Добірка наукової літератури з теми "Energy security system"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Energy security system".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Energy security system"

1

Morogov, Alexander. "DEVELOPMENT OF JAPAN'S ENERGY SECURITY SYSTEM." Security Index: A Russian Journal on International Security 16, no. 1 (February 2010): 95–100. http://dx.doi.org/10.1080/19934270903570778.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Niu, Dong Xiao, Xin Lu, Huan Huan Qiao, and Hui Juan Zhai. "Research on Evaluation System of China’s Energy Security Considering Energy Transportation." Advanced Materials Research 535-537 (June 2012): 2049–52. http://dx.doi.org/10.4028/www.scientific.net/amr.535-537.2049.

Повний текст джерела
Анотація:
Based on detailed analysis of the influencing factors on energy security, this paper build the China's energy security evaluation index system considering energy transport from the four aspects of energy supply, energy consumption, energy, transport, energy and social environment, then classified the level of energy security according to the evaluation system. At last, this paper made an empirical analysis on the 2001-2010 energy security through the Analytic Hierarchy Process.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Xiang, Bo, and Cai Liu. "Research on China’s Legal Protection System for Energy Security." Advanced Materials Research 805-806 (September 2013): 1466–71. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.1466.

Повний текст джерела
Анотація:
China's energy industry developed remarkably in recent years but in the meanwhile also caused some problems that are directly correlated with defects in system, content, supporting and coordination and other aspects of China’s energy laws. It is imperative at present to improve and perfect energy legal system in order to provide strong guarantee for China’s energy security. This paper will analyze existing legislation systems concerned with energy security started from its legal protection status in quo, and use foreign legal system of energy security for reference to put forward to suggestions for construction of China’s legal protection system for energy security that are beneficial to perfect China's energy legal system and to ensure energy security.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Mouftah, H. T., R. Kun, and D. Hoffer. "A distributed energy management and security system." Journal of Microcomputer Applications 10, no. 1 (January 1987): 29–39. http://dx.doi.org/10.1016/0745-7138(87)90034-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Li, Jing, Zhijie Shang, Ren Qiang, Jin Pang, Han Guo, Jingchu Wang, and Haihang Niu. "Energy Internet Security Risk Evaluation Index System." IOP Conference Series: Earth and Environmental Science 645 (January 26, 2021): 012045. http://dx.doi.org/10.1088/1755-1315/645/1/012045.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Shen, Pei, Sining Wang, and Nie Ling. "Research on Security Architecture of Global Energy Internet Standard Support System." E3S Web of Conferences 118 (2019): 01011. http://dx.doi.org/10.1051/e3sconf/201911801011.

Повний текст джерела
Анотація:
The global energy Internet standard support system plays a vital role in global energy interconnection. However, the system brings convenience to the global energy interconnection and introduces new security issues. Due to the diversity of users, the complexity of the environment and the internationalization, there will be more and more malicious network intrusions from outside and inside. The security system of the global energy Internet standard support system faces great challenges. To this end, this paper proposes a security architecture that combines active and passive, establishing a chain of trust between the active security architecture and the passive security architecture, ensuring a new security architecture, a security organization framework, a security policy framework, a security operation framework, and a closed-loop system that integrates the security technology framework. A deep learning algorithm was introduced for network intrusion learning to achieve sustainable management of the information security life cycle. The combination of active and passive security systems and continuous monitoring strategies based on deep learning fully ensure the security of the global energy Internet standard support system.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Koval, Viktor, Yevheniia Sribna, and Krzysztof Gaska. "Energy Cooperation Ukraine-Poland to Strengthen Energy Security." E3S Web of Conferences 132 (2019): 01009. http://dx.doi.org/10.1051/e3sconf/201913201009.

Повний текст джерела
Анотація:
The article analyzes the prospects of cooperation between Poland and Ukraine in the field of electric power transmission. In particular, the characteristics of the «Burshtyn Energy Island» are enlightened, which includes Burshtyn TPP, Kalush CHPP and Tereble- Ritsk HPP that are detached from the power system of Ukraine and operate in parallel with the European system ENTSO-E. This island serves as an importer of Ukrainian electric power to European countries through Hungary and Slovakia, respectively, and is synchronized with the European Network of System Operators for Electricity Transmission (ENTSO-E). The main problem of the international transmission of electric current of Ukraine is determined, which is that the whole energy system of Ukraine works within the international energy union of the CIS and Baltic IPS / UPS. At the same time, the integration of Ukraine into the markets of Western European countries requires the break of established connections under the IPS / UPS system and the parallel increase of communications under the ENTSO-E system through Poland, Slovakia, Romania and Hungary. The prospect for the development of the Energy Bridge project, which provides the supply of electric power from the Khmelnitsk NPP to Poland through the Khmelnitsk NPP - Rzeszow, is described. It is proposed the stages for the further development of energy security in the information direction on the introduction of Smart Grid technologies, in which energy companies will be able to manage the whole network as the only flexible digital system, and end users - to clearly regulate their own electricity costs.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Jaysawal, Anoop. "Cyber Security in Smart Grid System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 341. http://dx.doi.org/10.23956/ijarcsse.v7i8.85.

Повний текст джерела
Анотація:
Abstract: The smart grid is an evolution of the electrical grid to respond to these challenges. A smart grid is an energy transmission and distribution network enhanced through digital control, monitoring, and telecommunications capabilities. It provides a real-time, two-way flow of energy and information to all stakeholders in the electricity chain, from the generation plant to the commercial, industrial, and residential end user. This evolution is crucial for integrating both renewable and distributed energy resources and to improve the efficiency and sustainability of the electrical grid and associated services. It will also help in other ways, such as enabling:• Smart and positive energy infrastructures• Increased energy density management during peaks• Real-time pricing to customers• Integrated mobility services• New virtual power plants• Micro grid
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Glynn, James, Alessandro Chiodi, and Brian Ó Gallachóir. "Energy security assessment methods: Quantifying the security co-benefits of decarbonising the Irish Energy System." Energy Strategy Reviews 15 (March 2017): 72–88. http://dx.doi.org/10.1016/j.esr.2016.11.005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Lukutin, Boris, and Violetta Kiushkina. "Intellectual energy security monitoring of decentralized systems of electricity with renewable energy sources." E3S Web of Conferences 69 (2018): 02002. http://dx.doi.org/10.1051/e3sconf/20186902002.

Повний текст джерела
Анотація:
The article reveals an attempt to create an integrated information system for energy security monitoring, for instance in Yakutia, in terms of a vivid and typical representative of isolated areas with extreme temperature conditions. The analysis of area assessment of renewable energy and energy security strengthening of decentralized power supply systems is given. The research considers the worked out algorithm which determines the renewable energy attractiveness coefficient in connection with energy security assessment indicators. The document includes the results of the analysis of the energy situation in Yakutia with the help of geoinformation software product, the illustrative fragment of integrated information system modules. The implementation of the developed system results in fast analysis of occurring issues, indicators calculating as a foundation for strategic platform to manage energy security positions. The system assists to tackle the problems in advance.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Energy security system"

1

Jeffrey, Bernard Kucharski. "Energy security in Japan in the context of a planned energy system transition." Kyoto University, 2016. http://hdl.handle.net/2433/217192.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Chu, Weilian. "Evaluating effectiveness of an embedded system endpoint security technology on energy delivery systems." Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/121597.

Повний текст джерела
Анотація:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 67-68).
The Internet of Things (IoT) is starting to take off in the modern day tech scene, with almost every user device being connected to a huge network with other devices; industrial energy delivery systems are no different. However, IoT in industry (known as IIoT) severely lags behind conventional IoT networks when it comes to cybersecurity, as IIoT endpoint devices generally lack the same level of memory and computation as conventional IoT endpoints. As a result, the same level of security measurements can't be implemented, and IIoT devices often are vulnerable to malicious users attempting to hack the device. The goal of this research is to create a lightweight software system that protects the endpoint devices from hackers, as well as prevent malicious accesses from impacting other parts of the system. This thesis will focus on the command and control unit, where the aim is to develop a neural net classifier to detect anomalies in network traffic. This thesis details the background surrounding IIoT endpoint devices, and the current attempts that have been made at providing a solution, as well as our approach to solving this problem, using both supervised and unsupervised machine learning approaches, and describe the testing environment with which the experiments were conducted. In the end we discuss how the work contributes to the future progress of IIoT security.
by Weilian Chu.
M. Eng.
M.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Vterkovska, V. "Fundamentals of geoinformation systems energy security of economic entities." Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/65038.

Повний текст джерела
Анотація:
Sustainable development of energy systems is the key to ensuring energy security. Although particular relevance of energy problems Ukraine, the state does not adopt a document that would clearly regulate the work of authorities in the field of energy security and energy's performance monitoring.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Melin, Erik. "Depoliticising Energy : A Review of Energy Security in Swedish Policy-Making." Thesis, Uppsala universitet, Institutionen för arkeologi och antik historia, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-353430.

Повний текст джерела
Анотація:
In order to cope with the changing climate, there will be a need for mitigating transformations of a scope, speed and magnitude that are unprecedented in human history, but the consensus- and market-driven approach is inhibiting this transformation. This thesis reviews how various discourses and debates on energy policy within Swedish governments have changed between 1974 and 2017, through the lenses of energy security and depoliticisation, and how a better understanding of these debates and discourses may inform the impending large-scale transformation required to meet the challenge of climate change. Some of the main findings are that (1) nuclear power and the result of the nuclear power referendum have been decisive for energy policy, and that nuclear power will remain of vital importance in the twenty-first century. (2) Energy has become increasingly depoliticised since the 1980s, ensuing the referendum on nuclear power. (3) The discourse on energy security has shifted towards market-based solutions: in the 2000s, climate change is to be mitigated through consumer- oriented solutions such as green certificates. Through privatisation, it essentially has become up to the consumer, deciding whether to participate in mitigation of climate change.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Homon, Bohdan. "Combined power supply system converting unit with renewable sources." Thesis, Дніпропетровський національний університет залізничного транспорту ім. академіка В. Лазаряна, 2017. https://er.knutd.edu.ua/handle/123456789/9329.

Повний текст джерела
Анотація:
The article deals with the implementation of renewable energy sources in local electrical systems such as solar battery, wind turbines. The improvement and wide spread of the sources of distributed generation renewable energy sources is one of the ways to improve the energy security of the country.
Стаття присвячена питанню впровадження відновлювальних джерел енергії (сонячна батарея, вітрові турбіни) в місцевих електричних системах. Покращення та широке розповсюдження поновлюваних джерел енергії розподіленої генерації є одним із способів підвищення енергетичної безпеки країни.
Статья посвящена вопросу внедрения возобновляемых источников энергии (солнечная батарея, ветровые турбины) в местных электрических системах. Улучшение и широкое распространение возобновляемых источников энергии распределенной генерации является одним из способов повышения энергетической безопасности страны.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Chapman, Jeffrey W. (Jeffrey Wayne). "Power system control for large-disturbance stability : security, robustness and transient energy." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/39393.

Повний текст джерела
Анотація:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1996.
Includes bibliographical references (p. 223-228).
by Jeffrey Wayne Chapman.
Ph.D.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Foord, Wayne. "Energy scarcity and food security : strategies for transition to resilient food system governance." Thesis, Queen's University Belfast, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.705918.

Повний текст джерела
Анотація:
This thesis addresses the impacts of emerging energy scarcity on food security, and explores strategies for transition to a sustainable food system. The core research questions focus on the transition movement, its political strategy, and proposals for food sustainability. Contextual questions include: What post-peak oil scenarios are plausible/implausible given current evidence regarding global oil production, and available energy alternatives? Do any current trends indicate the unfolding of one scenario, in particular? And how might this scenario impact on food security, and what are the implications for transition movement strategy? Evidence is presented that global oil production has already ‘plateaued’, and the most likely scenarios for industrial societies now lie on a continuum between forced, gradual energy descent and rapid collapse. Emerging trends indicate that energy scarcity is associated with the evolution of a post-liberal order, as anticipated by some contributors to the ‘politics of scarcity’ debate in the 1970’s. These trends are also manifesting within the global food system, in the form of ‘land-grabbing’ and widespread imposition of GM-based industrial agriculture. In light of imminent forced energy descent, emerging global trends, and learning from the Cuban Special Period, it is argued that both green political theory and transition movement strategy should focus on the contested politics of transition, in conjunction with a prospective politics that steers transition towards a new societal equilibrium. A diverse, adaptive repertoire of political strategies is proposed, including: solutions-based activism; oppositional activism; insurgent citizenship; transformative engagement with local government; and ‘de-linking’ initiatives. Scaling up of local Transition initiatives should include: promotion of regional solidarity networks between urban centres; regional food system planning; and alliance-building with other counter-hegemonic social movements. It is further proposed that a ‘food sovereignty’ framing is adopted, and that scaled up, farm sector agroecology is promoted, to complement existing permaculture and organic approaches.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Blazeviciute, Lina. "Illustrative ElectricitySupply Scenarios and Sustainable Development in Lithuania." Thesis, Uppsala universitet, Institutionen för geovetenskaper, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-233643.

Повний текст джерела
Анотація:
Lithuania has limited domestic energy resources, and is therefore, heavily dependent on imports of oil products and natural gas. Lithuania imported around 90% of its oil and 100% of natural gas in 2009. Particularly, after the accession to the European Union (EU), and decommissioning of main electricity generation source Ignalina Nuclear Power Plant (NPP), energy security became one of the main concerns. Therefore, it is vital to evaluate different pathways the country could take in order to achieve desirable energy security, and ensure sustainable development of the energy system in Lithuania. The study was conducted using LEAP, the Long range Energy Alternatives Planning System, to develop energy policy analysis. Different scenarios presented in the report show how Lithuanian energy system would react in given different circumstances. Moreover, it demonstrates how implementation of existing energy projects separately or combined together would affect the level of energy security and sustainability in Lithuania. The research shows that current government policies could lead Lithuania to more secure and sustainable energy future. However, in a long run higher investments in renewable energy might be more environmentally and economically competitive alternative.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Nair, Nirmal-Kumar. "Incorporating voltage security into the planning, operation and monitoring of restructured electric energy markets." Texas A&M University, 2004. http://hdl.handle.net/1969.1/3199.

Повний текст джерела
Анотація:
As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater attention to operating costs than stability and security margins. Since operating stability is a basic requirement for any power system, there is need for newer tools to ensure stability and security margins being strictly enforced in the competitive marketplace. This dissertation investigates issues associated with incorporating voltage security into the unbundled operating environment of electricity markets. It includes addressing voltage security in the monitoring, operational and planning horizons of restructured power system. This dissertation presents a new decomposition procedure to estimate voltage security usage by transactions. The procedure follows physical law and uses an index that can be monitored knowing the state of the system. The expression derived is based on composite market coordination models that have both PoolCo and OpCo transactions, in a shared stressed transmission grid. Our procedure is able to equitably distinguish the impacts of individual transactions on voltage stability, at load buses, in a simple and fast manner. This dissertation formulates a new voltage stability constrained optimal power flow (VSCOPF) using a simple voltage security index. In modern planning, composite power system reliability analysis that encompasses both adequacy and security issues is being developed. We have illustrated the applicability of our VSCOPF into composite reliability analysis. This dissertation also delves into the various applications of voltage security index. Increasingly, FACT devices are being used in restructured markets to mitigate a variety of operational problems. Their control effects on voltage security would be demonstrated using our VSCOPF procedure. Further, this dissertation investigates the application of steady state voltage stability index to detect potential dynamic voltage collapse. Finally, this dissertation examines developments in representation, standardization, communication and exchange of power system data. Power system data is the key input to all analytical engines for system operation, monitoring and control. Data exchange and dissemination could impact voltage security evaluation and therefore needs to be critically examined.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Youssef, Tarek. "Co-design of Security Aware Power System Distribution Architecture as Cyber Physical System." FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3210.

Повний текст джерела
Анотація:
The modern smart grid would involve deep integration between measurement nodes, communication systems, artificial intelligence, power electronics and distributed resources. On one hand, this type of integration can dramatically improve the grid performance and efficiency, but on the other, it can also introduce new types of vulnerabilities to the grid. To obtain the best performance, while minimizing the risk of vulnerabilities, the physical power system must be designed as a security aware system. In this dissertation, an interoperability and communication framework for microgrid control and Cyber Physical system enhancements is designed and implemented taking into account cyber and physical security aspects. The proposed data-centric interoperability layer provides a common data bus and a resilient control network for seamless integration of distributed energy resources. In addition, a synchronized measurement network and advanced metering infrastructure were developed to provide real-time monitoring for active distribution networks. A hybrid hardware/software testbed environment was developed to represent the smart grid as a cyber-physical system through hardware and software in the loop simulation methods. In addition it provides a flexible interface for remote integration and experimentation of attack scenarios. The work in this dissertation utilizes communication technologies to enhance the performance of the DC microgrids and distribution networks by extending the application of the GPS synchronization to the DC Networks. GPS synchronization allows the operation of distributed DC-DC converters as an interleaved converters system. Along with the GPS synchronization, carrier extraction synchronization technique was developed to improve the system’s security and reliability in the case of GPS signal spoofing or jamming. To improve the integration of the microgrid with the utility system, new synchronization and islanding detection algorithms were developed. The developed algorithms overcome the problem of SCADA and PMU based islanding detection methods such as communication failure and frequency stability. In addition, a real-time energy management system with online optimization was developed to manage the energy resources within the microgrid. The security and privacy were also addressed in both the cyber and physical levels. For the physical design, two techniques were developed to address the physical privacy issues by changing the current and electromagnetic signature. For the cyber level, a security mechanism for IEC 61850 GOOSE messages was developed to address the security shortcomings in the standard.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Energy security system"

1

Nihon Kokusai Fōramu. Policy Council. The 27th policy recommendations: The establishment of an international energy security system. Tokyo: Japan Forum on International Relations, 2006.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Heinrich Böll Foundation (Addis Ababa, Ethiopia) and Forum for Environment (Ethiopia), eds. Diversity and security for Ethiopian power system: A preliminary assessment of opportunities and risks for the power sector. Addis Ababa: HBF, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Guo ji neng yuan ji gou neng yuan an quan fa lü zhi du yan jiu: On the legal system of the international Energy Aagency for energy security. Beijing Shi: Zhongguo zheng fa da xue chu ban she, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Kröger, Wolfgang. Vulnerable Systems. London: Springer-Verlag London Limited, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Lobanov, Aleksey. Biomedical foundations of security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1007643.

Повний текст джерела
Анотація:
The textbook discusses the threats and risks to life and health of people in post-industrial society. The role and place of medical and biological technologies in the system of ensuring the safety of the population of the Russian Federation are shown from the standpoint of an interdisciplinary approach. Briefly, but quite informative, the structure of the human body and the principles of its functioning are described. The specificity and mechanism of toxic effects on humans of harmful substances, energy effects and combined action of the main damaging factors of sources of emergency situations of peace and war are shown. The medical and biological aspects of ensuring the safety of human life in adverse environmental conditions, including in regions with hot and cold climates (Arctic) are considered. Means and methods of first aid to victims are shown. The questions of organization and carrying out of measures of medical support of the population in zones of emergency situations and the centers of defeat are covered. Designed for students, students and cadets of educational institutions of higher education, studying under the bachelor's program. It can also be useful for teachers, researchers and a wide range of professionals engaged in practical work on the planning and organization of biomedical protection of the population.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Environmental Planning and Coordination Organization (Madhya Pradesh, India). Thematic position papers on water and sanitation, energy, health, agriculture and food security, biodiversity and eco-system management: With focus on Madhya Pradesh. Bhopal: Environmental Planning & Coordination Organisation, 2008.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Rezendes, Victor S. Department of Energy: Improving management of major system acquisitions : statement by Victor S. Rezendes, Director, Energy, Resources, and Science Issues, Resources, Community, and Economic Development Division, before the Subcommittee on Energy and Environment, Committee on Science, House of Representatives. Washington, D.C: The Office, 1997.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Office, General Accounting. Information system: Opportunities exist to strengthen SEC's oversight of capacity and security : report to the Ranking Minority Member, Committee on Energy and Commerce, House of Representatives. Washington, D.C: GAO, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Cyber security: Hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Twelfth Congress, first session, to receive testimony on a joint staff discussion draft pertaining to cyber security of the bulk-power system and electric infrastructure and for other purposes, May 5, 2011. Washington: U.S. G.P.O., 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Office, General Accounting. Homeland security: Communication protocols and risk communication principles can assist in refining the advisory system : report to congressional requesters. Washington, D.C: U.S. General Accounting Office, 2004.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Energy security system"

1

Jia, Heping, Yi Ding, Yishuang Hu, and Yonghua Song. "Cyber-Physical System Security." In Energy Internet, 107–19. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45453-1_3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Narula, Kapil. "Global Energy System and Sustainable Energy Security." In Lecture Notes in Energy, 23–49. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1589-3_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Walker, Sara L. "The UK Electricity System and Its Resilience." In Global Energy Policy and Security, 75–102. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5286-6_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Alcaraz, Cristina, Angel Balastegui, and Javier Lopez. "Early Warning System for Cascading Effect Control in Energy Control Systems." In Critical Information Infrastructures Security, 55–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21694-7_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Amrutha, A. A., P. Balachandra, and M. Mathirajan. "Low-Carbon Planning in A Resource-Constrained Electricity System: A Case Study from India." In Energy Security and Development, 111–32. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2065-7_7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Jiang, Xiawei, Weidong Yi, Yongrui Chen, and Hao He. "Energy Efficient Smart Irrigation System Based on 6LoWPAN." In Cloud Computing and Security, 308–19. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00018-9_28.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Liang, Lulu, Kai Zheng, Qiankun Sheng, Wei Wang, Rong Fu, and Xin Huang. "A Denial of Service Attack Method for IoT System in Photovoltaic Energy System." In Network and System Security, 613–22. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_48.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Hong, Insung, Jisung Byun, and Sehyun Park. "Lightweight Middleware-Based ZigBee Security in Building Energy Management System." In Information Security Applications, 151–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27890-7_13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Jiang, Lijun, Weizhi Meng, Yu Wang, Chunhua Su, and Jin Li. "Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study." In Network and System Security, 199–213. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_15.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Zeng, Qinghao, Renjun Tang, Xianjun Chen, Hang Pan, Jinlong Chen, and Hui Zhou. "Research on Building Energy Consumption Acquisition System Based on Configuration." In Cloud Computing and Security, 648–57. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00018-9_57.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Energy security system"

1

Neto, C. A. S., M. A. Quadros, M. G. Santos, and Jorge Jardim. "Brazilian System Operator online security assessment system." In Energy Society General Meeting. IEEE, 2010. http://dx.doi.org/10.1109/pes.2010.5590039.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Hong Chen and Jianwei Liu. "Practices of system security pricing." In Energy Society General Meeting. IEEE, 2008. http://dx.doi.org/10.1109/pes.2008.4596585.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Azadani, E. Nasr, S. H. Hosseinian, and J. Moghani. "Market clearing considering power system security." In Energy Conference (EPEC). IEEE, 2008. http://dx.doi.org/10.1109/epc.2008.4763394.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Bedekar, Vishwas, Mirza Bichurin, Ivan Solovjev, and Shashank Priya. "Multimodal energy harvesting system." In SPIE Defense, Security, and Sensing, edited by Nibir K. Dhar, Priyalal S. Wijewarnasuriya, and Achyut K. Dutta. SPIE, 2011. http://dx.doi.org/10.1117/12.884747.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Prakash, Y. W., Vishakha Biradar, Shenil Vincent, Minto Martin, and Anita Jadhav. "Smart bluetooth low energy security system." In 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2017. http://dx.doi.org/10.1109/wispnet.2017.8300139.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Saba, Amreen, and Nagarathna. "IOT based energy efficient security system." In 2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT). IEEE, 2017. http://dx.doi.org/10.1109/icatcct.2017.8389120.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Wang, Fang, Jian Yang, Zhimin Wu, Xi Chen, and Jianzhong Yu. "Distributed Energy System Improving Security for City Energy Supply." In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5304094.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Alsayegh, Osamah. "Primary Energy System Chain Security Under the Energy Transition." In SPE Middle East Oil & Gas Show and Conference. SPE, 2021. http://dx.doi.org/10.2118/204893-ms.

Повний текст джерела
Анотація:
Abstract This paper examines the energy transition consequences on the oil and gas energy system chain as it propagates from net importing through the transit to the net exporting countries (or regions). The fundamental energy system security concerns of importing, transit, and exporting regions are analyzed under the low carbon energy transition dynamics. The analysis is evidence-based on diversification of energy sources, energy supply and demand evolution, and energy demand management development. The analysis results imply that the energy system is going through technological and logistical reallocation of primary energy. The manifestation of such reallocation includes an increase in electrification, the rise of energy carrier options, and clean technologies. Under healthy and normal global economic growth, the reallocation mentioned above would have a mild effect on curbing the oil and gas primary energy demands growth. A case study concerning electric vehicles, which is part of the energy transition aspect, is presented to assess its impact on the energy system, precisely on the fossil fuel demand. Results show that electric vehicles are indirectly fueled, mainly from fossil-fired power stations through electric grids. Moreover, oil byproducts use in the electric vehicle industry confirms the reallocation of the energy system components' roles. The paper's contribution to the literature is the portrayal of the energy system security state under the low carbon energy transition. The significance of this representation is to shed light on the concerns of the net exporting, transit, and net importing regions under such evolution. Subsequently, it facilitates the development of measures toward mitigating world tensions and conflicts, enhancing the global socio-economic wellbeing, and preventing corruption.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Lerch, E., and U. Kerin. "Dynamic System Security Assessment using Inventive Simulation Techniques." In Power and Energy Systems. Calgary,AB,Canada: ACTAPRESS, 2010. http://dx.doi.org/10.2316/p.2010.701-021.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Kerin, Uros, Edwin Lerch, and Grega Bizjak. "Power system dynamic security inference — Conceptual solution." In Energy Society General Meeting. IEEE, 2010. http://dx.doi.org/10.1109/pes.2010.5588171.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Energy security system"

1

Judson, Nicholas. Interdependence of the Electricity Generation System and the Natural Gas System and Implications for Energy Security. Fort Belvoir, VA: Defense Technical Information Center, May 2013. http://dx.doi.org/10.21236/ada584764.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Miller, Craig, and Robert Larmouth. Energy Sector Security through a System for Intelligent, Learning Network Configuration Monitoring and Management (“Essence”). Office of Scientific and Technical Information (OSTI), May 2017. http://dx.doi.org/10.2172/1360111.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Erkamo, Sanna, Karoliina Pilli-Sihvola, Atte Harjanne, and Heikki Tuomenvirta. Climate Security and Finland – A Review on Security Implications of Climate Change from the Finnish Perspective. Finnish Meteorological Institute, 2021. http://dx.doi.org/10.35614/isbn.9789523361362.

Повний текст джерела
Анотація:
This report describes the effects of climate change for Finland from the view of comprehensive security. The report examines both direct and indirect climate security risks as well as transition risks related to climate change mitigation. The report is based on previous research and expert interviews. Direct security risks refer to the immediate risks caused by the changing nature of natural hazards. These include the risks to critical infrastructure and energy systems, the logistics system, health and food security. Indirect security risks relate to the potential economic, political and geopolitical impacts of climate change. Climate change can affect global migration, increase conflict risk, and cause social tensions and inequality. Transition risks are related to economic and technological changes in energy transition, as well as political and geopolitical tensions and social problems caused by climate change mitigation policies. Reducing the use of fossil fuels can result in domestic and foreign policy tensions and economic pressure especially in locations dependent on fossil fuels. Political tension can also increase the risks associated with hybrid and information warfare. The security effects of climate change affect all sectors of society and the Finnish comprehensive security model should be utilized in preparing for them. In the short run, the most substantial arising climate change related security risks in Finland are likely to occur through indirect or transition risks. Finland, similar to other wealthy countries, has better technological, economic and institutional conditions to deal with the problems and risks posed by climate change than many other countries. However, this requires political will and focus on risk reduction and management.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Stamp, Jason E., Jimmy Edward Quiroz, and Abraham Ellis. Cyber Security Gap Analysis for Critical Energy Systems (CSGACES). Office of Scientific and Technical Information (OSTI), August 2017. http://dx.doi.org/10.2172/1494189.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Pullammanappallil, Pratap, Haim Kalman, and Jennifer Curtis. Investigation of particulate flow behavior in a continuous, high solids, leach-bed biogasification system. United States Department of Agriculture, January 2015. http://dx.doi.org/10.32747/2015.7600038.bard.

Повний текст джерела
Анотація:
Recent concerns regarding global warming and energy security have accelerated research and developmental efforts to produce biofuels from agricultural and forestry residues, and energy crops. Anaerobic digestion is a promising process for producing biogas-biofuel from biomass feedstocks. However, there is a need for new reactor designs and operating considerations to process fibrous biomass feedstocks. In this research project, the multiphase flow behavior of biomass particles was investigated. The objective was accomplished through both simulation and experimentation. The simulations included both particle-level and bulk flow simulations. Successful computational fluid dynamics (CFD) simulation of multiphase flow in the digester is dependent on the accuracy of constitutive models which describe (1) the particle phase stress due to particle interactions, (2) the particle phase dissipation due to inelastic interactions between particles and (3) the drag force between the fibres and the digester fluid. Discrete Element Method (DEM) simulations of Homogeneous Cooling Systems (HCS) were used to develop a particle phase dissipation rate model for non-spherical particle systems that was incorporated in a two-fluid CFDmultiphase flow model framework. Two types of frictionless, elongated particle models were compared in the HCS simulations: glued-sphere and true cylinder. A new model for drag for elongated fibres was developed which depends on Reynolds number, solids fraction, and fibre aspect ratio. Schulze shear test results could be used to calibrate particle-particle friction for DEM simulations. Several experimental measurements were taken for biomass particles like olive pulp, orange peels, wheat straw, semolina, and wheat grains. Using a compression tester, the breakage force, breakage energy, yield force, elastic stiffness and Young’s modulus were measured. Measurements were made in a shear tester to determine unconfined yield stress, major principal stress, effective angle of internal friction and internal friction angle. A liquid fludized bed system was used to determine critical velocity of fluidization for these materials. Transport measurements for pneumatic conveying were also assessed. Anaerobic digestion experiments were conducted using orange peel waste, olive pulp and wheat straw. Orange peel waste and olive pulp could be anaerobically digested to produce high methane yields. Wheat straw was not digestible. In a packed bed reactor, anaerobic digestion was not initiated above bulk densities of 100 kg/m³ for peel waste and 75 kg/m³ for olive pulp. Interestingly, after the digestion has been initiated and balanced methanogenesis established, the decomposing biomass could be packed to higher densities and successfully digested. These observations provided useful insights for high throughput reactor designs. Another outcome from this project was the development of low cost devices to measure methane content of biogas for off-line (US$37), field (US$50), and online (US$107) applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Stamber, Kevin L., Andjelka Kelic, Robert A. Taylor, Jordan M. Henry, and Jason E. Stamp. Distributed Energy Systems: Security Implications of the Grid of the Future. Office of Scientific and Technical Information (OSTI), January 2017. http://dx.doi.org/10.2172/1341777.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Gadgil, Shrirang, Yow-Jian Lin, Abhrajit Ghosh, Sunil Samtani, Jaewon Kang, Bruce Siegell, Vikram Kaul, et al. Tools and Methods for Hardening Communication Security of Energy Delivery Systems. Office of Scientific and Technical Information (OSTI), September 2014. http://dx.doi.org/10.2172/1170365.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Benton, Tim, Antony Froggatt, Laura Wellesley, Owen Grafham, Richard King, Neil Morisetti, James Nixey, and Patrick Schröder. The Ukraine war and threats to food and energy security: Cascading risks from rising prices and supply disruptions. Royal Institute of International Affairs, April 2022. http://dx.doi.org/10.55317/9781784135225.

Повний текст джерела
Анотація:
Global resource markets are still reeling from the impacts of Russia’s invasion of Ukraine; the two countries are major suppliers of energy, food and fertilizers. Supply disruption and the sudden imposition, in response to the crisis, of unprecedented economic sanctions, trade restrictions and policy interventions have caused prices of commodities to skyrocket. Before the conflict, demand for global resources already exceeded supply and drove up prices as economies rebounded after the COVID-19 pandemic. This gave rise to a global cost-of-living crisis, characterized by increasing levels of energy and food poverty. This situation is likely to become much worse as a consequence of the war in Ukraine, and poses a threat to human security, particularly among low-income and vulnerable populations. Governments must invest now to build resilient societies and economies to meet these long-term challenges. Mitigating the most immediate harms to populations is a top priority for policymakers, but failure to keep long-term objectives in mind – climate change mitigation, in particular – can lead to bad decisions that further embed existing fragilities in economic and social systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Lewis, Dustin, and Naz Modirzadeh. Taking into Account the Potential Effects of Counterterrorism Measures on Humanitarian and Medical Activities: Elements of an Analytical Framework for States Grounded in Respect for International Law. Harvard Law School Program on International Law and Armed Conflict, May 2021. http://dx.doi.org/10.54813/qbot8406.

Повний текст джерела
Анотація:
For at least a decade, States, humanitarian bodies, and civil-society actors have raised concerns about how certain counterterrorism measures can prevent or impede humanitarian and medical activities in armed conflicts. In 2019, the issue drew the attention of the world’s preeminent body charged with maintaining or restoring international peace and security: the United Nations Security Council. In two resolutions — Resolution 2462 (2019) and Resolution 2482 (2019) — adopted that year, the Security Council urged States to take into account the potential effects of certain counterterrorism measures on exclusively humanitarian activities, including medical activities, that are carried out by impartial humanitarian actors in a manner consistent with international humanitarian law (IHL). By implicitly recognizing that measures adopted to achieve one policy objective (countering terrorism) can impair or prevent another policy objective (safeguarding humanitarian and medical activities), the Security Council elevated taking into account the potential effects of certain counterterrorism measures on exclusively humanitarian activities to an issue implicating international peace and security. In this legal briefing, we aim to support the development of an analytical framework through which a State may seek to devise and administer a system to take into account the potential effects of counterterrorism measures on humanitarian and medical activities. Our primary intended audience includes the people involved in creating or administering a “take into account” system and in developing relevant laws and policies. Our analysis zooms in on Resolution 2462 (2019) and Resolution 2482 (2019) and focuses on grounding the framework in respect for international law, notably the U.N. Charter and IHL. In section 1, we introduce the impetus, objectives, and structure of the briefing. In our view, a thorough legal analysis of the relevant resolutions in their wider context is a crucial element to laying the conditions conducive to the development and administration of an effective “take into account” system. Further, the stakes and timeliness of the issue, the Security Council’s implicit recognition of a potential tension between measures adopted to achieve different policy objectives, and the relatively scant salient direct practice and scholarship on elements pertinent to “take into account” systems also compelled us to engage in original legal analysis, with a focus on public international law and IHL. In section 2, as a primer for readers unfamiliar with the core issues, we briefly outline humanitarian and medical activities and counterterrorism measures. Then we highlight a range of possible effects of the latter on the former. Concerning armed conflict, humanitarian activities aim primarily to provide relief to and protection for people affected by the conflict whose needs are unmet, whereas medical activities aim primarily to provide care for wounded and sick persons, including the enemy. Meanwhile, for at least several decades, States have sought to prevent and suppress acts of terrorism and punish those who commit, attempt to commit, or otherwise support acts of terrorism. Under the rubric of countering terrorism, States have taken an increasingly broad and diverse array of actions at the global, regional, and national levels. A growing body of qualitative and quantitative evidence documents how certain measures designed and applied to counter terrorism can impede or prevent humanitarian and medical activities in armed conflicts. In a nutshell, counterterrorism measures may lead to diminished or complete lack of access by humanitarian and medical actors to the persons affected by an armed conflict that is also characterized as a counterterrorism context, or those measures may adversely affect the scope, amount, or quality of humanitarian and medical services provided to such persons. The diverse array of detrimental effects of certain counterterrorism measures on humanitarian and medical activities may be grouped into several cross-cutting categories, including operational, financial, security, legal, and reputational effects. In section 3, we explain some of the key legal aspects of humanitarian and medical activities and counterterrorism measures. States have developed IHL as the primary body of international law applicable to acts and omissions connected with an armed conflict. IHL lays down several rights and obligations relating to a broad spectrum of humanitarian and medical activities pertaining to armed conflicts. A violation of an applicable IHL provision related to humanitarian or medical activities may engage the international legal responsibility of a State or an individual. Meanwhile, at the international level, there is no single, comprehensive body of counterterrorism laws. However, States have developed a collection of treaties to pursue specific anti-terrorism objectives. Further, for its part, the Security Council has assumed an increasingly prominent role in countering terrorism, including by adopting decisions that U.N. Member States must accept and carry out under the U.N. Charter. Some counterterrorism measures are designed and applied in a manner that implicitly or expressly “carves out” particular safeguards — typically in the form of limited exceptions or exemptions — for certain humanitarian or medical activities or actors. Yet most counterterrorism measures do not include such safeguards. In section 4, which constitutes the bulk of our original legal analysis, we closely evaluate the two resolutions in which the Security Council urged States to take into account the effects of (certain) counterterrorism measures on humanitarian and medical activities. We set the stage by summarizing some aspects of the legal relations between Security Council acts and IHL provisions pertaining to humanitarian and medical activities. We then analyze the status, consequences, and content of several substantive elements of the resolutions and what they may entail for States seeking to counter terrorism and safeguard humanitarian and medical activities. Among the elements that we evaluate are: the Security Council’s new notion of a prohibited financial “benefit” for terrorists as it may relate to humanitarian and medical activities; the Council’s demand that States comply with IHL obligations while countering terrorism; and the constituent parts of the Council’s notion of a “take into account” system. In section 5, we set out some potential elements of an analytical framework through which a State may seek to develop and administer its “take into account” system in line with Resolution 2462 (2019) and Resolution 2482 (2019). In terms of its object and purpose, a “take into account” system may aim to secure respect for international law, notably the U.N. Charter and IHL pertaining to humanitarian and medical activities. In addition, the system may seek to safeguard humanitarian and medical activities in armed conflicts that also qualify as counterterrorism contexts. We also identify two sets of preconditions arguably necessary for a State to anticipate and address relevant potential effects through the development and execution of its “take into account” system. Finally, we suggest three sets of attributes that a “take into account” system may need to embody to achieve its aims: utilizing a State-wide approach, focusing on potential effects, and including default principles and rules to help guide implementation. In section 6, we briefly conclude. In our view, jointly pursuing the policy objectives of countering terrorism and safeguarding humanitarian and medical activities presents several opportunities, challenges, and complexities. International law does not necessarily provide ready-made answers to all of the difficult questions in this area. Yet devising and executing a “take into account” system provides a State significant opportunities to safeguard humanitarian and medical activities and counter terrorism while securing greater respect for international law.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Rahimipour, Shai, and David Donovan. Renewable, long-term, antimicrobial surface treatments through dopamine-mediated binding of peptidoglycan hydrolases. United States Department of Agriculture, January 2012. http://dx.doi.org/10.32747/2012.7597930.bard.

Повний текст джерела
Анотація:
There is a need for renewable antimicrobial surface treatments that are semi- permanent, can eradicate both biofilms and planktonic pathogens over long periods of time and that do not select for resistant strains. This proposal describes a dopamine binding technology that is inexpensive, bio-friendly, non-toxic, and uses straight-forward commercially available products. The antimicrobial agents are peptidoglycanhydrolase enzymes that are non-toxic and highly refractory to resistance development. The goal of this project is to create a treatment that will be applicable to a wide variety of surfaces and will convey long-lasting antimicrobial activity. Although the immediate goal is to create staphylolytic surfaces, the technology should be applicable to any pathogen and will thus contribute to no less than 3 BARD priorities: 1) increased animal production by protecting animals from invasive and emerging diseases, 2) Antimicrobial food packaging will improve food safety and security and 3) sustainable bio- energy systems will be supported by coating fermentation vats with antimicrobials that could protect ethanolic fermentations from Lactobacillus contamination that reduces ethanol yields. The dopamine-based modification of surfaces is inspired by the strong adhesion of mussel adhesion proteins to virtually all types of surfaces, including metals, polymers, and inorganic materials. Peptidoglycanhydrolases (PGHs) meet the criteria of a surface bound antimicrobial with their site of action being extracellular peptidoglycan (the structural basis of the bacterial cell wall) that when breached causes osmotic lysis. As a proof of principle, we will develop technology using peptidoglycanhydrolase enzymes that target Staphylococcus aureus, a notoriously contagious and antimicrobial-resistant pathogen. We will test for susceptibility of the coating to a variety of environmental stresses including UV light, abrasive cleaning and dessication. In order to avoid resistance development, we intend to use three unique, synergistic, simultaneous staphylococcal enzyme activities. The hydrolases are modular such that we have created fusion proteins with three lytic activities that are highly refractory to resistance development. It is essential to use multiple simultaneous activities to avoid selecting for antimicrobial resistant strains. This strategy is applicable to both Gram positive and negative pathogens. We anticipate that upon completion of this award the technology will be available for commercialization within the time required to achieve a suitable high volume production scheme for the required enzymes (~1-2 years). We expect the modified surface will remain antimicrobial for several days, and when necessary, the protocol for renewal of the surface will be easily applied in a diverse array of environments, from food processing plants to barnyards.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії