptographic algorithms to utilize the surplus energy and design a secure protocol to protect the device when the energy is scarce. Utilizing both the ideas together provides adequate security to the Internet of Things.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography