Статті в журналах з теми "Management of energy security"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Management of energy security.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Management of energy security".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Tang, Adrian, Simha Sethumadhavan, and Salvatore Stolfo. "Motivating Security-Aware Energy Management." IEEE Micro 38, no. 3 (May 2018): 98–106. http://dx.doi.org/10.1109/mm.2018.032271066.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Proskuryakova, L. "Updating energy security and environmental policy: Energy security theories revisited." Journal of Environmental Management 223 (October 2018): 203–14. http://dx.doi.org/10.1016/j.jenvman.2018.06.016.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Sohn, Ira. "US energy security." Energy Policy 18, no. 2 (March 1990): 149–61. http://dx.doi.org/10.1016/0301-4215(90)90140-y.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Mouftah, H. T., R. Kun, and D. Hoffer. "A distributed energy management and security system." Journal of Microcomputer Applications 10, no. 1 (January 1987): 29–39. http://dx.doi.org/10.1016/0745-7138(87)90034-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Sulimin, Vladimir, Vladislav Shvedov, and Maiia Lvova. "Energy security management of a business entity." E3S Web of Conferences 270 (2021): 01010. http://dx.doi.org/10.1051/e3sconf/202127001010.

Повний текст джерела
Анотація:
Nowadays, the basic indicator of the stability of an economic entity established to sell its products and obtain profits is its economic security, i.e. the protection of its interests regardless specific impact of different external and internal factors. The paper deals with the ways to ensure the entity energy system security, and measures to improve the efficiency of this system management. The paper also identifies the most typical threats to uninterruptible energy supply of enterprises and organizations, as well as means of preventing and overcoming problems caused by these problems.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Mityakov, E. S., and A. I. Ladynin. "HIGH-TECH ENTERPRISES ENERGY SECURITY MANAGEMENT MODEL." Развитие и безопасность, no. 4 (2021): 62–72. http://dx.doi.org/10.46960/2713-2633_2021_4_62.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Markandya, Anil, and Malcolm Pemberton. "Energy security, energy modelling and uncertainty." Energy Policy 38, no. 4 (April 2010): 1609–13. http://dx.doi.org/10.1016/j.enpol.2009.01.046.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

MacKerron, Gordon. "Energy security to 2000." Energy Policy 16, no. 3 (June 1988): 326–27. http://dx.doi.org/10.1016/0301-4215(88)90168-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Vasilescu, Gabriel, Passca Mihaela, Mihail Vătăsescu, and Ciprian Jitea. "Management of Security Risk in the Energy Field." Global Environmental Engineers 1, no. 1 (November 27, 2014): 24–28. http://dx.doi.org/10.15377/2410-3624.2014.01.01.3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Voynarenko, Mykhaylo, Mariia V. Dykha, Oksana Mykoliuk, Ludmyla Yemchuk, and Anastasiia Danilkova. "Assessment of an enterprise’s energy security based on multi-criteria tasks modeling." Problems and Perspectives in Management 16, no. 4 (October 26, 2018): 102–16. http://dx.doi.org/10.21511/ppm.16(4).2018.10.

Повний текст джерела
Анотація:
Today Ukrainian business entities operate in conditions of macroeconomic instability, environmental disturbance, energy dependence on risk of instable and interrupted supply and high cost of energy resources, excessive energy consumption and inefficient use of fuel and energy resources, which requires immediate actions as for finding solutions to ensure energy security. The goal of the article is to solve multi-criteria tasks focused on making managerial decisions regarding the development of enterprise energy security system based on evaluation of influence of numerous factors. As a result of this study, main components of energy security of the enterprise and most important influence factors are determined. The mathematical model of the hierarchy of factors in terms of their influence on the energy security of the enterprise with the use of graph theory is developed. Use of iterative procedure to determine the levels of hierarchy of factors allowed to assess the importance/priority of their influence on energy security of the enterprise. Thus, the developed model of hierarchy of factors based on the applied scientific and methodical approach to determine their influence on energy security of the enterprise provides the opportunity to get a detailed idea of factors interaction, interconnections and influence on energy security of the enterprise, which ultimately leads to elaboration of complex optimal/agreed managerial decisions in context of development and implementation of energy security system of the enterprise.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Dobransky, Steve. "Review Article: Politics, energy and security." Cooperation and Conflict 45, no. 3 (September 2010): 353–59. http://dx.doi.org/10.1177/0010836710378457.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Linan-Reyes, Matias, Joaquin Garrido-Zafra, Aurora Gil-de-Castro, and Antonio Moreno-Munoz. "Energy Management Expert Assistant, a New Concept." Sensors 21, no. 17 (September 2, 2021): 5915. http://dx.doi.org/10.3390/s21175915.

Повний текст джерела
Анотація:
In recent years, interest in home energy management systems (HEMS) has grown significantly, as well as the development of Voice Assistants that substantially increase home comfort. This paper presents a novel merging of HEMS with the Assistant paradigm. The combination of both concepts has allowed the creation of a high-performance and easy-to-manage expert system (ES). It has been developed in a framework that includes, on the one hand, the efficient energy management functionality boosted with an Internet of Things (IoT) platform, where artificial intelligence (AI) and big data treatment are blended, and on the other hand, an assistant that interacts both with the user and with the HEMS itself. The creation of this ES has made it possible to optimize consumption levels, improve security, efficiency, comfort, and user experience, as well as home security (presence simulation or security against intruders), automate processes, optimize resources, and provide relevant information to the user facilitating decision making, all based on a multi-objective optimization (MOP) problem model. This paper presents both the scheme and the results obtained, the synergies generated, and the conclusions that can be drawn after 24 months of operation.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Löschel, Andreas, Ulf Moslener, and Dirk T. G. Rübbelke. "Energy security—concepts and indicators." Energy Policy 38, no. 4 (April 2010): 1607–8. http://dx.doi.org/10.1016/j.enpol.2009.03.019.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Toft, Peter, Arash Duero, and Arunas Bieliauskas. "Terrorist targeting and energy security." Energy Policy 38, no. 8 (August 2010): 4411–21. http://dx.doi.org/10.1016/j.enpol.2010.03.070.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Bohi, Douglas R., and Michael A. Toman. "Energy security: externalities and policies." Energy Policy 21, no. 11 (November 1993): 1093–109. http://dx.doi.org/10.1016/0301-4215(93)90260-m.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Bi, Jia Na, and E. Xu. "An Energy-Efficient Security Node-Based Key Management Protocol for WSN." Applied Mechanics and Materials 347-350 (August 2013): 2117–21. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2117.

Повний текст джерела
Анотація:
A security node-based key management protocol is proposed for cluster-based sensor networks. Member nodes and cluster heads are responsible for data collection and transmission. Security nodes are responsible for key management. Security nodes restrain key management function of cluster heads, and reduce damage of captured cluster heads. Generation of security nodes and different kinds of keys is described. Performance analysis and simulation show that the proposed key management protocol consumes less energy, and its delay time of key generation is short. At the same time, the protocol can provide more collaborative authentication security for keys. It has strong resilience against node capture, and can support large scale network.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Alkatheiri, Mohammed Saeed, Mohammed A. Alqarni, and Sajjad Hussain Chauhdary. "Cyber security framework for smart home energy management systems." Sustainable Energy Technologies and Assessments 46 (August 2021): 101232. http://dx.doi.org/10.1016/j.seta.2021.101232.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Dimitrov, Miroslav Vergilov, and Nataliya Venelinova. "Smart, Secure and Safe Energy Management Approach – An Education Framework Improving the Competence Grid of the Professionals in the Energy Sector." International conference KNOWLEDGE-BASED ORGANIZATION 25, no. 1 (June 1, 2019): 213–18. http://dx.doi.org/10.2478/kbo-2019-0034.

Повний текст джерела
Анотація:
Abstract The paper presents evidence based brand new approach of the permanent rise of the competences and know-how transfer between researchers, teachers and professionals aiming to ensure the specific expertise of the human resources engaged in energy security management. The approach has a collaborative and integrative nature and relies on the hybridization between energy management, urban development planning, environmental management, civil protection, protection of critical infrastructure and the national security applied fields. The authors redefine the conventional understanding of the energy security by describing a practically oriented integrated approach of teaching energy security, based on 3 separately existing concepts: the concept for smart energy security grid, those for the smart cities and the standard operative procedures applied to energy security management. Smart, Secure and Safe Energy Management (3SEMA) is both behaviorally and technically oriented and presented in a circular chart, involving all actors on certain territory with the purpose to apply smart, secure and safe approach in governing the energy sector, taking into consideration the dynamic technological changes and the concept of intelligent urban use.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Setyantoro, Dwipo, Vivi Afifah, Rika Astuti Hasibuan, Novi Aprilia, and Novi Permata Sari. "The WIRELESS COMPUTER NETWORK MANAGEMENT SECURITY ANALYSIS." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 7, no. 2 (February 18, 2022): 105–10. http://dx.doi.org/10.33480/jitk.v7i2.2786.

Повний текст джерела
Анотація:
The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can take advantage of the wireless network. The possibility of threats to information security is very large, such as the presence of intruders on the network. Therefore, it is necessary to manage wireless networks that pay attention to information security issues on the network. The Directorate General of New, Renewable Energy and Energy Conservation at the Ministry of Energy and the Human Resources Republic of Indonesia was chosen as the research location given that computer network users in this institution are diverse and have also used The Dude MikroTik application to manage wireless computer networks, which are instruments to analyze information security. in this institution. The analysis was conducted to identify the activities and effectiveness of information security management in this institution. This study concludes that the use of The Dude MikroTik application is quite helpful in analyzing information security on wireless computer networks in this institution.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Liu, Xiaoli, and Xinmin Jiang. "China's energy security situation and countermeasures." International Journal of Energy Sector Management 3, no. 1 (April 10, 2009): 83–92. http://dx.doi.org/10.1108/17506220910947863.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Onyeji, Ijeoma, Morgan Bazilian, and Chris Bronk. "Cyber Security and Critical Energy Infrastructure." Electricity Journal 27, no. 2 (March 2014): 52–60. http://dx.doi.org/10.1016/j.tej.2014.01.011.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Ali, Saqib, and Tahir Nadeem Malik. "Two-Cored Energy Management System for Industrial Microgrid." Mehran University Research Journal of Engineering and Technology 40, no. 4 (October 1, 2021): 793–808. http://dx.doi.org/10.22581/muet1982.2104.09.

Повний текст джерела
Анотація:
Energy systems have to deal with energy cost and environmental concerns such as greenhouse gas emission. Industrial buildings considered as Microgrid (μG) with heavy load worsen these issues even more. Further, cyber-attacks on the data communication channel between utility and customer is also a potential threat and may alter the data as well as the confidentiality of it, resulting in an inaccurate result. To address these problems, this paper proposes two-cored Building Energy Management System (BEMS) for Industrial Microgrid (IμG) with first cored termed as the energy layer concentrating on energy cost and emission reduction, while second cored termed as security layer provides the un-authorized intrusion detection and prevention system (IDS/IPS) for cyber secure communication of data. The μG under consideration contains national grid, Natural Gas (NG), solar Photovoltaic (PV) as input carriers; electrical energy at output ports; electric vehicle (EV) fleet; battery bank; solar PV panel as non-dispatchable Distributed Energy Resources (DERs) and Internal Combustion Engine (ICE), Fuel Cell (FC) and Micro Turbine (MT) as dispatchable DERs. Energy layer optimization problem has been solved in MATLAB using flower pollination algorithm for µG energy consumption cost and emission reduction. To develop and analyze the security layer, Linux operating system based Smooth-sec software has been used. Devised security layer continuously monitors the network traffic between customers and BEMS as well as BEMS and utility server. During monitoring it distinguish the licensed user or malicious attacker to detect and prevent possible internal and/or external intrusions in the communication channel. Results show that EMS reduces energy cost and emission in addition to cyber security from internal threats. Proposed two-cored control may be manufactured for utilities to realize its benefits for industrial customers in a smart energy distribution system. Keywords: Demand Response, Energy Management System, Flower
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Krupa, Joel. "Energy security in China: Emerging perspectives." Utilities Policy 25 (June 2013): 10–11. http://dx.doi.org/10.1016/j.jup.2013.01.001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Thamrin, Suyono, Rita Ambarwati, and Syaiful Hidayat. "THE STRATEGIES OF WEST JAVA’S REGIONAL ENERGY MANAGEMENT TO SUPPORT NATIONAL ENERGY SECURITY." International Journal of Energy Economics and Policy 10, no. 6 (October 10, 2020): 376–82. http://dx.doi.org/10.32479/ijeep.10259.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Guta, Dawit, and Jan Börner. "Energy security, uncertainty and energy resource use options in Ethiopia." International Journal of Energy Sector Management 11, no. 1 (April 3, 2017): 91–117. http://dx.doi.org/10.1108/ijesm-04-2015-0005.

Повний текст джерела
Анотація:
Purpose Ethiopia’s energy sector faces critical challenges to meeting steadily increasing energy demand given limited infrastructure, heavy reliance on hydroelectric power and underdevelopment of alternative energy resources. The purpose of this paper was to identify optimal least cost investment decisions for integrated energy source diversification. The authors seek to contribute to the relevant literature by paying particular attention to the role of public policy for promoting renewable energy investment and to better understand future energy security implications of various sources of uncertainty. Design/methodology/approach The authors created a dynamic linear programming model using General Algebraic Modelling System software to explore the national energy security implications of uncertainties associated with increasing technological advances and efficiency, and climate change scenarios. Findings To cope with the impacts of drought expected from future climate change on hydroelectric power production, Ethiopia would need to invest in the development of alternative energy resources. Such investment would not only enhance the sustainability and reliability of energy production but also increase costs. Greater rates of technological and efficiency innovations, however, were found to improve electricity diversification and reduce production costs and shadow prices or resource scarcity, and are thus key for enhancing energy security and reducing the risks posed by drought. Originality/value The dynamic linear programming model by the authors represents a flexible sector modelling tool for exploring the sustainability and efficiency of energy resource development pathways and evaluating the effects of different sources of uncertainty on the energy sector.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Atkinson, Christopher L. "The Governance of Energy Megaprojects: Politics, Hubris and Energy Security." Journal of Environmental Policy & Planning 17, no. 2 (June 18, 2014): 296–99. http://dx.doi.org/10.1080/1523908x.2014.919219.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Eaves, James, and Stephen Eaves. "Renewable corn-ethanol and energy security." Energy Policy 35, no. 11 (November 2007): 5958–63. http://dx.doi.org/10.1016/j.enpol.2007.06.026.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
28

de Carmoy, Guy. "Energy security in the industrialized world." Energy Policy 14, no. 4 (August 1986): 292–96. http://dx.doi.org/10.1016/0301-4215(86)90103-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Wu, Kang. "China׳s energy security: Oil and gas." Energy Policy 73 (October 2014): 4–11. http://dx.doi.org/10.1016/j.enpol.2014.05.040.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Lyaskovskaya, E. A., G. A. Vlasova, and M. R. Kurbangaliev. "STRATEGIC ENERGY MANAGEMENT AND SOCIAL SECURITY PROBLEMS OF ENTERPRISE SYSTEMS." VESTNIK OF THE BASHKIR STATE AGRARIAN UNIVERSITY 43, no. 3 (September 18, 2017): 124–31. http://dx.doi.org/10.31563/1684-7628-2017-43-3-124-131.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Plėta, Tomas, Manuela Tvaronavičienė, and Silvia Della Casa. "Cyber effect and security management aspects in critical energy infrastructures." Insights into Regional Development 2, no. 2 (June 30, 2020): 538–48. http://dx.doi.org/10.9770/ird.2020.2.2(3).

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Tung, Yi-Ti, and Tzu-Yi Pai. "Water Management for Agriculture, Energy, and Social Security in Taiwan." CLEAN - Soil, Air, Water 43, no. 5 (April 23, 2014): 627–32. http://dx.doi.org/10.1002/clen.201300275.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Pelletier, N., J. André, A. Charef, D. Damalas, B. Green, R. Parker, R. Sumaila, G. Thomas, R. Tobin, and R. Watson. "Energy prices and seafood security." Global Environmental Change 24 (January 2014): 30–41. http://dx.doi.org/10.1016/j.gloenvcha.2013.11.014.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Belokurov, Sergey, Alexei Skrypnikov, Oleg Kondratov, Dmitry Levushkin, and Oleg Tveritnev. "Increasing the energy efficiency of electronic document management systems." E3S Web of Conferences 279 (2021): 03029. http://dx.doi.org/10.1051/e3sconf/202127903029.

Повний текст джерела
Анотація:
This paper proposes a comprehensive set of characteristics of integrated security systems of electronic document management. We give a classification description and data analysis for modeling decision-making processes in integrated security systems by the example of responding to the threats of information leakage through parametric channels. The optimal set of measures to respond to an attacker’s operations of illegal interception of information via parametric channels by using the appropriate modes of operation of the TCP protocol, which reduces the decision-making time, optimizes the performance of the system as a whole and significantly contributes to the optimization of its energy efficiency is given.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Bui, Tat Dat, and Ming-Lang Tseng. "A Data-Driven Analysis on Sustainable Energy Security." Journal of Global Information Management 30, no. 6 (September 2022): 1–38. http://dx.doi.org/10.4018/jgim.287608.

Повний текст джерела
Анотація:
This study provides a data-driven analysis that illustrates a clear renewable energy depiction in sustainable energy security and unveils the regional issues due to the literature solely occupies energy security concept in the descriptions view, and renewable energy differences related to regions are rarely discussed. A hybrid method is proposed to valid those indicators and shows the trend of future studies. This study enriches the challenges and opportunities by contributing to understand the fundamental knowledge of renewable energy in sustainable energy security frontier, conveyance directions for future study and investigation, and assessment on global renewable energy position and regional disparities. There are valid 19 indicators, in which energy demand, energy policy, renewable resources, smart grid, and uncertainty representing the future trends. World regional comparison includes 115 countries/territories and categorized into five geographical regions. The result shows that those indicators have addressed different issues in the world regional comparison.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Nolan, Peter, Alan Shipman, and Huaichuan Rui. "Coal Liquefaction, Shenhua Group, and China’s Energy Security." European Management Journal 22, no. 2 (April 2004): 150–64. http://dx.doi.org/10.1016/j.emj.2004.01.014.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Powroźnik, Piotr, Robert Szulim, Wiesław Miczulski, and Krzysztof Piotrowski. "Household Energy Management." Applied Sciences 11, no. 4 (February 11, 2021): 1626. http://dx.doi.org/10.3390/app11041626.

Повний текст джерела
Анотація:
Ensuring flexibility and security in power systems requires the use of appropriate management measures on the demand side. The article presents the results of work related to energy management in households in which renewable energy sources (RES) can be installed. The main part of the article is about the developed elastic energy management algorithm (EEM), consisting of two algorithms, EEM1 and EEM2. The EEM1 algorithm is activated in time periods with a higher energy price. Its purpose is to reduce the power consumed by the appliances to the level defined by the consumer. In contrast, the EEM2 algorithm is run by the Distribution System Operator (DSO) when peak demand occurs. Its purpose is to reduce the power of appliances in a specified time period to the level defined by the DSO. The optimization tasks in both algorithms are based on the Greedy Randomized Adaptive Search Procedure (GRASP) metaheuristic algorithm. The EEM1 and EEM2 algorithms also provide energy consumer comfort. For this purpose, both algorithms take into account the smart appliance parameters proposed in the article: sections of the working devices, power reduction levels, priorities and enablingof time shifting devices. The EEM algorithm in its operation also takes into account the information about the production of power, e.g., generated by the photovoltaic systems. On this basis, it makes decisions on the control of smart appliances. The EEM algorithm also enables inverter control to limit the power transferred from the photovoltaic system to the energy system. Such action is taken on the basis of the DSO request containing the information on the power limits. Such a structure of EEM enables the balancing of energy demand and supply. The possibility of peak demand phenomenon will be reduced. The simulation and experiment results presented in the paper confirmed the rationality and effectiveness of the EEM algorithm.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Cai, Tianxing. "Energy Infrastructure Security in the Digital Age." International Journal of Public Administration in the Digital Age 5, no. 2 (April 2018): 12–22. http://dx.doi.org/10.4018/ijpada.2018040102.

Повний текст джерела
Анотація:
In this article, the current application of information technology in the energy infrastructure security will be introduced. The digital system can help us to identify the framework of energy infrastructure security, characterize the energy network, generate the strategy of self-recovery and handle the uncertainty of identified damage. It will also integrate the comprehensive evaluation of population distribution, roadway safety, the constraint of transportation routes, transportation capacity and capability for the optimal emergency response planning with the minimal potential impact to the community for the management of intelligent and secure energy infrastructure.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Deng, Haifeng, and Paolo Davide Farah. "China’s energy policies and strategies for climate change and energy security." Journal of World Energy Law & Business 13, no. 2 (April 1, 2020): 141–56. http://dx.doi.org/10.1093/jwelb/jwaa018.

Повний текст джерела
Анотація:
Abstract National energy security, parallel with the ultimate goal of emissions reductions, is of utmost priority for the Chinese government. In order to comply with the requirements set by the Kyoto Protocol, the Chinese government announced, on 25 November 2009, that 2020’s CO2 emissions would be reduced by 40–45 per cent in accordance with the data collected from 2005. Said goal was met three years ahead of schedule. Even in light of such an accomplishment, however, commentators suggest that the overall nationally determined contributions (NDCs) made by the Parties belonging to the Paris agreement are not enough to reduce global warming by even 2°C. This article focuses on the concept of energy security in assessing whether, and how, the priorities related to climate change are gradually changing. After analysing climate change’s impact on China, conducted via an analysis of the study’s available literature and through the support of international data, this article mainly focuses on the concept of energy security, itself. Under the second section, based on the examination of China’s efforts to transition towards a low-carbon economy, the authors provide a holistic definition of energy security through the lens of three dimensions: energy supply security, energy economy and energy ecological security. The third section, in turn, addresses the relationship between energy security and climate change. The results presented in the conclusion insist that, in order to strengthen environmental protection in China, it is crucial to reform the highly inefficient and strictly regulated national energy market. In doing so, China’s transition to a low-carbon society and economy could prove less painful, as China’s available resources offer the potential for a strengthened ecological dimension and sustained socio-economic development.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Hamadaqa, Emad, Ayoub Mars, and Wael Adi. "Physical Security for Fleet Management Systems." Cryptography 4, no. 1 (December 31, 2019): 1. http://dx.doi.org/10.3390/cryptography4010001.

Повний текст джерела
Анотація:
Fleet Management (FM) deals with the management of transport, distribution, and logistics of national and international goods exchange, in which many operators worldwide are involved. Fleet management involves many security-relevant participating entities, such as vehicles, FM mobile clients, smart trackers with goods, drivers, etc. Existing automated fleet management systems are basically vulnerable to physical replacement attacks when managed by mass-produced electronic identities. Analog Physical Unclonable Functions (PUFs) failed to serve as unclonable electronic identities due to being costly, unstable and inefficient for such mass-usage. We propose in this paper to deploy the Secret Unknown Ciphers (SUCs) techniques introduced a decade ago as digital low-cost clone-resistant identities to be embedded in selected participating electronic Fleet Management System (FMS) units. SUCs, as stable self-created digital modules to be embedded in future smart non-volatile (NV)-FPGA devices, are expected to cover all emerging FMS physical security requirements. Such information-retaining units (when switched-off) are emerging to become widely used as ultra-low-power mass-products in automotive environment. We propose a new FMS security architecture based on embedding SUC modules in each security-relevant entity in the FMS such as vehicles, mobile clients, smart trackers and goods. This paper investigates the expected technical impacts when using SUCs technology as physical security anchors in a standard FMS configuration. Several SUC-related generic security protocols adapted to the FM environment show how to securely-link tracing of goods, tracks routing, and personnel in such FM system. It is also shown how to combine other biometric fingerprints to simplify personal liability and enhance the security management in such globally-operating automated procedures. The presented security analysis of the resulting FMS shows that the major security concerns in existing FMSs can be resolved. One major advantage of SUC technique, is that device-manufacturers can be largely-excluded as security players. The FPGA technology required for the SUC solution is currently not available and is thought for future use. The concept is ultimately applicable if the future electronic mass products would deploy self-reconfiguring non-volatile (flash-based) System on Chip smart units. Such units are expected to dominate future Internet of Things (IoT) ultra-low-energy applications, as power-off does not lose any information. The proposed SUC strategy is highly flexible, scalable, and applicable to cover a large class of globally operating protection mechanisms similar to those of the addressed FMS scenarios.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Rajavuori, Mikko, and Kaisa Huhta. "Investment screening: Implications for the energy sector and energy security." Energy Policy 144 (September 2020): 111646. http://dx.doi.org/10.1016/j.enpol.2020.111646.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Gunatilake, Herath, David Roland-Holst, and Guntur Sugiyarto. "Energy security for India: Biofuels, energy efficiency and food productivity." Energy Policy 65 (February 2014): 761–67. http://dx.doi.org/10.1016/j.enpol.2013.10.050.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Diop, Abdoulaye, Yue Qi, and Qin Wang. "A Novel Key Management Scheme for Cluster Based Wireless Sensors Networks." Advanced Materials Research 846-847 (November 2013): 864–68. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.864.

Повний текст джерела
Анотація:
WSN comprise of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints, complex security algorithms cannot be used in sensor networks. Therefore, it is necessary to well balance between the security level and the associated energy consumption overhead to mitigate the security risks. In this paper, we present A Novel Key Management Scheme for Cluster Based Wireless Sensors Networks (NKMS). The security analysis demonstrates that NKMS is an effective solution to the key management of cluster based wireless sensor networks.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Bambawale, Malavika Jain, and Benjamin K. Sovacool. "China’s energy security: The perspective of energy users." Applied Energy 88, no. 5 (May 2011): 1949–56. http://dx.doi.org/10.1016/j.apenergy.2010.12.016.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Labandeira, Xavier, and Baltazar Manzano. "Some Economic Aspects of Energy Security." EUROPEAN RESEARCH STUDIES JOURNAL XV, Issue 4 (November 1, 2012): 47–64. http://dx.doi.org/10.35808/ersj/371.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Kuzemko, Caroline. "Politicising UK energy: what 'speaking energy security' can do." Policy & Politics 42, no. 2 (April 1, 2014): 259–74. http://dx.doi.org/10.1332/030557312x655990.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Muzzammel, Raheel, Rabia Arshad, Saba Mehmood, and Danista Khan. "Advanced energy management system with the incorporation of novel security features." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (August 1, 2020): 3978. http://dx.doi.org/10.11591/ijece.v10i4.pp3978-3987.

Повний текст джерела
Анотація:
Nowadays, energy management is a subject of great importance and complexity. Pakistan, being in a state of developing country, generates electrical power mainly by using non-renewable sources of energy. Non-renewable entities are fossil fuels such as furnace oil, natural gas, coal, and nuclear power. Pakistan has been facing a severe shortage of production in energy sector for last two decades. This shortfall is affecting the industrial development as well as economic growth. With the growing population, the load demand is rapidly increasing and there must be a need to expand the existing ones or to build new power systems. In this paper, an autonomous management system has been proposed to enhance quality, reliability and confidence of utilization of energy between end consumers and suppliers. Such objectives can only be fulfilled by making the power supply secure for end consumers. Distributed and centralized control systems are involved for maintaining a balance between renewable energy resources and base power, so that end consumers demand can be fulfilled when required. A reliable Two-way communication system between suppliers and end consumers has been proposed by using Message Digest algorithm which ensures that there would be no energy theft. Simulations have been done in MATLAB/ Simulink environment and results have been presented to show the effectiveness of the proposed model.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Azhar, Muhamad, and Dendy Adam Satriawan. "Implementasi Kebijakan Energi Baru dan Energi Terbarukan Dalam Rangka Ketahanan Energi Nasional." Administrative Law and Governance Journal 1, no. 4 (November 30, 2018): 398–412. http://dx.doi.org/10.14710/alj.v1i4.398-412.

Повний текст джерела
Анотація:
AbstractThis study aims to determine the implementation of new energy and renewable energy policies in the context of national energy security. The research method used is legal research that uses a regulatory approach. The results of the study show that the implementation of new energy and renewable energy policies in the context of national energy security has proceeded as it should. This can be seen from the role of the government in making policies (beleid) and management actions (bestuursdaad), arrangements (regelendaad), management (beheersdaad) and supervision (toezichthoudensdaad) for the purpose of maximizing the people's prosperity. Keywords: Energy Policy, Renewable Energy, National Energy SecurityAbstrakPenelitian ini bertujuan untuk mengetahui Implementasi kebijakan energi baru dan energi terbarukan dalam rangka ketahanan energy nasional. Metode penelitian yang diguankan adalah penelitian hukum yang menggunakan pendekatan peraturan perundang-undangan. Hasil penelitian menunjukan bahwa Implementasi kebijakan energi baru dan energi terbarukan dalam rangka ketahanan energy nasional telah berjalan sebagaimana mestinya. Hal tersebut dapat dilihat dari dari peran pemerintah untuk mengadakan kebijakan (beleid) dan tindakan pengurusan (bestuursdaad), pengaturan (regelendaad), pengelolaan (beheersdaad) dan pengawasan (toezichthoudensdaad) untuk tujuan sebesar-besarnya kemakmuran rakyat.Kata kunci: Kebijakan Energi, Energy Terbarukan, Ketahanan Energi Nasional
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Pysar, Nadiia, Viktoriia Chornii, Andriy Bandura, and Yevgen Khlobystov. "Methods for estimating “Fuel poverty” in public administration and management systems." Problems and Perspectives in Management 16, no. 2 (June 13, 2018): 341–52. http://dx.doi.org/10.21511/ppm.16(2).2018.31.

Повний текст джерела
Анотація:
The Ukrainian energy market has been analyzed region-wise in terms of consumption of fuel and energy resources by household sector. Critical aspects of improving energy security have been reflected in the context of the use of energy resources. The principal directions of the socially responsible market economy system have been offered in the light of the country’s economic security in terms of overcoming “fuel poverty”. Cognitive features of the “fuel poverty” phenomenon have been defined. Mathematical modeling of the “fuel poverty” index has been carried out using the following approaches: “after fuel cost poverty”; energy expenditure above 10% of disposable income; the Low Income – High Costs, where households with relatively high energy costs and low income are emphasized. A model of the final calculation of household energy costs has been developed for the purpose of optimal management. The graphical abstract of the obtained “fuel poverty” index solutions has been presented, with the upper left corner – low income – high costs – serving as a critical zone. The block diagram of improving the socially responsible market economy system in the light of overcoming “fuel poverty” has been offered.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Huntington, Hillard G., and Stephen P. A. Brown. "Energy security and global climate change mitigation." Energy Policy 32, no. 6 (April 2004): 715–18. http://dx.doi.org/10.1016/s0301-4215(03)00105-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії