Academic literature on the topic 'Management of energy security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Management of energy security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Management of energy security"

1

Tang, Adrian, Simha Sethumadhavan, and Salvatore Stolfo. "Motivating Security-Aware Energy Management." IEEE Micro 38, no. 3 (May 2018): 98–106. http://dx.doi.org/10.1109/mm.2018.032271066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Proskuryakova, L. "Updating energy security and environmental policy: Energy security theories revisited." Journal of Environmental Management 223 (October 2018): 203–14. http://dx.doi.org/10.1016/j.jenvman.2018.06.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sohn, Ira. "US energy security." Energy Policy 18, no. 2 (March 1990): 149–61. http://dx.doi.org/10.1016/0301-4215(90)90140-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mouftah, H. T., R. Kun, and D. Hoffer. "A distributed energy management and security system." Journal of Microcomputer Applications 10, no. 1 (January 1987): 29–39. http://dx.doi.org/10.1016/0745-7138(87)90034-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sulimin, Vladimir, Vladislav Shvedov, and Maiia Lvova. "Energy security management of a business entity." E3S Web of Conferences 270 (2021): 01010. http://dx.doi.org/10.1051/e3sconf/202127001010.

Full text
Abstract:
Nowadays, the basic indicator of the stability of an economic entity established to sell its products and obtain profits is its economic security, i.e. the protection of its interests regardless specific impact of different external and internal factors. The paper deals with the ways to ensure the entity energy system security, and measures to improve the efficiency of this system management. The paper also identifies the most typical threats to uninterruptible energy supply of enterprises and organizations, as well as means of preventing and overcoming problems caused by these problems.
APA, Harvard, Vancouver, ISO, and other styles
6

Mityakov, E. S., and A. I. Ladynin. "HIGH-TECH ENTERPRISES ENERGY SECURITY MANAGEMENT MODEL." Развитие и безопасность, no. 4 (2021): 62–72. http://dx.doi.org/10.46960/2713-2633_2021_4_62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Markandya, Anil, and Malcolm Pemberton. "Energy security, energy modelling and uncertainty." Energy Policy 38, no. 4 (April 2010): 1609–13. http://dx.doi.org/10.1016/j.enpol.2009.01.046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

MacKerron, Gordon. "Energy security to 2000." Energy Policy 16, no. 3 (June 1988): 326–27. http://dx.doi.org/10.1016/0301-4215(88)90168-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vasilescu, Gabriel, Passca Mihaela, Mihail Vătăsescu, and Ciprian Jitea. "Management of Security Risk in the Energy Field." Global Environmental Engineers 1, no. 1 (November 27, 2014): 24–28. http://dx.doi.org/10.15377/2410-3624.2014.01.01.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Voynarenko, Mykhaylo, Mariia V. Dykha, Oksana Mykoliuk, Ludmyla Yemchuk, and Anastasiia Danilkova. "Assessment of an enterprise’s energy security based on multi-criteria tasks modeling." Problems and Perspectives in Management 16, no. 4 (October 26, 2018): 102–16. http://dx.doi.org/10.21511/ppm.16(4).2018.10.

Full text
Abstract:
Today Ukrainian business entities operate in conditions of macroeconomic instability, environmental disturbance, energy dependence on risk of instable and interrupted supply and high cost of energy resources, excessive energy consumption and inefficient use of fuel and energy resources, which requires immediate actions as for finding solutions to ensure energy security. The goal of the article is to solve multi-criteria tasks focused on making managerial decisions regarding the development of enterprise energy security system based on evaluation of influence of numerous factors. As a result of this study, main components of energy security of the enterprise and most important influence factors are determined. The mathematical model of the hierarchy of factors in terms of their influence on the energy security of the enterprise with the use of graph theory is developed. Use of iterative procedure to determine the levels of hierarchy of factors allowed to assess the importance/priority of their influence on energy security of the enterprise. Thus, the developed model of hierarchy of factors based on the applied scientific and methodical approach to determine their influence on energy security of the enterprise provides the opportunity to get a detailed idea of factors interaction, interconnections and influence on energy security of the enterprise, which ultimately leads to elaboration of complex optimal/agreed managerial decisions in context of development and implementation of energy security system of the enterprise.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Management of energy security"

1

Zhong, Wanyun. "Demand Uncertainties Management in SCUC and Voltage Security Enhancement for SCED." Case Western Reserve University School of Graduate Studies / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case1554420443707557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hrubý, Martin. "ENERGY MANAGEMENT STRATEGY FOR SUSTAINABLE REGIONAL DEVELOPMENT." Doctoral thesis, Vysoké učení technické v Brně. Fakulta stavební, 2016. http://www.nusl.cz/ntk/nusl-390247.

Full text
Abstract:
Energy Management strategy for sustainable regional development has been selected as the topic of my research due to the fact that energy demand alongside with energy dependency have been continuously growing from a long term perspective. Sustainable development is defined by three imperatives – energy efficiency, ecology and security. Review of the current state and analysis of historical trends in Energetics at global and regional level are covered in this research. Results of the Multi-Criteria Decision Analysis introduce a set of implications and recommendations for Energy Management strategy in the Czech Republic.
APA, Harvard, Vancouver, ISO, and other styles
3

Mohammadi, Javad. "Distributed Computational Methods for Energy Management in Smart Grids." Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/710.

Full text
Abstract:
It is expected that the grid of the future differs from the current system by the increased integration of distributed generation, distributed storage, demand response, power electronics, and communications and sensing technologies. The consequence is that the physical structure of the system becomes significantly more distributed. The existing centralized control structure is not suitable any more to operate such a highly distributed system. This thesis is dedicated to providing a promising solution to a class of energy management problems in power systems with a high penetration of distributed resources. This class includes optimal dispatch problems such as optimal power flow, security constrained optimal dispatch, optimal power flow control and coordinated plug-in electric vehicles charging. Our fully distributed algorithm not only handles the computational complexity of the problem, but also provides a more practical solution for these problems in the emerging smart grid environment. This distributed framework is based on iteratively solving in a distributed fashion the first order optimality conditions associated with the optimization formulations. A multi-agent viewpoint of the power system is adopted, in which at each iteration, every network agent updates a few local variables through simple computations, and exchanges information with neighboring agents. Our proposed distributed solution is based on the consensus+innovations framework, in which the consensus term enforces agreement among agents while the innovations updates ensure that local constraints are satisfied.
APA, Harvard, Vancouver, ISO, and other styles
4

Nair, Nirmal-Kumar. "Incorporating voltage security into the planning, operation and monitoring of restructured electric energy markets." Texas A&M University, 2004. http://hdl.handle.net/1969.1/3199.

Full text
Abstract:
As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater attention to operating costs than stability and security margins. Since operating stability is a basic requirement for any power system, there is need for newer tools to ensure stability and security margins being strictly enforced in the competitive marketplace. This dissertation investigates issues associated with incorporating voltage security into the unbundled operating environment of electricity markets. It includes addressing voltage security in the monitoring, operational and planning horizons of restructured power system. This dissertation presents a new decomposition procedure to estimate voltage security usage by transactions. The procedure follows physical law and uses an index that can be monitored knowing the state of the system. The expression derived is based on composite market coordination models that have both PoolCo and OpCo transactions, in a shared stressed transmission grid. Our procedure is able to equitably distinguish the impacts of individual transactions on voltage stability, at load buses, in a simple and fast manner. This dissertation formulates a new voltage stability constrained optimal power flow (VSCOPF) using a simple voltage security index. In modern planning, composite power system reliability analysis that encompasses both adequacy and security issues is being developed. We have illustrated the applicability of our VSCOPF into composite reliability analysis. This dissertation also delves into the various applications of voltage security index. Increasingly, FACT devices are being used in restructured markets to mitigate a variety of operational problems. Their control effects on voltage security would be demonstrated using our VSCOPF procedure. Further, this dissertation investigates the application of steady state voltage stability index to detect potential dynamic voltage collapse. Finally, this dissertation examines developments in representation, standardization, communication and exchange of power system data. Power system data is the key input to all analytical engines for system operation, monitoring and control. Data exchange and dissemination could impact voltage security evaluation and therefore needs to be critically examined.
APA, Harvard, Vancouver, ISO, and other styles
5

Rathinavel, Kruthika. "Design and Implementation of a Secure Web Platform for a Building Energy Management Open Source Software." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/55271.

Full text
Abstract:
Commercial buildings consume more than 40% of the total energy consumption in the United States. Almost 90% of these buildings are small- and medium-sized buildings that do not have a Building Energy Management (BEM) system. The reasons behind this are – lack of awareness, unavailability of inexpensive packaged solutions, and disincentive to invest in a BEM system if the tenant is not the owner. Several open source tools and technologies have emerged recently that can be used for building automation and energy management. However, none of these systems is turnkey and deployment ready. They also lack consistent and intuitive navigation, security, and performance required for a BEM system. The overall project - of which this thesis research is a part - addresses the design and implementation of an open source secure web based user platform to monitor, schedule, control, and perform functions needed for a BEM system serving small and medium-size buildings. The focus of this work are: principles of intuitive graphical user interface design, abstracting device functions into a comprehensive data model, identifying threats and vulnerabilities, and implementing a security framework for the web platform. Monitor and control solutions for devices such as load controllers and sensors are abstracted and their decentralized control strategies are proposed and implemented using an open source robust scalable user platform accessible locally and remotely. The user platform is open-source, scalable, provides role-based access, dynamic, and modular in design. The comprehensive data model includes a user management model, device model, session model, and a scheduling model. The data model is designed to be flexible, robust and can be extended for any new device type. Security risks are analyzed using a threat model to identify security goals. The proposed security framework includes user authentication, device approval, role-based access, secure information exchange protocols, and web platform security. Performance of the user interface platform is evaluated for responsiveness in different screen sizes, page response times, throughput, and the performance of client side entities.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Hamadi, Hamid Helal. "Dynamic Redundancy Management of Multisource Multipath Routing Integrated with Voting-based Intrusion Detection in Wireless Sensor Networks." Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/47681.

Full text
Abstract:
Wireless sensor networks (WSNs) are frequently deployed unattended and can be easily captured or compromised. Once compromised, intrusion prevention methods such as encryption can no longer provide any protection, as a compromised node is considered a legitimate node and possesses the secret key for decryption. Compromised nodes are essentially inside attackers and can perform various attacks to break the functionality of the system. Thus, for safety-critical WSNs, intrusion detection techniques must be used to detect and remove inside attackers and fault tolerance techniques must be used to tolerate inside attackers to prevent security failure. In this dissertation research, we develop a class of dynamic redundancy management algorithms for redundancy management of multisource multipath routing for fault and intrusion tolerance, and majority voting for intrusion detection, with the goal of maximizing the WSN lifetime while satisfying application quality-of-service and security requirements, for base station based WSNs, homogeneous clustered WSNs, and heterogeneous clustered WSNs. By means of a novel model-based analysis methodology based on probability theory, we model the tradeoff between energy consumption vs. reliability, timeliness and security gain, and identify the optimal multisource multipath redundancy level and intrusion detection settings for maximizing the lifetime of the WSN while satisfying application quality-of-service requirements. A main contribution of our research dissertation is that our dynamic redundancy management protocol design addresses the issues of "how many paths to use" and "what paths to use" in multisource multipath routing for intrusion tolerance. Another contribution is that we take an integrated approach combining intrusion detection and tolerance in the protocol design to address the issue of "how much intrusion detection is enough" to prevent security failure and prolong the WSN lifetime time. We demonstrate resiliency of our dynamic redundancy management protocol design for intrusion detection and tolerance against sophisticated attacker behaviors, including selective and random capture, as well as persistent, random, opportunistic and insidious attacks, by model-based performance analysis with results supported by extensive simulation based on ns3.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Jason. "Three Studies of Stakeholder Influence in the Formation and Management of Tax Policies." Doctoral diss., University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5157.

Full text
Abstract:
This dissertation consists of three separate but interrelated studies examining the formation and management of tax policies. The first study uses stakeholder theory (ST) to investigate the strategic management practices of the Transport for London (TfL) during discrete stages in the adoption, implementation, and amendments of the tax policy reform known as the London Congestion Charge (LCC). Results indicate that TfL has utilized power, legitimacy, and urgency as its main policy management tactics with a significant emphasis on legitimatizing the LCC and its subsequent policy amendments. The second study draws on social exchange theory (SET) to reexamine the relationship between corporations and legislators during tax policy processes. Data for the study come from publicly available political action committee (PAC) contribution activities surrounding the Energy Independence and Security Act of 2007 (EISA07). By examining the endogeneity between legislators' voting patterns and PAC contributions by corporations, this study aims to refine empirical work on corporate political strategy, especially as it relates to crucial tax provisions embedded within an intensely debated policy proposal. Using simultaneous equations modeling (SEM), results are consistent with SET showing that an implicit and reciprocal relationship exists between corporations and legislators. This relationship affects the interdependence of how legislators vote for public policies and the amount of corporations' financial contributions to legislators. The third study investigates and aims to validate the empirical applicability of Dahan's (2005) typology of political resources in explicating the political interactions between stakeholder groups and legislators in the development of EISA07. I discuss how and why the mode of operations and various political resources employed by stakeholder groups affected the final EISA07 language concerning domestic production deduction tax credits for the oil and gas industry. Publicly available data show that both supporting and opposing stakeholder groups employ tactics consistent with Dahan's (2005) typology. However, both stakeholder groups tend to use an interactive or positive political approach to gain access and favor of legislators instead of an adversarial approach. Ultimately, the tax credits were preserved. Taken as a whole, the three studies advance the tax and public policy research literature in accounting by studying how and why relevant stakeholders affect the formation and ongoing management of public and tax policies.
ID: 031001472; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Title from PDF title page (viewed July 15, 2013).; Thesis (Ph.D.)--University of Central Florida, 2012.; Includes bibliographical references.
Ph.D.
Doctorate
Business Administration
Business Administration; Accounting
APA, Harvard, Vancouver, ISO, and other styles
8

Vicente, Fernando Antônio da Costa Figueiredo. "Gestão estratégica da segurança do trabalho na área industrial de uma usina de etanol, açúcar e energia elétrica." reponame:Repositório Institucional do FGV, 2012. http://hdl.handle.net/10438/9883.

Full text
Abstract:
Submitted by Fernando Antônio da Costa Figueiredo Vicente (fernando@altamogiana.com.br) on 2012-07-11T11:20:20Z No. of bitstreams: 1 TESE FERNANDO VERSÃO FINAL E OFICIAL.pdf: 4861683 bytes, checksum: 5cbcd8ded972414ea9f4453b44a416a1 (MD5)
Approved for entry into archive by Suzinei Teles Garcia Garcia (suzinei.garcia@fgv.br) on 2012-07-11T12:27:50Z (GMT) No. of bitstreams: 1 TESE FERNANDO VERSÃO FINAL E OFICIAL.pdf: 4861683 bytes, checksum: 5cbcd8ded972414ea9f4453b44a416a1 (MD5)
Made available in DSpace on 2012-07-11T12:32:20Z (GMT). No. of bitstreams: 1 TESE FERNANDO VERSÃO FINAL E OFICIAL.pdf: 4861683 bytes, checksum: 5cbcd8ded972414ea9f4453b44a416a1 (MD5) Previous issue date: 2012-06-13
Achieve profitability in a plant ethanol producer, sugar and electric power, without accidents at work, went on to be major challenge. Therefore, the Security Management has become strategic, seeking to bring business value "security" as a fundamental instrument in the implementation of production. Raise the history of implementation of the safety management System of the power plant and also we checked through universal indicators of security, if the numbers achieved satisfactory evolution, present trying to identify the actions taken and the results. In the process of evolution of that system, the plant became the first in the world in obtaining International certification (OHSAS 18001) security sector, as well as achieve Cosan 4th cane processing in Brazil. Applying the ICOS Instrument - Organizational Climate inventory safety in 2005 and again in 2011, we evaluate whether with production growth, coupled with the increase in the number of employees, the security value remained present. Apuramos also possible factors such as company time, schooling, proportion of accidents and interviews with officials who contributed to the existence of sectors there are 16 years without losing a day of work by accident. Finally, we found that deal with security management, empowers the company to face difficulties on the market, because success can not be worth today, for the following day in the event of an accident. Prevent, educate, seeking knowledge, celebrate, collect results, and daring, define plant's administration style studied.
Conseguir lucratividade em uma usina produtora de etanol, açúcar e energia elétrica, sem acidentes do trabalho, passou a ser grande desafio. Portanto, a Gestão de Segurança transformou-se em estratégica, buscando levar o valor empresarial 'segurança' como instrumento fundamental na execução da produção. Levantamos a história da implantação do Sistema de Gestão da Segurança da usina e também checamos através de indicadores universais de segurança, se os números alcançados, apresentam evolução satisfatória, procurando identificar as ações aplicadas e os resultados. No processo de evolução desse sistema, a usina tornou-se a primeira do mundo na obtenção de uma Certificação Internacional de Segurança (OHSAS 18001) do setor sucroenergético, além de alcançar quarto lugar em processamento de cana no Brasil. Aplicando o Instrumento ICOS – Inventário de Clima Organizacional de Segurança em 2005 e novamente em 2011, avaliamos se com crescimento da produção, aliado ao aumento do número de trabalhadores, o valor segurança manteve-se presente. Também apuramos possíveis fatores como tempo de empresa, escolaridade, proporção de acidentes e entrevistas com os responsáveis que contribuíram para a existência de setores há 16 anos sem perder um dia de trabalho por acidente. Finalmente, concluímos que lidar com gestão da segurança, capacita a empresa para enfrentar dificuldades do mercado, pois sucesso hoje, pode não valer para o dia seguinte caso ocorra acidente. Prevenir, educar, buscar conhecimento, celebrar, cobrar resultados e ousadia, definem o estilo de administração da usina estudada.
APA, Harvard, Vancouver, ISO, and other styles
9

Schneider, Frédéric. "Les energies marines renouvelables face au droit." Thesis, Nice, 2013. http://www.theses.fr/2013NICE0010.

Full text
Abstract:
La question des énergies marines renouvelables dégage des problématiques juridiques complexes qui intéressent le droit tant dans sa dimension internationale, européenne que nationale. L’effervescence des initiatives publiques et privées en ce domaine implique une approche adaptée en vue d’améliorer et de développer les instruments juridiques nécessaires au développement durable des énergies de la mer. Cette approche suppose trois niveaux d’analyse. Au regard du droit international, celle-ci se caractérise par une finalité environnementale qui relève plus globalement de l’intérêt général. En ce sens, la conversion d’énergies marines n’engendre pas d’émission de gaz à effet de serre et son impact sur le milieu marin est généralement minime. Avec le concours des énergies de la mer, les États seront à même de respecter leurs engagements supranationaux, notamment en matière de changements climatiques. De surcroît, le droit de la mer offre une sécurité juridique dans l’utilisation de l’espace maritime en définissant non seulement les droits, mais les obligations des États côtiers. À l’échelle européenne, la sécurité juridique est liée à l’objectif d’une part d’au moins 20 % d’énergie produite à partir de sources renouvelables dans la consommation finale brute d’énergie de l’Union d’ici à 2020 et encouragée par l’initiative des États riverains des mers du Nord en faveur d’un réseau off-shore dans le contexte de l’émergence du marché européen des énergies renouvelables. Au plan national, l’analyse du droit interne met en lumière les meilleures pratiques relatives au développement des énergies marines renouvelables en termes de promotion des investissements et de gestion durable des mers et des océans
The issue of marine renewable energies raises complex legal problems which interest the Law in its International, European and Domestic dimension. The effervescence of public and private initiatives on the matter requires a tailored approach to improve and develop legal instruments to support development of ocean energies. This approach elicits three levels of analysis. According to the International Law, it is marked by an environmental objective resulting from public interest. In this sense, marine energy conversion does not generate greenhouse gas emissions and its impact on the marine environment is generally minimal. With the help of these renewable energies, States will be able to respect their supranational commitments, particularly regarding climate change. In addition, the Law of the Sea provides legal certainty in the use of ocean space, by defining not only rights but obligations to coastal states. At the European level, legal certainty is connected to the target of at least 20 % share of energy from renewable sources in the Union's gross final consumption of energy by 2020, and is especially encouraged by the North Seas Countries' Offshore Grid Initiative in the context of the Europe's emerging renewable energy market. On a National perspective, the analysis of Comparative Law highlights the best practices related to offshore renewable development in terms of promoting investment and sustainable ocean management
APA, Harvard, Vancouver, ISO, and other styles
10

Seslikaya, Huseyin. "Energy security and Turkey." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FSeslikaya.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Middle East, South Asia, Sub-Saharan Africa))--Naval Postgraduate School, December 2008.
Thesis Advisor(s): Looney, Robert E. "December 2008." Description based on title screen as viewed on February 2, 2009. Includes bibliographical references (p. 65-70). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Management of energy security"

1

Amitabh, Sikdar, ed. India & China: Strategic energy management and security. New Delhi: Manas Publications, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sikdar, Bimal Kumar. India & China: Strategic energy management and security. New Delhi: Manas Publications, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sikdar, Bimal Kumar. India & China: Strategic energy management and security. New Delhi: Manas Publications, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sikdar, Bimal Kumar. India & China: Strategic energy management and security. New Delhi: Manas Publications, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

World Energy Engineering Congress (25th 2002 Atlanta, Ga.). Solutions for energy security & facility management challenges. Lilburn, GA: Fairmont Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Meteorology and energy security: Simulations, projections, and management. Toronto: Apple Academic Press, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Frondel, Manuel. Measuring energy security: A conceptual note. Essen: RWI, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Commission, Mekong River. Transboundary river basin management: Addressing water, energy and food security. Vientiane: Mekong River Commission, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

International Conference on Sustainable Energy Development (2006 New Delhi, India). Green power 5: Development & management of resources and energy security : conference proceedings. New Delhi: India Core, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Dept. of Energy. Office of Audit Services. Audit report: The department's cyber security incident management capability. Washington, DC: Office of Inspector General, Dept. of Energy, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Management of energy security"

1

Garcia, Flavio D., and Bart Jacobs. "Privacy-Friendly Energy-Metering via Homomorphic Encryption." In Security and Trust Management, 226–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22444-7_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Minghui, Zhang, Song Xuefeng, and Li Yongfeng. "Early-Warning Framework of China’s Energy Security." In Computational Risk Management, 453–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18387-4_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nallathiga, Ramakrishna. "Integration of Emission Reduction and Environmental Management Goals for Sustainable Urban Development." In Energy Security and Development, 451–69. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2065-7_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Romejko, Kamila, and Masaru Nakano. "Introduction of Clean Energy Vehicles in Poland Under Energy Security Constraints." In Advances in Production Management Systems: Innovative Production Management Towards Sustainable Growth, 343–52. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-22759-7_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kilic, Umit, and A. Beril Tugrul. "Identification and Analysis of Risks Associated with Gas Supply Security of Turkey." In Energy Systems and Management, 241–52. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16024-5_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hong, Insung, Jisung Byun, and Sehyun Park. "Lightweight Middleware-Based ZigBee Security in Building Energy Management System." In Information Security Applications, 151–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27890-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jabeen, Musarrat. "Plenary Lecture: South Asia and Management of Energy Security." In Energy, Environment and Sustainable Development, 7. Vienna: Springer Vienna, 2011. http://dx.doi.org/10.1007/978-3-7091-0109-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Krienke, Brian T., Daran R. Rudnick, Tsz Him Lo, and Xin Qiao. "Nitrogen Management for Improving Water, Energy, and Food Security." In Food, Energy, and Water Nexus, 203–14. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-85728-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nasu, Hitoshi. "Managing Future Disasters: Japan’s Energy Security and Nanotechnology Regulation." In Asia-Pacific Disaster Management, 139–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39768-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Al., Troccoli Et. "Weather/Climate Risk Management for the Energy Sector: Workshop Recommendations." In NATO Science for Peace and Security Series C: Environmental Security, 327–32. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-3692-6_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Management of energy security"

1

Tvaronavičienė, Manuela. "ENERGY SECURITY AND ENERGY EFFICIENCY ISSUES: HOUSEHOLD PERSPECTIVE IN EUROPEAN COUNTRIES." In Business and Management 2016. VGTU Technika, 2016. http://dx.doi.org/10.3846/bm.2016.66.

Full text
Abstract:
Aim of presented paper is provide the latest approaches towards energy security, to examine methodological foundations used, and to contribute to the contemporary discussion by providing new insights stemming from emerging needs of enhancing energy security. In the presented paper a role of energy efficiency among other constituents of energy security is being discussed. The second – analytical – part of paper is devoted to forecasting of long-term (until year 2050) energy intensities in household sectors in the following countries: Lithuania, Estonia, Belgium, Germany, Luxemburg and Bulgaria. Author claims, that revealed differences provide theoretically grounded foundations for further benchmarking of energy intensities.
APA, Harvard, Vancouver, ISO, and other styles
2

Helland, Knut S., Johan Tavast, and Tyler Scott. "Energy Management." In SPE International Conference and Exhibition on Health, Safety, Security, Environment, and Social Responsibility. Society of Petroleum Engineers, 2016. http://dx.doi.org/10.2118/179315-ms.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mao, Jianzhou, Ting Cao, Xiaopu Peng, Tathagata Bhattacharya, Wei-Shinn Ku, and Xiao Qin. "Security-Aware Energy Management in Clouds." In 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, 2020. http://dx.doi.org/10.1109/tps-isa50397.2020.00044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Styczynski, Zbigniew A., Chris O. Heyde, Bernd M. Buchholz, and Olaf Ruhle. "Network security management tool for distribution systems." In Energy Society General Meeting. IEEE, 2008. http://dx.doi.org/10.1109/pes.2008.4595971.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dehghanian, Payman, Mladen Kezunovic, Gurunath Gurrala, and Yufan Guan. "Security-based circuit breaker maintenance management." In 2013 IEEE Power & Energy Society General Meeting. IEEE, 2013. http://dx.doi.org/10.1109/pesmg.2013.6672293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hammons, Tom, and Zbigniew Styczynski. "Network Security Management (NSM) focused on Dispersed Generation." In Energy Society General Meeting. IEEE, 2008. http://dx.doi.org/10.1109/pes.2008.4596030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Fang, Jian Yang, Zhimin Wu, Xi Chen, and Jianzhong Yu. "Distributed Energy System Improving Security for City Energy Supply." In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5304094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tang, C. K. "Voltage security management and reactive power procurement in Ontario." In Energy Society General Meeting. IEEE, 2008. http://dx.doi.org/10.1109/pes.2008.4596414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jannson, Tomasz, Thomas Forrester, Pedram Boghrat, Ranjit Pradhan, and Andrew Kostrzewski. "Resource management tools based on renewable energy sources." In SPIE Defense, Security, and Sensing, edited by Edward M. Carapezza. SPIE, 2012. http://dx.doi.org/10.1117/12.920333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Saha, A., S. Rahman, M. Pipattanasomporn, and M. Kuzlu. "On security of a home energy management system." In 2014 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 2014. http://dx.doi.org/10.1109/isgteurope.2014.7028872.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Management of energy security"

1

Miller, Craig, and Robert Larmouth. Energy Sector Security through a System for Intelligent, Learning Network Configuration Monitoring and Management (“Essence”). Office of Scientific and Technical Information (OSTI), May 2017. http://dx.doi.org/10.2172/1360111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Elvado Environmental LLC. Groundwater Protection Program Management Plan for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee. Office of Scientific and Technical Information (OSTI), March 2004. http://dx.doi.org/10.2172/823102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Author, Not Given. Groundwater Protection Program Management Plan for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee. Revision 4. Office of Scientific and Technical Information (OSTI), August 2018. http://dx.doi.org/10.2172/1476766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Erkamo, Sanna, Karoliina Pilli-Sihvola, Atte Harjanne, and Heikki Tuomenvirta. Climate Security and Finland – A Review on Security Implications of Climate Change from the Finnish Perspective. Finnish Meteorological Institute, 2021. http://dx.doi.org/10.35614/isbn.9789523361362.

Full text
Abstract:
This report describes the effects of climate change for Finland from the view of comprehensive security. The report examines both direct and indirect climate security risks as well as transition risks related to climate change mitigation. The report is based on previous research and expert interviews. Direct security risks refer to the immediate risks caused by the changing nature of natural hazards. These include the risks to critical infrastructure and energy systems, the logistics system, health and food security. Indirect security risks relate to the potential economic, political and geopolitical impacts of climate change. Climate change can affect global migration, increase conflict risk, and cause social tensions and inequality. Transition risks are related to economic and technological changes in energy transition, as well as political and geopolitical tensions and social problems caused by climate change mitigation policies. Reducing the use of fossil fuels can result in domestic and foreign policy tensions and economic pressure especially in locations dependent on fossil fuels. Political tension can also increase the risks associated with hybrid and information warfare. The security effects of climate change affect all sectors of society and the Finnish comprehensive security model should be utilized in preparing for them. In the short run, the most substantial arising climate change related security risks in Finland are likely to occur through indirect or transition risks. Finland, similar to other wealthy countries, has better technological, economic and institutional conditions to deal with the problems and risks posed by climate change than many other countries. However, this requires political will and focus on risk reduction and management.
APA, Harvard, Vancouver, ISO, and other styles
5

Howard, Heidi, Chad Helmle, Raina Dwivedi, and Daniel Gambill. Stormwater Management and Optimization Toolbox. Engineer Research and Development Center (U.S.), January 2021. http://dx.doi.org/10.21079/11681/39480.

Full text
Abstract:
As stormwater regulations for hydrologic and water quality control become increasingly stringent, Department of Defense (DoD) facilities are faced with the daunting task of complying with multiple laws and regulations. This often requires facilities to plan, design, and implement structural best management practices (BMPs) to capture, filter, and/or infiltrate runoff—requirements that can be complicated, contradictory, and difficult to plan. This project demonstrated the Stormwater Management Optimization Toolbox (SMOT), a spreadsheet-based tool that effectively analyzes and plans for compliance to the Energy Independence and Security Act (EISA) of 2007 pre-hydrologic conditions through BMP implementation, resulting in potential cost savings by reducing BMP sizes while simultaneously achieving compliance with multiple objectives. SMOT identifies the most cost-effective modeling method based on an installation’s local conditions (soils, rainfall patterns, drainage network, and regulatory requirements). The work first demonstrated that the Model Selection Tool (MST) recommendation accurately results in the minimum BMP cost for 45 facilities of widely varying climatic and regional conditions, and then demonstrated SMOT at two facilities.
APA, Harvard, Vancouver, ISO, and other styles
6

Avis, William. Drivers, Barriers and Opportunities of E-waste Management in Africa. Institute of Development Studies (IDS), December 2021. http://dx.doi.org/10.19088/k4d.2022.016.

Full text
Abstract:
Population growth, increasing prosperity and changing consumer habits globally are increasing demand for consumer electronics. Further to this, rapid changes in technology, falling prices and consumer appetite for better products have exacerbated e-waste management challenges and seen millions of tons of electronic devices become obsolete. This rapid literature review collates evidence from academic, policy focussed and grey literature on e-waste management in Africa. This report provides an overview of constitutes e-waste, the environmental and health impacts of e-waste, of the barriers to effective e-waste management, the opportunities associated with effective e-waste management and of the limited literature available that estimate future volumes of e-waste. Africa generated a total of 2.9 million Mt of e-waste, or 2.5 kg per capita, the lowest regional rate in the world. Africa’s e-waste is the product of Local and imported Sources of Used Electronic and Electrical Equipment (UEEE). Challenges in e-waste management in Africa are exacerbated by a lack of awareness, environmental legislation and limited financial resources. Proper disposal of e-waste requires training and investment in recycling and management technology as improper processing can have severe environmental and health effects. In Africa, thirteen countries have been identified as having a national e-waste legislation/policy.. The main barriers to effective e-waste management include: Insufficient legislative frameworks and government agencies’ lack of capacity to enforce regulations, Infrastructure, Operating standards and transparency, illegal imports, Security, Data gaps, Trust, Informality and Costs. Aspirations associated with energy transition and net zero are laudable, products associated with these goals can become major contributors to the e-waste challenge. The necessary wind turbines, solar panels, electric car batteries, and other "green" technologies require vast amounts of resources. Further to this, at the end of their lifetime, they can pose environmental hazards. An example of e-waste associated with energy transitions can be gleaned from the solar power sector. Different types of solar power cells need to undergo different treatments (mechanical, thermal, chemical) depending on type to recover the valuable metals contained. Similar issues apply to waste associated with other energy transition technologies. Although e-waste contains toxic and hazardous metals such as barium and mercury among others, it also contains non-ferrous metals such as copper, aluminium and precious metals such as gold and copper, which if recycled could have a value exceeding 55 billion euros. There thus exists an opportunity to convert existing e-waste challenges into an economic opportunity.
APA, Harvard, Vancouver, ISO, and other styles
7

Shott, Gregory. Special Analysis for the Disposal of U.S. Department of Energy High Activity Cesium Sources Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada. Office of Scientific and Technical Information (OSTI), May 2017. http://dx.doi.org/10.2172/1507438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shott, Gregory, and Dawn Reed. Unreviewed Disposal Question Evaluation: Disposal of the Materials & Energy Corporation Thermal Desorption Low-Level Waste at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada. Office of Scientific and Technical Information (OSTI), September 2017. http://dx.doi.org/10.2172/1507592.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shott, Gregory. Special Analysis for the Disposal of U.S. Department of Energy High Activity Cesium Sources Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada. Office of Scientific and Technical Information (OSTI), July 2017. http://dx.doi.org/10.2172/1510516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shott, Gregory, and Dawn Reed. Unreviewed Disposal Question Evaluation: Disposal of the Materials & Energy Corporation Regulated Asbestos Mixed Low-Level Waste Macroencapsulated Debris at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada. Office of Scientific and Technical Information (OSTI), September 2017. http://dx.doi.org/10.2172/1507591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography