Academic literature on the topic 'Energy security system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Energy security system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Energy security system"

1

Morogov, Alexander. "DEVELOPMENT OF JAPAN'S ENERGY SECURITY SYSTEM." Security Index: A Russian Journal on International Security 16, no. 1 (February 2010): 95–100. http://dx.doi.org/10.1080/19934270903570778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Niu, Dong Xiao, Xin Lu, Huan Huan Qiao, and Hui Juan Zhai. "Research on Evaluation System of China’s Energy Security Considering Energy Transportation." Advanced Materials Research 535-537 (June 2012): 2049–52. http://dx.doi.org/10.4028/www.scientific.net/amr.535-537.2049.

Full text
Abstract:
Based on detailed analysis of the influencing factors on energy security, this paper build the China's energy security evaluation index system considering energy transport from the four aspects of energy supply, energy consumption, energy, transport, energy and social environment, then classified the level of energy security according to the evaluation system. At last, this paper made an empirical analysis on the 2001-2010 energy security through the Analytic Hierarchy Process.
APA, Harvard, Vancouver, ISO, and other styles
3

Xiang, Bo, and Cai Liu. "Research on China’s Legal Protection System for Energy Security." Advanced Materials Research 805-806 (September 2013): 1466–71. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.1466.

Full text
Abstract:
China's energy industry developed remarkably in recent years but in the meanwhile also caused some problems that are directly correlated with defects in system, content, supporting and coordination and other aspects of China’s energy laws. It is imperative at present to improve and perfect energy legal system in order to provide strong guarantee for China’s energy security. This paper will analyze existing legislation systems concerned with energy security started from its legal protection status in quo, and use foreign legal system of energy security for reference to put forward to suggestions for construction of China’s legal protection system for energy security that are beneficial to perfect China's energy legal system and to ensure energy security.
APA, Harvard, Vancouver, ISO, and other styles
4

Mouftah, H. T., R. Kun, and D. Hoffer. "A distributed energy management and security system." Journal of Microcomputer Applications 10, no. 1 (January 1987): 29–39. http://dx.doi.org/10.1016/0745-7138(87)90034-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Jing, Zhijie Shang, Ren Qiang, Jin Pang, Han Guo, Jingchu Wang, and Haihang Niu. "Energy Internet Security Risk Evaluation Index System." IOP Conference Series: Earth and Environmental Science 645 (January 26, 2021): 012045. http://dx.doi.org/10.1088/1755-1315/645/1/012045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shen, Pei, Sining Wang, and Nie Ling. "Research on Security Architecture of Global Energy Internet Standard Support System." E3S Web of Conferences 118 (2019): 01011. http://dx.doi.org/10.1051/e3sconf/201911801011.

Full text
Abstract:
The global energy Internet standard support system plays a vital role in global energy interconnection. However, the system brings convenience to the global energy interconnection and introduces new security issues. Due to the diversity of users, the complexity of the environment and the internationalization, there will be more and more malicious network intrusions from outside and inside. The security system of the global energy Internet standard support system faces great challenges. To this end, this paper proposes a security architecture that combines active and passive, establishing a chain of trust between the active security architecture and the passive security architecture, ensuring a new security architecture, a security organization framework, a security policy framework, a security operation framework, and a closed-loop system that integrates the security technology framework. A deep learning algorithm was introduced for network intrusion learning to achieve sustainable management of the information security life cycle. The combination of active and passive security systems and continuous monitoring strategies based on deep learning fully ensure the security of the global energy Internet standard support system.
APA, Harvard, Vancouver, ISO, and other styles
7

Koval, Viktor, Yevheniia Sribna, and Krzysztof Gaska. "Energy Cooperation Ukraine-Poland to Strengthen Energy Security." E3S Web of Conferences 132 (2019): 01009. http://dx.doi.org/10.1051/e3sconf/201913201009.

Full text
Abstract:
The article analyzes the prospects of cooperation between Poland and Ukraine in the field of electric power transmission. In particular, the characteristics of the «Burshtyn Energy Island» are enlightened, which includes Burshtyn TPP, Kalush CHPP and Tereble- Ritsk HPP that are detached from the power system of Ukraine and operate in parallel with the European system ENTSO-E. This island serves as an importer of Ukrainian electric power to European countries through Hungary and Slovakia, respectively, and is synchronized with the European Network of System Operators for Electricity Transmission (ENTSO-E). The main problem of the international transmission of electric current of Ukraine is determined, which is that the whole energy system of Ukraine works within the international energy union of the CIS and Baltic IPS / UPS. At the same time, the integration of Ukraine into the markets of Western European countries requires the break of established connections under the IPS / UPS system and the parallel increase of communications under the ENTSO-E system through Poland, Slovakia, Romania and Hungary. The prospect for the development of the Energy Bridge project, which provides the supply of electric power from the Khmelnitsk NPP to Poland through the Khmelnitsk NPP - Rzeszow, is described. It is proposed the stages for the further development of energy security in the information direction on the introduction of Smart Grid technologies, in which energy companies will be able to manage the whole network as the only flexible digital system, and end users - to clearly regulate their own electricity costs.
APA, Harvard, Vancouver, ISO, and other styles
8

Jaysawal, Anoop. "Cyber Security in Smart Grid System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 341. http://dx.doi.org/10.23956/ijarcsse.v7i8.85.

Full text
Abstract:
Abstract: The smart grid is an evolution of the electrical grid to respond to these challenges. A smart grid is an energy transmission and distribution network enhanced through digital control, monitoring, and telecommunications capabilities. It provides a real-time, two-way flow of energy and information to all stakeholders in the electricity chain, from the generation plant to the commercial, industrial, and residential end user. This evolution is crucial for integrating both renewable and distributed energy resources and to improve the efficiency and sustainability of the electrical grid and associated services. It will also help in other ways, such as enabling:• Smart and positive energy infrastructures• Increased energy density management during peaks• Real-time pricing to customers• Integrated mobility services• New virtual power plants• Micro grid
APA, Harvard, Vancouver, ISO, and other styles
9

Glynn, James, Alessandro Chiodi, and Brian Ó Gallachóir. "Energy security assessment methods: Quantifying the security co-benefits of decarbonising the Irish Energy System." Energy Strategy Reviews 15 (March 2017): 72–88. http://dx.doi.org/10.1016/j.esr.2016.11.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lukutin, Boris, and Violetta Kiushkina. "Intellectual energy security monitoring of decentralized systems of electricity with renewable energy sources." E3S Web of Conferences 69 (2018): 02002. http://dx.doi.org/10.1051/e3sconf/20186902002.

Full text
Abstract:
The article reveals an attempt to create an integrated information system for energy security monitoring, for instance in Yakutia, in terms of a vivid and typical representative of isolated areas with extreme temperature conditions. The analysis of area assessment of renewable energy and energy security strengthening of decentralized power supply systems is given. The research considers the worked out algorithm which determines the renewable energy attractiveness coefficient in connection with energy security assessment indicators. The document includes the results of the analysis of the energy situation in Yakutia with the help of geoinformation software product, the illustrative fragment of integrated information system modules. The implementation of the developed system results in fast analysis of occurring issues, indicators calculating as a foundation for strategic platform to manage energy security positions. The system assists to tackle the problems in advance.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Energy security system"

1

Jeffrey, Bernard Kucharski. "Energy security in Japan in the context of a planned energy system transition." Kyoto University, 2016. http://hdl.handle.net/2433/217192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chu, Weilian. "Evaluating effectiveness of an embedded system endpoint security technology on energy delivery systems." Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/121597.

Full text
Abstract:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 67-68).
The Internet of Things (IoT) is starting to take off in the modern day tech scene, with almost every user device being connected to a huge network with other devices; industrial energy delivery systems are no different. However, IoT in industry (known as IIoT) severely lags behind conventional IoT networks when it comes to cybersecurity, as IIoT endpoint devices generally lack the same level of memory and computation as conventional IoT endpoints. As a result, the same level of security measurements can't be implemented, and IIoT devices often are vulnerable to malicious users attempting to hack the device. The goal of this research is to create a lightweight software system that protects the endpoint devices from hackers, as well as prevent malicious accesses from impacting other parts of the system. This thesis will focus on the command and control unit, where the aim is to develop a neural net classifier to detect anomalies in network traffic. This thesis details the background surrounding IIoT endpoint devices, and the current attempts that have been made at providing a solution, as well as our approach to solving this problem, using both supervised and unsupervised machine learning approaches, and describe the testing environment with which the experiments were conducted. In the end we discuss how the work contributes to the future progress of IIoT security.
by Weilian Chu.
M. Eng.
M.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
3

Vterkovska, V. "Fundamentals of geoinformation systems energy security of economic entities." Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/65038.

Full text
Abstract:
Sustainable development of energy systems is the key to ensuring energy security. Although particular relevance of energy problems Ukraine, the state does not adopt a document that would clearly regulate the work of authorities in the field of energy security and energy's performance monitoring.
APA, Harvard, Vancouver, ISO, and other styles
4

Melin, Erik. "Depoliticising Energy : A Review of Energy Security in Swedish Policy-Making." Thesis, Uppsala universitet, Institutionen för arkeologi och antik historia, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-353430.

Full text
Abstract:
In order to cope with the changing climate, there will be a need for mitigating transformations of a scope, speed and magnitude that are unprecedented in human history, but the consensus- and market-driven approach is inhibiting this transformation. This thesis reviews how various discourses and debates on energy policy within Swedish governments have changed between 1974 and 2017, through the lenses of energy security and depoliticisation, and how a better understanding of these debates and discourses may inform the impending large-scale transformation required to meet the challenge of climate change. Some of the main findings are that (1) nuclear power and the result of the nuclear power referendum have been decisive for energy policy, and that nuclear power will remain of vital importance in the twenty-first century. (2) Energy has become increasingly depoliticised since the 1980s, ensuing the referendum on nuclear power. (3) The discourse on energy security has shifted towards market-based solutions: in the 2000s, climate change is to be mitigated through consumer- oriented solutions such as green certificates. Through privatisation, it essentially has become up to the consumer, deciding whether to participate in mitigation of climate change.
APA, Harvard, Vancouver, ISO, and other styles
5

Homon, Bohdan. "Combined power supply system converting unit with renewable sources." Thesis, Дніпропетровський національний університет залізничного транспорту ім. академіка В. Лазаряна, 2017. https://er.knutd.edu.ua/handle/123456789/9329.

Full text
Abstract:
The article deals with the implementation of renewable energy sources in local electrical systems such as solar battery, wind turbines. The improvement and wide spread of the sources of distributed generation renewable energy sources is one of the ways to improve the energy security of the country.
Стаття присвячена питанню впровадження відновлювальних джерел енергії (сонячна батарея, вітрові турбіни) в місцевих електричних системах. Покращення та широке розповсюдження поновлюваних джерел енергії розподіленої генерації є одним із способів підвищення енергетичної безпеки країни.
Статья посвящена вопросу внедрения возобновляемых источников энергии (солнечная батарея, ветровые турбины) в местных электрических системах. Улучшение и широкое распространение возобновляемых источников энергии распределенной генерации является одним из способов повышения энергетической безопасности страны.
APA, Harvard, Vancouver, ISO, and other styles
6

Chapman, Jeffrey W. (Jeffrey Wayne). "Power system control for large-disturbance stability : security, robustness and transient energy." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/39393.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1996.
Includes bibliographical references (p. 223-228).
by Jeffrey Wayne Chapman.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
7

Foord, Wayne. "Energy scarcity and food security : strategies for transition to resilient food system governance." Thesis, Queen's University Belfast, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.705918.

Full text
Abstract:
This thesis addresses the impacts of emerging energy scarcity on food security, and explores strategies for transition to a sustainable food system. The core research questions focus on the transition movement, its political strategy, and proposals for food sustainability. Contextual questions include: What post-peak oil scenarios are plausible/implausible given current evidence regarding global oil production, and available energy alternatives? Do any current trends indicate the unfolding of one scenario, in particular? And how might this scenario impact on food security, and what are the implications for transition movement strategy? Evidence is presented that global oil production has already ‘plateaued’, and the most likely scenarios for industrial societies now lie on a continuum between forced, gradual energy descent and rapid collapse. Emerging trends indicate that energy scarcity is associated with the evolution of a post-liberal order, as anticipated by some contributors to the ‘politics of scarcity’ debate in the 1970’s. These trends are also manifesting within the global food system, in the form of ‘land-grabbing’ and widespread imposition of GM-based industrial agriculture. In light of imminent forced energy descent, emerging global trends, and learning from the Cuban Special Period, it is argued that both green political theory and transition movement strategy should focus on the contested politics of transition, in conjunction with a prospective politics that steers transition towards a new societal equilibrium. A diverse, adaptive repertoire of political strategies is proposed, including: solutions-based activism; oppositional activism; insurgent citizenship; transformative engagement with local government; and ‘de-linking’ initiatives. Scaling up of local Transition initiatives should include: promotion of regional solidarity networks between urban centres; regional food system planning; and alliance-building with other counter-hegemonic social movements. It is further proposed that a ‘food sovereignty’ framing is adopted, and that scaled up, farm sector agroecology is promoted, to complement existing permaculture and organic approaches.
APA, Harvard, Vancouver, ISO, and other styles
8

Blazeviciute, Lina. "Illustrative ElectricitySupply Scenarios and Sustainable Development in Lithuania." Thesis, Uppsala universitet, Institutionen för geovetenskaper, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-233643.

Full text
Abstract:
Lithuania has limited domestic energy resources, and is therefore, heavily dependent on imports of oil products and natural gas. Lithuania imported around 90% of its oil and 100% of natural gas in 2009. Particularly, after the accession to the European Union (EU), and decommissioning of main electricity generation source Ignalina Nuclear Power Plant (NPP), energy security became one of the main concerns. Therefore, it is vital to evaluate different pathways the country could take in order to achieve desirable energy security, and ensure sustainable development of the energy system in Lithuania. The study was conducted using LEAP, the Long range Energy Alternatives Planning System, to develop energy policy analysis. Different scenarios presented in the report show how Lithuanian energy system would react in given different circumstances. Moreover, it demonstrates how implementation of existing energy projects separately or combined together would affect the level of energy security and sustainability in Lithuania. The research shows that current government policies could lead Lithuania to more secure and sustainable energy future. However, in a long run higher investments in renewable energy might be more environmentally and economically competitive alternative.
APA, Harvard, Vancouver, ISO, and other styles
9

Nair, Nirmal-Kumar. "Incorporating voltage security into the planning, operation and monitoring of restructured electric energy markets." Texas A&M University, 2004. http://hdl.handle.net/1969.1/3199.

Full text
Abstract:
As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater attention to operating costs than stability and security margins. Since operating stability is a basic requirement for any power system, there is need for newer tools to ensure stability and security margins being strictly enforced in the competitive marketplace. This dissertation investigates issues associated with incorporating voltage security into the unbundled operating environment of electricity markets. It includes addressing voltage security in the monitoring, operational and planning horizons of restructured power system. This dissertation presents a new decomposition procedure to estimate voltage security usage by transactions. The procedure follows physical law and uses an index that can be monitored knowing the state of the system. The expression derived is based on composite market coordination models that have both PoolCo and OpCo transactions, in a shared stressed transmission grid. Our procedure is able to equitably distinguish the impacts of individual transactions on voltage stability, at load buses, in a simple and fast manner. This dissertation formulates a new voltage stability constrained optimal power flow (VSCOPF) using a simple voltage security index. In modern planning, composite power system reliability analysis that encompasses both adequacy and security issues is being developed. We have illustrated the applicability of our VSCOPF into composite reliability analysis. This dissertation also delves into the various applications of voltage security index. Increasingly, FACT devices are being used in restructured markets to mitigate a variety of operational problems. Their control effects on voltage security would be demonstrated using our VSCOPF procedure. Further, this dissertation investigates the application of steady state voltage stability index to detect potential dynamic voltage collapse. Finally, this dissertation examines developments in representation, standardization, communication and exchange of power system data. Power system data is the key input to all analytical engines for system operation, monitoring and control. Data exchange and dissemination could impact voltage security evaluation and therefore needs to be critically examined.
APA, Harvard, Vancouver, ISO, and other styles
10

Youssef, Tarek. "Co-design of Security Aware Power System Distribution Architecture as Cyber Physical System." FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3210.

Full text
Abstract:
The modern smart grid would involve deep integration between measurement nodes, communication systems, artificial intelligence, power electronics and distributed resources. On one hand, this type of integration can dramatically improve the grid performance and efficiency, but on the other, it can also introduce new types of vulnerabilities to the grid. To obtain the best performance, while minimizing the risk of vulnerabilities, the physical power system must be designed as a security aware system. In this dissertation, an interoperability and communication framework for microgrid control and Cyber Physical system enhancements is designed and implemented taking into account cyber and physical security aspects. The proposed data-centric interoperability layer provides a common data bus and a resilient control network for seamless integration of distributed energy resources. In addition, a synchronized measurement network and advanced metering infrastructure were developed to provide real-time monitoring for active distribution networks. A hybrid hardware/software testbed environment was developed to represent the smart grid as a cyber-physical system through hardware and software in the loop simulation methods. In addition it provides a flexible interface for remote integration and experimentation of attack scenarios. The work in this dissertation utilizes communication technologies to enhance the performance of the DC microgrids and distribution networks by extending the application of the GPS synchronization to the DC Networks. GPS synchronization allows the operation of distributed DC-DC converters as an interleaved converters system. Along with the GPS synchronization, carrier extraction synchronization technique was developed to improve the system’s security and reliability in the case of GPS signal spoofing or jamming. To improve the integration of the microgrid with the utility system, new synchronization and islanding detection algorithms were developed. The developed algorithms overcome the problem of SCADA and PMU based islanding detection methods such as communication failure and frequency stability. In addition, a real-time energy management system with online optimization was developed to manage the energy resources within the microgrid. The security and privacy were also addressed in both the cyber and physical levels. For the physical design, two techniques were developed to address the physical privacy issues by changing the current and electromagnetic signature. For the cyber level, a security mechanism for IEC 61850 GOOSE messages was developed to address the security shortcomings in the standard.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Energy security system"

1

Nihon Kokusai Fōramu. Policy Council. The 27th policy recommendations: The establishment of an international energy security system. Tokyo: Japan Forum on International Relations, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Heinrich Böll Foundation (Addis Ababa, Ethiopia) and Forum for Environment (Ethiopia), eds. Diversity and security for Ethiopian power system: A preliminary assessment of opportunities and risks for the power sector. Addis Ababa: HBF, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Guo ji neng yuan ji gou neng yuan an quan fa lü zhi du yan jiu: On the legal system of the international Energy Aagency for energy security. Beijing Shi: Zhongguo zheng fa da xue chu ban she, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kröger, Wolfgang. Vulnerable Systems. London: Springer-Verlag London Limited, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lobanov, Aleksey. Biomedical foundations of security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1007643.

Full text
Abstract:
The textbook discusses the threats and risks to life and health of people in post-industrial society. The role and place of medical and biological technologies in the system of ensuring the safety of the population of the Russian Federation are shown from the standpoint of an interdisciplinary approach. Briefly, but quite informative, the structure of the human body and the principles of its functioning are described. The specificity and mechanism of toxic effects on humans of harmful substances, energy effects and combined action of the main damaging factors of sources of emergency situations of peace and war are shown. The medical and biological aspects of ensuring the safety of human life in adverse environmental conditions, including in regions with hot and cold climates (Arctic) are considered. Means and methods of first aid to victims are shown. The questions of organization and carrying out of measures of medical support of the population in zones of emergency situations and the centers of defeat are covered. Designed for students, students and cadets of educational institutions of higher education, studying under the bachelor's program. It can also be useful for teachers, researchers and a wide range of professionals engaged in practical work on the planning and organization of biomedical protection of the population.
APA, Harvard, Vancouver, ISO, and other styles
6

Environmental Planning and Coordination Organization (Madhya Pradesh, India). Thematic position papers on water and sanitation, energy, health, agriculture and food security, biodiversity and eco-system management: With focus on Madhya Pradesh. Bhopal: Environmental Planning & Coordination Organisation, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rezendes, Victor S. Department of Energy: Improving management of major system acquisitions : statement by Victor S. Rezendes, Director, Energy, Resources, and Science Issues, Resources, Community, and Economic Development Division, before the Subcommittee on Energy and Environment, Committee on Science, House of Representatives. Washington, D.C: The Office, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Office, General Accounting. Information system: Opportunities exist to strengthen SEC's oversight of capacity and security : report to the Ranking Minority Member, Committee on Energy and Commerce, House of Representatives. Washington, D.C: GAO, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cyber security: Hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Twelfth Congress, first session, to receive testimony on a joint staff discussion draft pertaining to cyber security of the bulk-power system and electric infrastructure and for other purposes, May 5, 2011. Washington: U.S. G.P.O., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Office, General Accounting. Homeland security: Communication protocols and risk communication principles can assist in refining the advisory system : report to congressional requesters. Washington, D.C: U.S. General Accounting Office, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Energy security system"

1

Jia, Heping, Yi Ding, Yishuang Hu, and Yonghua Song. "Cyber-Physical System Security." In Energy Internet, 107–19. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45453-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Narula, Kapil. "Global Energy System and Sustainable Energy Security." In Lecture Notes in Energy, 23–49. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1589-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Walker, Sara L. "The UK Electricity System and Its Resilience." In Global Energy Policy and Security, 75–102. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5286-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alcaraz, Cristina, Angel Balastegui, and Javier Lopez. "Early Warning System for Cascading Effect Control in Energy Control Systems." In Critical Information Infrastructures Security, 55–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21694-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Amrutha, A. A., P. Balachandra, and M. Mathirajan. "Low-Carbon Planning in A Resource-Constrained Electricity System: A Case Study from India." In Energy Security and Development, 111–32. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2065-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jiang, Xiawei, Weidong Yi, Yongrui Chen, and Hao He. "Energy Efficient Smart Irrigation System Based on 6LoWPAN." In Cloud Computing and Security, 308–19. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00018-9_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liang, Lulu, Kai Zheng, Qiankun Sheng, Wei Wang, Rong Fu, and Xin Huang. "A Denial of Service Attack Method for IoT System in Photovoltaic Energy System." In Network and System Security, 613–22. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hong, Insung, Jisung Byun, and Sehyun Park. "Lightweight Middleware-Based ZigBee Security in Building Energy Management System." In Information Security Applications, 151–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27890-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jiang, Lijun, Weizhi Meng, Yu Wang, Chunhua Su, and Jin Li. "Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study." In Network and System Security, 199–213. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zeng, Qinghao, Renjun Tang, Xianjun Chen, Hang Pan, Jinlong Chen, and Hui Zhou. "Research on Building Energy Consumption Acquisition System Based on Configuration." In Cloud Computing and Security, 648–57. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00018-9_57.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Energy security system"

1

Neto, C. A. S., M. A. Quadros, M. G. Santos, and Jorge Jardim. "Brazilian System Operator online security assessment system." In Energy Society General Meeting. IEEE, 2010. http://dx.doi.org/10.1109/pes.2010.5590039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hong Chen and Jianwei Liu. "Practices of system security pricing." In Energy Society General Meeting. IEEE, 2008. http://dx.doi.org/10.1109/pes.2008.4596585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Azadani, E. Nasr, S. H. Hosseinian, and J. Moghani. "Market clearing considering power system security." In Energy Conference (EPEC). IEEE, 2008. http://dx.doi.org/10.1109/epc.2008.4763394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bedekar, Vishwas, Mirza Bichurin, Ivan Solovjev, and Shashank Priya. "Multimodal energy harvesting system." In SPIE Defense, Security, and Sensing, edited by Nibir K. Dhar, Priyalal S. Wijewarnasuriya, and Achyut K. Dutta. SPIE, 2011. http://dx.doi.org/10.1117/12.884747.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Prakash, Y. W., Vishakha Biradar, Shenil Vincent, Minto Martin, and Anita Jadhav. "Smart bluetooth low energy security system." In 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2017. http://dx.doi.org/10.1109/wispnet.2017.8300139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Saba, Amreen, and Nagarathna. "IOT based energy efficient security system." In 2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT). IEEE, 2017. http://dx.doi.org/10.1109/icatcct.2017.8389120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Fang, Jian Yang, Zhimin Wu, Xi Chen, and Jianzhong Yu. "Distributed Energy System Improving Security for City Energy Supply." In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5304094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alsayegh, Osamah. "Primary Energy System Chain Security Under the Energy Transition." In SPE Middle East Oil & Gas Show and Conference. SPE, 2021. http://dx.doi.org/10.2118/204893-ms.

Full text
Abstract:
Abstract This paper examines the energy transition consequences on the oil and gas energy system chain as it propagates from net importing through the transit to the net exporting countries (or regions). The fundamental energy system security concerns of importing, transit, and exporting regions are analyzed under the low carbon energy transition dynamics. The analysis is evidence-based on diversification of energy sources, energy supply and demand evolution, and energy demand management development. The analysis results imply that the energy system is going through technological and logistical reallocation of primary energy. The manifestation of such reallocation includes an increase in electrification, the rise of energy carrier options, and clean technologies. Under healthy and normal global economic growth, the reallocation mentioned above would have a mild effect on curbing the oil and gas primary energy demands growth. A case study concerning electric vehicles, which is part of the energy transition aspect, is presented to assess its impact on the energy system, precisely on the fossil fuel demand. Results show that electric vehicles are indirectly fueled, mainly from fossil-fired power stations through electric grids. Moreover, oil byproducts use in the electric vehicle industry confirms the reallocation of the energy system components' roles. The paper's contribution to the literature is the portrayal of the energy system security state under the low carbon energy transition. The significance of this representation is to shed light on the concerns of the net exporting, transit, and net importing regions under such evolution. Subsequently, it facilitates the development of measures toward mitigating world tensions and conflicts, enhancing the global socio-economic wellbeing, and preventing corruption.
APA, Harvard, Vancouver, ISO, and other styles
9

Lerch, E., and U. Kerin. "Dynamic System Security Assessment using Inventive Simulation Techniques." In Power and Energy Systems. Calgary,AB,Canada: ACTAPRESS, 2010. http://dx.doi.org/10.2316/p.2010.701-021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kerin, Uros, Edwin Lerch, and Grega Bizjak. "Power system dynamic security inference — Conceptual solution." In Energy Society General Meeting. IEEE, 2010. http://dx.doi.org/10.1109/pes.2010.5588171.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Energy security system"

1

Judson, Nicholas. Interdependence of the Electricity Generation System and the Natural Gas System and Implications for Energy Security. Fort Belvoir, VA: Defense Technical Information Center, May 2013. http://dx.doi.org/10.21236/ada584764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Miller, Craig, and Robert Larmouth. Energy Sector Security through a System for Intelligent, Learning Network Configuration Monitoring and Management (“Essence”). Office of Scientific and Technical Information (OSTI), May 2017. http://dx.doi.org/10.2172/1360111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Erkamo, Sanna, Karoliina Pilli-Sihvola, Atte Harjanne, and Heikki Tuomenvirta. Climate Security and Finland – A Review on Security Implications of Climate Change from the Finnish Perspective. Finnish Meteorological Institute, 2021. http://dx.doi.org/10.35614/isbn.9789523361362.

Full text
Abstract:
This report describes the effects of climate change for Finland from the view of comprehensive security. The report examines both direct and indirect climate security risks as well as transition risks related to climate change mitigation. The report is based on previous research and expert interviews. Direct security risks refer to the immediate risks caused by the changing nature of natural hazards. These include the risks to critical infrastructure and energy systems, the logistics system, health and food security. Indirect security risks relate to the potential economic, political and geopolitical impacts of climate change. Climate change can affect global migration, increase conflict risk, and cause social tensions and inequality. Transition risks are related to economic and technological changes in energy transition, as well as political and geopolitical tensions and social problems caused by climate change mitigation policies. Reducing the use of fossil fuels can result in domestic and foreign policy tensions and economic pressure especially in locations dependent on fossil fuels. Political tension can also increase the risks associated with hybrid and information warfare. The security effects of climate change affect all sectors of society and the Finnish comprehensive security model should be utilized in preparing for them. In the short run, the most substantial arising climate change related security risks in Finland are likely to occur through indirect or transition risks. Finland, similar to other wealthy countries, has better technological, economic and institutional conditions to deal with the problems and risks posed by climate change than many other countries. However, this requires political will and focus on risk reduction and management.
APA, Harvard, Vancouver, ISO, and other styles
4

Stamp, Jason E., Jimmy Edward Quiroz, and Abraham Ellis. Cyber Security Gap Analysis for Critical Energy Systems (CSGACES). Office of Scientific and Technical Information (OSTI), August 2017. http://dx.doi.org/10.2172/1494189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pullammanappallil, Pratap, Haim Kalman, and Jennifer Curtis. Investigation of particulate flow behavior in a continuous, high solids, leach-bed biogasification system. United States Department of Agriculture, January 2015. http://dx.doi.org/10.32747/2015.7600038.bard.

Full text
Abstract:
Recent concerns regarding global warming and energy security have accelerated research and developmental efforts to produce biofuels from agricultural and forestry residues, and energy crops. Anaerobic digestion is a promising process for producing biogas-biofuel from biomass feedstocks. However, there is a need for new reactor designs and operating considerations to process fibrous biomass feedstocks. In this research project, the multiphase flow behavior of biomass particles was investigated. The objective was accomplished through both simulation and experimentation. The simulations included both particle-level and bulk flow simulations. Successful computational fluid dynamics (CFD) simulation of multiphase flow in the digester is dependent on the accuracy of constitutive models which describe (1) the particle phase stress due to particle interactions, (2) the particle phase dissipation due to inelastic interactions between particles and (3) the drag force between the fibres and the digester fluid. Discrete Element Method (DEM) simulations of Homogeneous Cooling Systems (HCS) were used to develop a particle phase dissipation rate model for non-spherical particle systems that was incorporated in a two-fluid CFDmultiphase flow model framework. Two types of frictionless, elongated particle models were compared in the HCS simulations: glued-sphere and true cylinder. A new model for drag for elongated fibres was developed which depends on Reynolds number, solids fraction, and fibre aspect ratio. Schulze shear test results could be used to calibrate particle-particle friction for DEM simulations. Several experimental measurements were taken for biomass particles like olive pulp, orange peels, wheat straw, semolina, and wheat grains. Using a compression tester, the breakage force, breakage energy, yield force, elastic stiffness and Young’s modulus were measured. Measurements were made in a shear tester to determine unconfined yield stress, major principal stress, effective angle of internal friction and internal friction angle. A liquid fludized bed system was used to determine critical velocity of fluidization for these materials. Transport measurements for pneumatic conveying were also assessed. Anaerobic digestion experiments were conducted using orange peel waste, olive pulp and wheat straw. Orange peel waste and olive pulp could be anaerobically digested to produce high methane yields. Wheat straw was not digestible. In a packed bed reactor, anaerobic digestion was not initiated above bulk densities of 100 kg/m³ for peel waste and 75 kg/m³ for olive pulp. Interestingly, after the digestion has been initiated and balanced methanogenesis established, the decomposing biomass could be packed to higher densities and successfully digested. These observations provided useful insights for high throughput reactor designs. Another outcome from this project was the development of low cost devices to measure methane content of biogas for off-line (US$37), field (US$50), and online (US$107) applications.
APA, Harvard, Vancouver, ISO, and other styles
6

Stamber, Kevin L., Andjelka Kelic, Robert A. Taylor, Jordan M. Henry, and Jason E. Stamp. Distributed Energy Systems: Security Implications of the Grid of the Future. Office of Scientific and Technical Information (OSTI), January 2017. http://dx.doi.org/10.2172/1341777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gadgil, Shrirang, Yow-Jian Lin, Abhrajit Ghosh, Sunil Samtani, Jaewon Kang, Bruce Siegell, Vikram Kaul, et al. Tools and Methods for Hardening Communication Security of Energy Delivery Systems. Office of Scientific and Technical Information (OSTI), September 2014. http://dx.doi.org/10.2172/1170365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Benton, Tim, Antony Froggatt, Laura Wellesley, Owen Grafham, Richard King, Neil Morisetti, James Nixey, and Patrick Schröder. The Ukraine war and threats to food and energy security: Cascading risks from rising prices and supply disruptions. Royal Institute of International Affairs, April 2022. http://dx.doi.org/10.55317/9781784135225.

Full text
Abstract:
Global resource markets are still reeling from the impacts of Russia’s invasion of Ukraine; the two countries are major suppliers of energy, food and fertilizers. Supply disruption and the sudden imposition, in response to the crisis, of unprecedented economic sanctions, trade restrictions and policy interventions have caused prices of commodities to skyrocket. Before the conflict, demand for global resources already exceeded supply and drove up prices as economies rebounded after the COVID-19 pandemic. This gave rise to a global cost-of-living crisis, characterized by increasing levels of energy and food poverty. This situation is likely to become much worse as a consequence of the war in Ukraine, and poses a threat to human security, particularly among low-income and vulnerable populations. Governments must invest now to build resilient societies and economies to meet these long-term challenges. Mitigating the most immediate harms to populations is a top priority for policymakers, but failure to keep long-term objectives in mind – climate change mitigation, in particular – can lead to bad decisions that further embed existing fragilities in economic and social systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Lewis, Dustin, and Naz Modirzadeh. Taking into Account the Potential Effects of Counterterrorism Measures on Humanitarian and Medical Activities: Elements of an Analytical Framework for States Grounded in Respect for International Law. Harvard Law School Program on International Law and Armed Conflict, May 2021. http://dx.doi.org/10.54813/qbot8406.

Full text
Abstract:
For at least a decade, States, humanitarian bodies, and civil-society actors have raised concerns about how certain counterterrorism measures can prevent or impede humanitarian and medical activities in armed conflicts. In 2019, the issue drew the attention of the world’s preeminent body charged with maintaining or restoring international peace and security: the United Nations Security Council. In two resolutions — Resolution 2462 (2019) and Resolution 2482 (2019) — adopted that year, the Security Council urged States to take into account the potential effects of certain counterterrorism measures on exclusively humanitarian activities, including medical activities, that are carried out by impartial humanitarian actors in a manner consistent with international humanitarian law (IHL). By implicitly recognizing that measures adopted to achieve one policy objective (countering terrorism) can impair or prevent another policy objective (safeguarding humanitarian and medical activities), the Security Council elevated taking into account the potential effects of certain counterterrorism measures on exclusively humanitarian activities to an issue implicating international peace and security. In this legal briefing, we aim to support the development of an analytical framework through which a State may seek to devise and administer a system to take into account the potential effects of counterterrorism measures on humanitarian and medical activities. Our primary intended audience includes the people involved in creating or administering a “take into account” system and in developing relevant laws and policies. Our analysis zooms in on Resolution 2462 (2019) and Resolution 2482 (2019) and focuses on grounding the framework in respect for international law, notably the U.N. Charter and IHL. In section 1, we introduce the impetus, objectives, and structure of the briefing. In our view, a thorough legal analysis of the relevant resolutions in their wider context is a crucial element to laying the conditions conducive to the development and administration of an effective “take into account” system. Further, the stakes and timeliness of the issue, the Security Council’s implicit recognition of a potential tension between measures adopted to achieve different policy objectives, and the relatively scant salient direct practice and scholarship on elements pertinent to “take into account” systems also compelled us to engage in original legal analysis, with a focus on public international law and IHL. In section 2, as a primer for readers unfamiliar with the core issues, we briefly outline humanitarian and medical activities and counterterrorism measures. Then we highlight a range of possible effects of the latter on the former. Concerning armed conflict, humanitarian activities aim primarily to provide relief to and protection for people affected by the conflict whose needs are unmet, whereas medical activities aim primarily to provide care for wounded and sick persons, including the enemy. Meanwhile, for at least several decades, States have sought to prevent and suppress acts of terrorism and punish those who commit, attempt to commit, or otherwise support acts of terrorism. Under the rubric of countering terrorism, States have taken an increasingly broad and diverse array of actions at the global, regional, and national levels. A growing body of qualitative and quantitative evidence documents how certain measures designed and applied to counter terrorism can impede or prevent humanitarian and medical activities in armed conflicts. In a nutshell, counterterrorism measures may lead to diminished or complete lack of access by humanitarian and medical actors to the persons affected by an armed conflict that is also characterized as a counterterrorism context, or those measures may adversely affect the scope, amount, or quality of humanitarian and medical services provided to such persons. The diverse array of detrimental effects of certain counterterrorism measures on humanitarian and medical activities may be grouped into several cross-cutting categories, including operational, financial, security, legal, and reputational effects. In section 3, we explain some of the key legal aspects of humanitarian and medical activities and counterterrorism measures. States have developed IHL as the primary body of international law applicable to acts and omissions connected with an armed conflict. IHL lays down several rights and obligations relating to a broad spectrum of humanitarian and medical activities pertaining to armed conflicts. A violation of an applicable IHL provision related to humanitarian or medical activities may engage the international legal responsibility of a State or an individual. Meanwhile, at the international level, there is no single, comprehensive body of counterterrorism laws. However, States have developed a collection of treaties to pursue specific anti-terrorism objectives. Further, for its part, the Security Council has assumed an increasingly prominent role in countering terrorism, including by adopting decisions that U.N. Member States must accept and carry out under the U.N. Charter. Some counterterrorism measures are designed and applied in a manner that implicitly or expressly “carves out” particular safeguards — typically in the form of limited exceptions or exemptions — for certain humanitarian or medical activities or actors. Yet most counterterrorism measures do not include such safeguards. In section 4, which constitutes the bulk of our original legal analysis, we closely evaluate the two resolutions in which the Security Council urged States to take into account the effects of (certain) counterterrorism measures on humanitarian and medical activities. We set the stage by summarizing some aspects of the legal relations between Security Council acts and IHL provisions pertaining to humanitarian and medical activities. We then analyze the status, consequences, and content of several substantive elements of the resolutions and what they may entail for States seeking to counter terrorism and safeguard humanitarian and medical activities. Among the elements that we evaluate are: the Security Council’s new notion of a prohibited financial “benefit” for terrorists as it may relate to humanitarian and medical activities; the Council’s demand that States comply with IHL obligations while countering terrorism; and the constituent parts of the Council’s notion of a “take into account” system. In section 5, we set out some potential elements of an analytical framework through which a State may seek to develop and administer its “take into account” system in line with Resolution 2462 (2019) and Resolution 2482 (2019). In terms of its object and purpose, a “take into account” system may aim to secure respect for international law, notably the U.N. Charter and IHL pertaining to humanitarian and medical activities. In addition, the system may seek to safeguard humanitarian and medical activities in armed conflicts that also qualify as counterterrorism contexts. We also identify two sets of preconditions arguably necessary for a State to anticipate and address relevant potential effects through the development and execution of its “take into account” system. Finally, we suggest three sets of attributes that a “take into account” system may need to embody to achieve its aims: utilizing a State-wide approach, focusing on potential effects, and including default principles and rules to help guide implementation. In section 6, we briefly conclude. In our view, jointly pursuing the policy objectives of countering terrorism and safeguarding humanitarian and medical activities presents several opportunities, challenges, and complexities. International law does not necessarily provide ready-made answers to all of the difficult questions in this area. Yet devising and executing a “take into account” system provides a State significant opportunities to safeguard humanitarian and medical activities and counter terrorism while securing greater respect for international law.
APA, Harvard, Vancouver, ISO, and other styles
10

Rahimipour, Shai, and David Donovan. Renewable, long-term, antimicrobial surface treatments through dopamine-mediated binding of peptidoglycan hydrolases. United States Department of Agriculture, January 2012. http://dx.doi.org/10.32747/2012.7597930.bard.

Full text
Abstract:
There is a need for renewable antimicrobial surface treatments that are semi- permanent, can eradicate both biofilms and planktonic pathogens over long periods of time and that do not select for resistant strains. This proposal describes a dopamine binding technology that is inexpensive, bio-friendly, non-toxic, and uses straight-forward commercially available products. The antimicrobial agents are peptidoglycanhydrolase enzymes that are non-toxic and highly refractory to resistance development. The goal of this project is to create a treatment that will be applicable to a wide variety of surfaces and will convey long-lasting antimicrobial activity. Although the immediate goal is to create staphylolytic surfaces, the technology should be applicable to any pathogen and will thus contribute to no less than 3 BARD priorities: 1) increased animal production by protecting animals from invasive and emerging diseases, 2) Antimicrobial food packaging will improve food safety and security and 3) sustainable bio- energy systems will be supported by coating fermentation vats with antimicrobials that could protect ethanolic fermentations from Lactobacillus contamination that reduces ethanol yields. The dopamine-based modification of surfaces is inspired by the strong adhesion of mussel adhesion proteins to virtually all types of surfaces, including metals, polymers, and inorganic materials. Peptidoglycanhydrolases (PGHs) meet the criteria of a surface bound antimicrobial with their site of action being extracellular peptidoglycan (the structural basis of the bacterial cell wall) that when breached causes osmotic lysis. As a proof of principle, we will develop technology using peptidoglycanhydrolase enzymes that target Staphylococcus aureus, a notoriously contagious and antimicrobial-resistant pathogen. We will test for susceptibility of the coating to a variety of environmental stresses including UV light, abrasive cleaning and dessication. In order to avoid resistance development, we intend to use three unique, synergistic, simultaneous staphylococcal enzyme activities. The hydrolases are modular such that we have created fusion proteins with three lytic activities that are highly refractory to resistance development. It is essential to use multiple simultaneous activities to avoid selecting for antimicrobial resistant strains. This strategy is applicable to both Gram positive and negative pathogens. We anticipate that upon completion of this award the technology will be available for commercialization within the time required to achieve a suitable high volume production scheme for the required enzymes (~1-2 years). We expect the modified surface will remain antimicrobial for several days, and when necessary, the protocol for renewal of the surface will be easily applied in a diverse array of environments, from food processing plants to barnyards.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography