Journal articles on the topic 'Management of energy security'

To see the other types of publications on this topic, follow the link: Management of energy security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Management of energy security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Tang, Adrian, Simha Sethumadhavan, and Salvatore Stolfo. "Motivating Security-Aware Energy Management." IEEE Micro 38, no. 3 (May 2018): 98–106. http://dx.doi.org/10.1109/mm.2018.032271066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Proskuryakova, L. "Updating energy security and environmental policy: Energy security theories revisited." Journal of Environmental Management 223 (October 2018): 203–14. http://dx.doi.org/10.1016/j.jenvman.2018.06.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sohn, Ira. "US energy security." Energy Policy 18, no. 2 (March 1990): 149–61. http://dx.doi.org/10.1016/0301-4215(90)90140-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mouftah, H. T., R. Kun, and D. Hoffer. "A distributed energy management and security system." Journal of Microcomputer Applications 10, no. 1 (January 1987): 29–39. http://dx.doi.org/10.1016/0745-7138(87)90034-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sulimin, Vladimir, Vladislav Shvedov, and Maiia Lvova. "Energy security management of a business entity." E3S Web of Conferences 270 (2021): 01010. http://dx.doi.org/10.1051/e3sconf/202127001010.

Full text
Abstract:
Nowadays, the basic indicator of the stability of an economic entity established to sell its products and obtain profits is its economic security, i.e. the protection of its interests regardless specific impact of different external and internal factors. The paper deals with the ways to ensure the entity energy system security, and measures to improve the efficiency of this system management. The paper also identifies the most typical threats to uninterruptible energy supply of enterprises and organizations, as well as means of preventing and overcoming problems caused by these problems.
APA, Harvard, Vancouver, ISO, and other styles
6

Mityakov, E. S., and A. I. Ladynin. "HIGH-TECH ENTERPRISES ENERGY SECURITY MANAGEMENT MODEL." Развитие и безопасность, no. 4 (2021): 62–72. http://dx.doi.org/10.46960/2713-2633_2021_4_62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Markandya, Anil, and Malcolm Pemberton. "Energy security, energy modelling and uncertainty." Energy Policy 38, no. 4 (April 2010): 1609–13. http://dx.doi.org/10.1016/j.enpol.2009.01.046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

MacKerron, Gordon. "Energy security to 2000." Energy Policy 16, no. 3 (June 1988): 326–27. http://dx.doi.org/10.1016/0301-4215(88)90168-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vasilescu, Gabriel, Passca Mihaela, Mihail Vătăsescu, and Ciprian Jitea. "Management of Security Risk in the Energy Field." Global Environmental Engineers 1, no. 1 (November 27, 2014): 24–28. http://dx.doi.org/10.15377/2410-3624.2014.01.01.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Voynarenko, Mykhaylo, Mariia V. Dykha, Oksana Mykoliuk, Ludmyla Yemchuk, and Anastasiia Danilkova. "Assessment of an enterprise’s energy security based on multi-criteria tasks modeling." Problems and Perspectives in Management 16, no. 4 (October 26, 2018): 102–16. http://dx.doi.org/10.21511/ppm.16(4).2018.10.

Full text
Abstract:
Today Ukrainian business entities operate in conditions of macroeconomic instability, environmental disturbance, energy dependence on risk of instable and interrupted supply and high cost of energy resources, excessive energy consumption and inefficient use of fuel and energy resources, which requires immediate actions as for finding solutions to ensure energy security. The goal of the article is to solve multi-criteria tasks focused on making managerial decisions regarding the development of enterprise energy security system based on evaluation of influence of numerous factors. As a result of this study, main components of energy security of the enterprise and most important influence factors are determined. The mathematical model of the hierarchy of factors in terms of their influence on the energy security of the enterprise with the use of graph theory is developed. Use of iterative procedure to determine the levels of hierarchy of factors allowed to assess the importance/priority of their influence on energy security of the enterprise. Thus, the developed model of hierarchy of factors based on the applied scientific and methodical approach to determine their influence on energy security of the enterprise provides the opportunity to get a detailed idea of factors interaction, interconnections and influence on energy security of the enterprise, which ultimately leads to elaboration of complex optimal/agreed managerial decisions in context of development and implementation of energy security system of the enterprise.
APA, Harvard, Vancouver, ISO, and other styles
11

Dobransky, Steve. "Review Article: Politics, energy and security." Cooperation and Conflict 45, no. 3 (September 2010): 353–59. http://dx.doi.org/10.1177/0010836710378457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Linan-Reyes, Matias, Joaquin Garrido-Zafra, Aurora Gil-de-Castro, and Antonio Moreno-Munoz. "Energy Management Expert Assistant, a New Concept." Sensors 21, no. 17 (September 2, 2021): 5915. http://dx.doi.org/10.3390/s21175915.

Full text
Abstract:
In recent years, interest in home energy management systems (HEMS) has grown significantly, as well as the development of Voice Assistants that substantially increase home comfort. This paper presents a novel merging of HEMS with the Assistant paradigm. The combination of both concepts has allowed the creation of a high-performance and easy-to-manage expert system (ES). It has been developed in a framework that includes, on the one hand, the efficient energy management functionality boosted with an Internet of Things (IoT) platform, where artificial intelligence (AI) and big data treatment are blended, and on the other hand, an assistant that interacts both with the user and with the HEMS itself. The creation of this ES has made it possible to optimize consumption levels, improve security, efficiency, comfort, and user experience, as well as home security (presence simulation or security against intruders), automate processes, optimize resources, and provide relevant information to the user facilitating decision making, all based on a multi-objective optimization (MOP) problem model. This paper presents both the scheme and the results obtained, the synergies generated, and the conclusions that can be drawn after 24 months of operation.
APA, Harvard, Vancouver, ISO, and other styles
13

Löschel, Andreas, Ulf Moslener, and Dirk T. G. Rübbelke. "Energy security—concepts and indicators." Energy Policy 38, no. 4 (April 2010): 1607–8. http://dx.doi.org/10.1016/j.enpol.2009.03.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Toft, Peter, Arash Duero, and Arunas Bieliauskas. "Terrorist targeting and energy security." Energy Policy 38, no. 8 (August 2010): 4411–21. http://dx.doi.org/10.1016/j.enpol.2010.03.070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Bohi, Douglas R., and Michael A. Toman. "Energy security: externalities and policies." Energy Policy 21, no. 11 (November 1993): 1093–109. http://dx.doi.org/10.1016/0301-4215(93)90260-m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Bi, Jia Na, and E. Xu. "An Energy-Efficient Security Node-Based Key Management Protocol for WSN." Applied Mechanics and Materials 347-350 (August 2013): 2117–21. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2117.

Full text
Abstract:
A security node-based key management protocol is proposed for cluster-based sensor networks. Member nodes and cluster heads are responsible for data collection and transmission. Security nodes are responsible for key management. Security nodes restrain key management function of cluster heads, and reduce damage of captured cluster heads. Generation of security nodes and different kinds of keys is described. Performance analysis and simulation show that the proposed key management protocol consumes less energy, and its delay time of key generation is short. At the same time, the protocol can provide more collaborative authentication security for keys. It has strong resilience against node capture, and can support large scale network.
APA, Harvard, Vancouver, ISO, and other styles
17

Alkatheiri, Mohammed Saeed, Mohammed A. Alqarni, and Sajjad Hussain Chauhdary. "Cyber security framework for smart home energy management systems." Sustainable Energy Technologies and Assessments 46 (August 2021): 101232. http://dx.doi.org/10.1016/j.seta.2021.101232.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Dimitrov, Miroslav Vergilov, and Nataliya Venelinova. "Smart, Secure and Safe Energy Management Approach – An Education Framework Improving the Competence Grid of the Professionals in the Energy Sector." International conference KNOWLEDGE-BASED ORGANIZATION 25, no. 1 (June 1, 2019): 213–18. http://dx.doi.org/10.2478/kbo-2019-0034.

Full text
Abstract:
Abstract The paper presents evidence based brand new approach of the permanent rise of the competences and know-how transfer between researchers, teachers and professionals aiming to ensure the specific expertise of the human resources engaged in energy security management. The approach has a collaborative and integrative nature and relies on the hybridization between energy management, urban development planning, environmental management, civil protection, protection of critical infrastructure and the national security applied fields. The authors redefine the conventional understanding of the energy security by describing a practically oriented integrated approach of teaching energy security, based on 3 separately existing concepts: the concept for smart energy security grid, those for the smart cities and the standard operative procedures applied to energy security management. Smart, Secure and Safe Energy Management (3SEMA) is both behaviorally and technically oriented and presented in a circular chart, involving all actors on certain territory with the purpose to apply smart, secure and safe approach in governing the energy sector, taking into consideration the dynamic technological changes and the concept of intelligent urban use.
APA, Harvard, Vancouver, ISO, and other styles
19

Setyantoro, Dwipo, Vivi Afifah, Rika Astuti Hasibuan, Novi Aprilia, and Novi Permata Sari. "The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 7, no. 2 (February 18, 2022): 105–10. http://dx.doi.org/10.33480/jitk.v7i2.2786.

Full text
Abstract:
The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can take advantage of the wireless network. The possibility of threats to information security is very large, such as the presence of intruders on the network. Therefore, it is necessary to manage wireless networks that pay attention to information security issues on the network. The Directorate General of New, Renewable Energy and Energy Conservation at the Ministry of Energy and the Human Resources Republic of Indonesia was chosen as the research location given that computer network users in this institution are diverse and have also used The Dude MikroTik application to manage wireless computer networks, which are instruments to analyze information security. in this institution. The analysis was conducted to identify the activities and effectiveness of information security management in this institution. This study concludes that the use of The Dude MikroTik application is quite helpful in analyzing information security on wireless computer networks in this institution.
APA, Harvard, Vancouver, ISO, and other styles
20

Liu, Xiaoli, and Xinmin Jiang. "China's energy security situation and countermeasures." International Journal of Energy Sector Management 3, no. 1 (April 10, 2009): 83–92. http://dx.doi.org/10.1108/17506220910947863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Onyeji, Ijeoma, Morgan Bazilian, and Chris Bronk. "Cyber Security and Critical Energy Infrastructure." Electricity Journal 27, no. 2 (March 2014): 52–60. http://dx.doi.org/10.1016/j.tej.2014.01.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ali, Saqib, and Tahir Nadeem Malik. "Two-Cored Energy Management System for Industrial Microgrid." Mehran University Research Journal of Engineering and Technology 40, no. 4 (October 1, 2021): 793–808. http://dx.doi.org/10.22581/muet1982.2104.09.

Full text
Abstract:
Energy systems have to deal with energy cost and environmental concerns such as greenhouse gas emission. Industrial buildings considered as Microgrid (μG) with heavy load worsen these issues even more. Further, cyber-attacks on the data communication channel between utility and customer is also a potential threat and may alter the data as well as the confidentiality of it, resulting in an inaccurate result. To address these problems, this paper proposes two-cored Building Energy Management System (BEMS) for Industrial Microgrid (IμG) with first cored termed as the energy layer concentrating on energy cost and emission reduction, while second cored termed as security layer provides the un-authorized intrusion detection and prevention system (IDS/IPS) for cyber secure communication of data. The μG under consideration contains national grid, Natural Gas (NG), solar Photovoltaic (PV) as input carriers; electrical energy at output ports; electric vehicle (EV) fleet; battery bank; solar PV panel as non-dispatchable Distributed Energy Resources (DERs) and Internal Combustion Engine (ICE), Fuel Cell (FC) and Micro Turbine (MT) as dispatchable DERs. Energy layer optimization problem has been solved in MATLAB using flower pollination algorithm for µG energy consumption cost and emission reduction. To develop and analyze the security layer, Linux operating system based Smooth-sec software has been used. Devised security layer continuously monitors the network traffic between customers and BEMS as well as BEMS and utility server. During monitoring it distinguish the licensed user or malicious attacker to detect and prevent possible internal and/or external intrusions in the communication channel. Results show that EMS reduces energy cost and emission in addition to cyber security from internal threats. Proposed two-cored control may be manufactured for utilities to realize its benefits for industrial customers in a smart energy distribution system. Keywords: Demand Response, Energy Management System, Flower
APA, Harvard, Vancouver, ISO, and other styles
23

Krupa, Joel. "Energy security in China: Emerging perspectives." Utilities Policy 25 (June 2013): 10–11. http://dx.doi.org/10.1016/j.jup.2013.01.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Thamrin, Suyono, Rita Ambarwati, and Syaiful Hidayat. "THE STRATEGIES OF WEST JAVA’S REGIONAL ENERGY MANAGEMENT TO SUPPORT NATIONAL ENERGY SECURITY." International Journal of Energy Economics and Policy 10, no. 6 (October 10, 2020): 376–82. http://dx.doi.org/10.32479/ijeep.10259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Guta, Dawit, and Jan Börner. "Energy security, uncertainty and energy resource use options in Ethiopia." International Journal of Energy Sector Management 11, no. 1 (April 3, 2017): 91–117. http://dx.doi.org/10.1108/ijesm-04-2015-0005.

Full text
Abstract:
Purpose Ethiopia’s energy sector faces critical challenges to meeting steadily increasing energy demand given limited infrastructure, heavy reliance on hydroelectric power and underdevelopment of alternative energy resources. The purpose of this paper was to identify optimal least cost investment decisions for integrated energy source diversification. The authors seek to contribute to the relevant literature by paying particular attention to the role of public policy for promoting renewable energy investment and to better understand future energy security implications of various sources of uncertainty. Design/methodology/approach The authors created a dynamic linear programming model using General Algebraic Modelling System software to explore the national energy security implications of uncertainties associated with increasing technological advances and efficiency, and climate change scenarios. Findings To cope with the impacts of drought expected from future climate change on hydroelectric power production, Ethiopia would need to invest in the development of alternative energy resources. Such investment would not only enhance the sustainability and reliability of energy production but also increase costs. Greater rates of technological and efficiency innovations, however, were found to improve electricity diversification and reduce production costs and shadow prices or resource scarcity, and are thus key for enhancing energy security and reducing the risks posed by drought. Originality/value The dynamic linear programming model by the authors represents a flexible sector modelling tool for exploring the sustainability and efficiency of energy resource development pathways and evaluating the effects of different sources of uncertainty on the energy sector.
APA, Harvard, Vancouver, ISO, and other styles
26

Atkinson, Christopher L. "The Governance of Energy Megaprojects: Politics, Hubris and Energy Security." Journal of Environmental Policy & Planning 17, no. 2 (June 18, 2014): 296–99. http://dx.doi.org/10.1080/1523908x.2014.919219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Eaves, James, and Stephen Eaves. "Renewable corn-ethanol and energy security." Energy Policy 35, no. 11 (November 2007): 5958–63. http://dx.doi.org/10.1016/j.enpol.2007.06.026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

de Carmoy, Guy. "Energy security in the industrialized world." Energy Policy 14, no. 4 (August 1986): 292–96. http://dx.doi.org/10.1016/0301-4215(86)90103-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Wu, Kang. "China׳s energy security: Oil and gas." Energy Policy 73 (October 2014): 4–11. http://dx.doi.org/10.1016/j.enpol.2014.05.040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lyaskovskaya, E. A., G. A. Vlasova, and M. R. Kurbangaliev. "STRATEGIC ENERGY MANAGEMENT AND SOCIAL SECURITY PROBLEMS OF ENTERPRISE SYSTEMS." VESTNIK OF THE BASHKIR STATE AGRARIAN UNIVERSITY 43, no. 3 (September 18, 2017): 124–31. http://dx.doi.org/10.31563/1684-7628-2017-43-3-124-131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Plėta, Tomas, Manuela Tvaronavičienė, and Silvia Della Casa. "Cyber effect and security management aspects in critical energy infrastructures." Insights into Regional Development 2, no. 2 (June 30, 2020): 538–48. http://dx.doi.org/10.9770/ird.2020.2.2(3).

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Tung, Yi-Ti, and Tzu-Yi Pai. "Water Management for Agriculture, Energy, and Social Security in Taiwan." CLEAN - Soil, Air, Water 43, no. 5 (April 23, 2014): 627–32. http://dx.doi.org/10.1002/clen.201300275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Pelletier, N., J. André, A. Charef, D. Damalas, B. Green, R. Parker, R. Sumaila, G. Thomas, R. Tobin, and R. Watson. "Energy prices and seafood security." Global Environmental Change 24 (January 2014): 30–41. http://dx.doi.org/10.1016/j.gloenvcha.2013.11.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Belokurov, Sergey, Alexei Skrypnikov, Oleg Kondratov, Dmitry Levushkin, and Oleg Tveritnev. "Increasing the energy efficiency of electronic document management systems." E3S Web of Conferences 279 (2021): 03029. http://dx.doi.org/10.1051/e3sconf/202127903029.

Full text
Abstract:
This paper proposes a comprehensive set of characteristics of integrated security systems of electronic document management. We give a classification description and data analysis for modeling decision-making processes in integrated security systems by the example of responding to the threats of information leakage through parametric channels. The optimal set of measures to respond to an attacker’s operations of illegal interception of information via parametric channels by using the appropriate modes of operation of the TCP protocol, which reduces the decision-making time, optimizes the performance of the system as a whole and significantly contributes to the optimization of its energy efficiency is given.
APA, Harvard, Vancouver, ISO, and other styles
35

Bui, Tat Dat, and Ming-Lang Tseng. "A Data-Driven Analysis on Sustainable Energy Security." Journal of Global Information Management 30, no. 6 (September 2022): 1–38. http://dx.doi.org/10.4018/jgim.287608.

Full text
Abstract:
This study provides a data-driven analysis that illustrates a clear renewable energy depiction in sustainable energy security and unveils the regional issues due to the literature solely occupies energy security concept in the descriptions view, and renewable energy differences related to regions are rarely discussed. A hybrid method is proposed to valid those indicators and shows the trend of future studies. This study enriches the challenges and opportunities by contributing to understand the fundamental knowledge of renewable energy in sustainable energy security frontier, conveyance directions for future study and investigation, and assessment on global renewable energy position and regional disparities. There are valid 19 indicators, in which energy demand, energy policy, renewable resources, smart grid, and uncertainty representing the future trends. World regional comparison includes 115 countries/territories and categorized into five geographical regions. The result shows that those indicators have addressed different issues in the world regional comparison.
APA, Harvard, Vancouver, ISO, and other styles
36

Nolan, Peter, Alan Shipman, and Huaichuan Rui. "Coal Liquefaction, Shenhua Group, and China’s Energy Security." European Management Journal 22, no. 2 (April 2004): 150–64. http://dx.doi.org/10.1016/j.emj.2004.01.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Powroźnik, Piotr, Robert Szulim, Wiesław Miczulski, and Krzysztof Piotrowski. "Household Energy Management." Applied Sciences 11, no. 4 (February 11, 2021): 1626. http://dx.doi.org/10.3390/app11041626.

Full text
Abstract:
Ensuring flexibility and security in power systems requires the use of appropriate management measures on the demand side. The article presents the results of work related to energy management in households in which renewable energy sources (RES) can be installed. The main part of the article is about the developed elastic energy management algorithm (EEM), consisting of two algorithms, EEM1 and EEM2. The EEM1 algorithm is activated in time periods with a higher energy price. Its purpose is to reduce the power consumed by the appliances to the level defined by the consumer. In contrast, the EEM2 algorithm is run by the Distribution System Operator (DSO) when peak demand occurs. Its purpose is to reduce the power of appliances in a specified time period to the level defined by the DSO. The optimization tasks in both algorithms are based on the Greedy Randomized Adaptive Search Procedure (GRASP) metaheuristic algorithm. The EEM1 and EEM2 algorithms also provide energy consumer comfort. For this purpose, both algorithms take into account the smart appliance parameters proposed in the article: sections of the working devices, power reduction levels, priorities and enablingof time shifting devices. The EEM algorithm in its operation also takes into account the information about the production of power, e.g., generated by the photovoltaic systems. On this basis, it makes decisions on the control of smart appliances. The EEM algorithm also enables inverter control to limit the power transferred from the photovoltaic system to the energy system. Such action is taken on the basis of the DSO request containing the information on the power limits. Such a structure of EEM enables the balancing of energy demand and supply. The possibility of peak demand phenomenon will be reduced. The simulation and experiment results presented in the paper confirmed the rationality and effectiveness of the EEM algorithm.
APA, Harvard, Vancouver, ISO, and other styles
38

Cai, Tianxing. "Energy Infrastructure Security in the Digital Age." International Journal of Public Administration in the Digital Age 5, no. 2 (April 2018): 12–22. http://dx.doi.org/10.4018/ijpada.2018040102.

Full text
Abstract:
In this article, the current application of information technology in the energy infrastructure security will be introduced. The digital system can help us to identify the framework of energy infrastructure security, characterize the energy network, generate the strategy of self-recovery and handle the uncertainty of identified damage. It will also integrate the comprehensive evaluation of population distribution, roadway safety, the constraint of transportation routes, transportation capacity and capability for the optimal emergency response planning with the minimal potential impact to the community for the management of intelligent and secure energy infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
39

Deng, Haifeng, and Paolo Davide Farah. "China’s energy policies and strategies for climate change and energy security." Journal of World Energy Law & Business 13, no. 2 (April 1, 2020): 141–56. http://dx.doi.org/10.1093/jwelb/jwaa018.

Full text
Abstract:
Abstract National energy security, parallel with the ultimate goal of emissions reductions, is of utmost priority for the Chinese government. In order to comply with the requirements set by the Kyoto Protocol, the Chinese government announced, on 25 November 2009, that 2020’s CO2 emissions would be reduced by 40–45 per cent in accordance with the data collected from 2005. Said goal was met three years ahead of schedule. Even in light of such an accomplishment, however, commentators suggest that the overall nationally determined contributions (NDCs) made by the Parties belonging to the Paris agreement are not enough to reduce global warming by even 2°C. This article focuses on the concept of energy security in assessing whether, and how, the priorities related to climate change are gradually changing. After analysing climate change’s impact on China, conducted via an analysis of the study’s available literature and through the support of international data, this article mainly focuses on the concept of energy security, itself. Under the second section, based on the examination of China’s efforts to transition towards a low-carbon economy, the authors provide a holistic definition of energy security through the lens of three dimensions: energy supply security, energy economy and energy ecological security. The third section, in turn, addresses the relationship between energy security and climate change. The results presented in the conclusion insist that, in order to strengthen environmental protection in China, it is crucial to reform the highly inefficient and strictly regulated national energy market. In doing so, China’s transition to a low-carbon society and economy could prove less painful, as China’s available resources offer the potential for a strengthened ecological dimension and sustained socio-economic development.
APA, Harvard, Vancouver, ISO, and other styles
40

Hamadaqa, Emad, Ayoub Mars, and Wael Adi. "Physical Security for Fleet Management Systems." Cryptography 4, no. 1 (December 31, 2019): 1. http://dx.doi.org/10.3390/cryptography4010001.

Full text
Abstract:
Fleet Management (FM) deals with the management of transport, distribution, and logistics of national and international goods exchange, in which many operators worldwide are involved. Fleet management involves many security-relevant participating entities, such as vehicles, FM mobile clients, smart trackers with goods, drivers, etc. Existing automated fleet management systems are basically vulnerable to physical replacement attacks when managed by mass-produced electronic identities. Analog Physical Unclonable Functions (PUFs) failed to serve as unclonable electronic identities due to being costly, unstable and inefficient for such mass-usage. We propose in this paper to deploy the Secret Unknown Ciphers (SUCs) techniques introduced a decade ago as digital low-cost clone-resistant identities to be embedded in selected participating electronic Fleet Management System (FMS) units. SUCs, as stable self-created digital modules to be embedded in future smart non-volatile (NV)-FPGA devices, are expected to cover all emerging FMS physical security requirements. Such information-retaining units (when switched-off) are emerging to become widely used as ultra-low-power mass-products in automotive environment. We propose a new FMS security architecture based on embedding SUC modules in each security-relevant entity in the FMS such as vehicles, mobile clients, smart trackers and goods. This paper investigates the expected technical impacts when using SUCs technology as physical security anchors in a standard FMS configuration. Several SUC-related generic security protocols adapted to the FM environment show how to securely-link tracing of goods, tracks routing, and personnel in such FM system. It is also shown how to combine other biometric fingerprints to simplify personal liability and enhance the security management in such globally-operating automated procedures. The presented security analysis of the resulting FMS shows that the major security concerns in existing FMSs can be resolved. One major advantage of SUC technique, is that device-manufacturers can be largely-excluded as security players. The FPGA technology required for the SUC solution is currently not available and is thought for future use. The concept is ultimately applicable if the future electronic mass products would deploy self-reconfiguring non-volatile (flash-based) System on Chip smart units. Such units are expected to dominate future Internet of Things (IoT) ultra-low-energy applications, as power-off does not lose any information. The proposed SUC strategy is highly flexible, scalable, and applicable to cover a large class of globally operating protection mechanisms similar to those of the addressed FMS scenarios.
APA, Harvard, Vancouver, ISO, and other styles
41

Rajavuori, Mikko, and Kaisa Huhta. "Investment screening: Implications for the energy sector and energy security." Energy Policy 144 (September 2020): 111646. http://dx.doi.org/10.1016/j.enpol.2020.111646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Gunatilake, Herath, David Roland-Holst, and Guntur Sugiyarto. "Energy security for India: Biofuels, energy efficiency and food productivity." Energy Policy 65 (February 2014): 761–67. http://dx.doi.org/10.1016/j.enpol.2013.10.050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Diop, Abdoulaye, Yue Qi, and Qin Wang. "A Novel Key Management Scheme for Cluster Based Wireless Sensors Networks." Advanced Materials Research 846-847 (November 2013): 864–68. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.864.

Full text
Abstract:
WSN comprise of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints, complex security algorithms cannot be used in sensor networks. Therefore, it is necessary to well balance between the security level and the associated energy consumption overhead to mitigate the security risks. In this paper, we present A Novel Key Management Scheme for Cluster Based Wireless Sensors Networks (NKMS). The security analysis demonstrates that NKMS is an effective solution to the key management of cluster based wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
44

Bambawale, Malavika Jain, and Benjamin K. Sovacool. "China’s energy security: The perspective of energy users." Applied Energy 88, no. 5 (May 2011): 1949–56. http://dx.doi.org/10.1016/j.apenergy.2010.12.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Labandeira, Xavier, and Baltazar Manzano. "Some Economic Aspects of Energy Security." EUROPEAN RESEARCH STUDIES JOURNAL XV, Issue 4 (November 1, 2012): 47–64. http://dx.doi.org/10.35808/ersj/371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Kuzemko, Caroline. "Politicising UK energy: what 'speaking energy security' can do." Policy & Politics 42, no. 2 (April 1, 2014): 259–74. http://dx.doi.org/10.1332/030557312x655990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Muzzammel, Raheel, Rabia Arshad, Saba Mehmood, and Danista Khan. "Advanced energy management system with the incorporation of novel security features." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (August 1, 2020): 3978. http://dx.doi.org/10.11591/ijece.v10i4.pp3978-3987.

Full text
Abstract:
Nowadays, energy management is a subject of great importance and complexity. Pakistan, being in a state of developing country, generates electrical power mainly by using non-renewable sources of energy. Non-renewable entities are fossil fuels such as furnace oil, natural gas, coal, and nuclear power. Pakistan has been facing a severe shortage of production in energy sector for last two decades. This shortfall is affecting the industrial development as well as economic growth. With the growing population, the load demand is rapidly increasing and there must be a need to expand the existing ones or to build new power systems. In this paper, an autonomous management system has been proposed to enhance quality, reliability and confidence of utilization of energy between end consumers and suppliers. Such objectives can only be fulfilled by making the power supply secure for end consumers. Distributed and centralized control systems are involved for maintaining a balance between renewable energy resources and base power, so that end consumers demand can be fulfilled when required. A reliable Two-way communication system between suppliers and end consumers has been proposed by using Message Digest algorithm which ensures that there would be no energy theft. Simulations have been done in MATLAB/ Simulink environment and results have been presented to show the effectiveness of the proposed model.
APA, Harvard, Vancouver, ISO, and other styles
48

Azhar, Muhamad, and Dendy Adam Satriawan. "Implementasi Kebijakan Energi Baru dan Energi Terbarukan Dalam Rangka Ketahanan Energi Nasional." Administrative Law and Governance Journal 1, no. 4 (November 30, 2018): 398–412. http://dx.doi.org/10.14710/alj.v1i4.398-412.

Full text
Abstract:
AbstractThis study aims to determine the implementation of new energy and renewable energy policies in the context of national energy security. The research method used is legal research that uses a regulatory approach. The results of the study show that the implementation of new energy and renewable energy policies in the context of national energy security has proceeded as it should. This can be seen from the role of the government in making policies (beleid) and management actions (bestuursdaad), arrangements (regelendaad), management (beheersdaad) and supervision (toezichthoudensdaad) for the purpose of maximizing the people's prosperity. Keywords: Energy Policy, Renewable Energy, National Energy SecurityAbstrakPenelitian ini bertujuan untuk mengetahui Implementasi kebijakan energi baru dan energi terbarukan dalam rangka ketahanan energy nasional. Metode penelitian yang diguankan adalah penelitian hukum yang menggunakan pendekatan peraturan perundang-undangan. Hasil penelitian menunjukan bahwa Implementasi kebijakan energi baru dan energi terbarukan dalam rangka ketahanan energy nasional telah berjalan sebagaimana mestinya. Hal tersebut dapat dilihat dari dari peran pemerintah untuk mengadakan kebijakan (beleid) dan tindakan pengurusan (bestuursdaad), pengaturan (regelendaad), pengelolaan (beheersdaad) dan pengawasan (toezichthoudensdaad) untuk tujuan sebesar-besarnya kemakmuran rakyat.Kata kunci: Kebijakan Energi, Energy Terbarukan, Ketahanan Energi Nasional
APA, Harvard, Vancouver, ISO, and other styles
49

Pysar, Nadiia, Viktoriia Chornii, Andriy Bandura, and Yevgen Khlobystov. "Methods for estimating “Fuel poverty” in public administration and management systems." Problems and Perspectives in Management 16, no. 2 (June 13, 2018): 341–52. http://dx.doi.org/10.21511/ppm.16(2).2018.31.

Full text
Abstract:
The Ukrainian energy market has been analyzed region-wise in terms of consumption of fuel and energy resources by household sector. Critical aspects of improving energy security have been reflected in the context of the use of energy resources. The principal directions of the socially responsible market economy system have been offered in the light of the country’s economic security in terms of overcoming “fuel poverty”. Cognitive features of the “fuel poverty” phenomenon have been defined. Mathematical modeling of the “fuel poverty” index has been carried out using the following approaches: “after fuel cost poverty”; energy expenditure above 10% of disposable income; the Low Income – High Costs, where households with relatively high energy costs and low income are emphasized. A model of the final calculation of household energy costs has been developed for the purpose of optimal management. The graphical abstract of the obtained “fuel poverty” index solutions has been presented, with the upper left corner – low income – high costs – serving as a critical zone. The block diagram of improving the socially responsible market economy system in the light of overcoming “fuel poverty” has been offered.
APA, Harvard, Vancouver, ISO, and other styles
50

Huntington, Hillard G., and Stephen P. A. Brown. "Energy security and global climate change mitigation." Energy Policy 32, no. 6 (April 2004): 715–18. http://dx.doi.org/10.1016/s0301-4215(03)00105-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography