2016-10-28
assumptions. List of Assumptions: Price of electrical energy : $0.07/kWh flat rate for energy at the base Price of peak power: $15/MW peak power...EW-201147) Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy Security, and...12-C-0002 5b. GRANT NUMBER Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy
Global renewable energy-based electricity generation and smart grid system for energy security.
Islam, M A; Hasanuzzaman, M; Rahim, N A; Nahar, A; Hosenuzzaman, M
2014-01-01
Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration.
Global Renewable Energy-Based Electricity Generation and Smart Grid System for Energy Security
Islam, M. A.; Hasanuzzaman, M.; Rahim, N. A.; Nahar, A.; Hosenuzzaman, M.
2014-01-01
Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration. PMID:25243201
An Energy Efficient Protocol For The Internet Of Things
NASA Astrophysics Data System (ADS)
Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas
2015-01-01
The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.
P.L. 110-140, "Energy Independence and Security Act of 2007", 2007
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-19
The Energy Independence and Security Act of 2007 (EISA), signed into law on December 19, 2007, set forth an agenda for improving U.S. energy security across the entire economy. While industrial energy efficiency is specifically called out in Title IV, Subtitle D, other EISA provisions also apply to AMO activities.
Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H
2014-03-28
High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.
Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae
2015-06-26
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation
Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae
2015-01-01
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both. PMID:26131669
Transportation Energy Security and Climate Change Mitigation Act of 2007
DOT National Transportation Integrated Search
2008-09-29
The Committee on Transportation and Infrastructure, to whom was referred the bill (H.R. 2701) to strengthen our Nations energy security and mitigate the effects of climate change by promoting energy efficient transportation and public buildings, c...
Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
2008-01-01
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully. PMID:27873956
Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
2008-12-03
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODE plus . It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODE plus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.
Hydrogen applications for Lambert-St. Louis International Airport
DOT National Transportation Integrated Search
2009-01-01
Today, major airports are facing challenges related to pollution, energy efficiency, and safety and security. Hydrogen and fuel cell technologies, regarded as one of the key energy solutions of the 21st century are more energy efficient and reliable ...
Navy Ship Propulsion Technologies: Options for Reducing Oil Use - Background for Congress
2006-12-11
Change, Energy Efficiency, and Ozone Protection, Protecting National Security and the Environment. Washington, 2000. (Office of the Deputy Under...Shipboard Fuel Consumption and Emissions,” op. cit., and Climate Change, Energy Efficiency, and Ozone Protection, Protecting National Security and the...with the SkySails technology trouble-free.74 CRS-28 75 “The Economic and Sustainable Utilisation in the Cargo Shipping Industry of Wind Power,” HSB
Industrial Technologies Program - A Clean, Secure Energy Future via Industrial Energy Efficiency
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
The Industrial Technologies Program (ITP) leads the national effort to save energy and reduce greenhouse gas emissions in the largest energy-using sector of the U.S. economy. ITP drives energy efficiency improvements and carbon dioxide reductions throughout the manufacturing supply chain, helping develop and deploy innovative technologies that transform the way industry uses energy.
Pirbhulal, Sandeep; Zhang, Heye; Mukhopadhyay, Subhas Chandra; Li, Chunyue; Wang, Yumei; Li, Guanglin; Wu, Wanqing; Zhang, Yuan-Ting
2015-01-01
Body Sensor Network (BSN) is a network of several associated sensor nodes on, inside or around the human body to monitor vital signals, such as, Electroencephalogram (EEG), Photoplethysmography (PPG), Electrocardiogram (ECG), etc. Each sensor node in BSN delivers major information; therefore, it is very significant to provide data confidentiality and security. All existing approaches to secure BSN are based on complex cryptographic key generation procedures, which not only demands high resource utilization and computation time, but also consumes large amount of energy, power and memory during data transmission. However, it is indispensable to put forward energy efficient and computationally less complex authentication technique for BSN. In this paper, a novel biometric-based algorithm is proposed, which utilizes Heart Rate Variability (HRV) for simple key generation process to secure BSN. Our proposed algorithm is compared with three data authentication techniques, namely Physiological Signal based Key Agreement (PSKA), Data Encryption Standard (DES) and Rivest Shamir Adleman (RSA). Simulation is performed in Matlab and results suggest that proposed algorithm is quite efficient in terms of transmission time utilization, average remaining energy and total power consumption. PMID:26131666
Pirbhulal, Sandeep; Zhang, Heye; Mukhopadhyay, Subhas Chandra; Li, Chunyue; Wang, Yumei; Li, Guanglin; Wu, Wanqing; Zhang, Yuan-Ting
2015-06-26
Body Sensor Network (BSN) is a network of several associated sensor nodes on, inside or around the human body to monitor vital signals, such as, Electroencephalogram (EEG), Photoplethysmography (PPG), Electrocardiogram (ECG), etc. Each sensor node in BSN delivers major information; therefore, it is very significant to provide data confidentiality and security. All existing approaches to secure BSN are based on complex cryptographic key generation procedures, which not only demands high resource utilization and computation time, but also consumes large amount of energy, power and memory during data transmission. However, it is indispensable to put forward energy efficient and computationally less complex authentication technique for BSN. In this paper, a novel biometric-based algorithm is proposed, which utilizes Heart Rate Variability (HRV) for simple key generation process to secure BSN. Our proposed algorithm is compared with three data authentication techniques, namely Physiological Signal based Key Agreement (PSKA), Data Encryption Standard (DES) and Rivest Shamir Adleman (RSA). Simulation is performed in Matlab and results suggest that proposed algorithm is quite efficient in terms of transmission time utilization, average remaining energy and total power consumption.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rubinstein, Francis M.
Specific recommendations are made to improve the lighting quality and energy efficiency of the lighting system at the Social Security Administration Frank Hagel Building in Richmond, CA. The main recommendation is to replace the recessed fluorescent lighting system in the general office area with indirect lighting. Indirect lighting will improve lighting quality, will provide an energy efficient solution and will be about the same cost as the direct lighting system originally proposed.
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network.
Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing
2016-12-30
Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods.
A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network
Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing
2016-01-01
Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods. PMID:28042831
P.L. 110-140, "Energy Independence and Security Act of 2007" (2007)
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-13
An act to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kandt, Alicen J.; Kiatreungwattana, Kosol
This report summarizes the results from an energy efficiency, water efficiency, and renewable energy site assessment of the Dolores Ranger District in the San Juan National Forest in Colorado. A team led by the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) conducted the assessment with United States Forest Service (USFS) personnel on August 16-17, 2016, as part of ongoing efforts by USFS to reduce energy and water use and implement renewable energy technologies. The assessment is approximately an American Society of Heating, Refrigerating, and Air-Conditioning Engineers Level 2 audit and meets Energy Independence and Security Act requirements.
Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks.
Zhang, Guomei; Sun, Hao
2016-12-16
We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor's reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured.
Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks
Zhang, Guomei; Sun, Hao
2016-01-01
We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor’s reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured. PMID:27999282
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
The Office of Energy Efficiency and Renewable Energy (EERE) is involved in a variety of international initiatives, partnerships, and events that promote greater understanding and use of renewable energy (RE) and energy efficiency (EE) worldwide. In support of the Energy and Climate Partnership of the Americas (ECPA), EERE is working with several Latin American countries to advance EE and RE deployment for economic growth, energy security, poverty relief, and disaster recovery goals. This fact sheet highlights those activities.
Energy Market and Economic Impacts of S.2191, the Lieberman-Warner Climate Security Act of 2007
2008-01-01
This report responds to a request from Senators Lieberman and Warner for an analysis of S.2191, the Lieberman-Warner Climate Security Act of 2007. S.2191 is a complex bill regulating emissions of greenhouse gases through market- based mechanisms, energy efficiency programs, and economic incentives.
Jogenfors, Jonathan; Elhassan, Ashraf Mohamed; Ahrens, Johan; Bourennane, Mohamed; Larsson, Jan-Åke
2015-12-01
Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson's configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type.
48 CFR 3023.9000 - Contract clause (USCG).
Code of Federal Regulations, 2014 CFR
2014-10-01
..., HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SOCIOECONOMIC PROGRAMS ENVIRONMENT, ENERGY AND WATER EFFICIENCY, RENEWABLE ENERGY TECHNOLOGIES, OCCUPATIONAL SAFETY, AND DRUG-FREE WORKPLACE Safety Requirements...
NASA technology utilization house
NASA Technical Reports Server (NTRS)
1977-01-01
Following systems and features, which are predicted to save approximately $20,000 in utility costs over twenty year period, are incorporated into single-level, contemporarily designed, energy efficient residential structure: solar heating and cooling; energy efficient appliances; water recycling; security, smoke, and tornado detectors; and flat conductor electrical wiring.
Energy Efficiency and Renewables: Market and Behavioral Failures
James Sweeney
2017-12-09
Thursday, January 28, 2010: Policies to promote renewable energy and energy efficiency have been gaining momentum throughout the world, often justified by environmental and energy security concerns. This presentation first talks about energy efficiency options, then delves into the economic motivation for energy efficiency and renewable energy policies by articulating the classes of relevant behavioral failures and market failures. Such behavioral and market failures may vary intertemporally or atemporally; the temporal structure and the extent of the failures are the critical considerations in the development of energy policies. The talk discusses key policy instruments and assess the extent to which they are well-suited to correct for failures with different structures. http://eetd.lbl.gov/dls/lecture-01-28...
SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks
NASA Astrophysics Data System (ADS)
Hung, Lexuan; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that the sensor network can establish and maintain a secure multi-hop path between a source node and a mobile sink. This causes significant computation and communication overhead for sensor nodes. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. In this paper, we propose a secure and energy-efficient data dissemination protocol — Secure COodination-based Data dissEmination (SCODE) — for mobile sinks in sensor networks. We take advantages of coordination networks (grid structure) based on Geographical Adaptive Fidelity (GAF) protocol to construct a secure and efficient routing path between sources and sinks. Our security analysis demonstrates that the proposed protocol can defend against common attacks in sensor network routing such as replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Our performance evaluation both in mathematical analysis and simulation shows that the SCODE significantly reduces communication overhead and energy consumption while the latency is similar compared with the existing routing protocols, and it always delivers more than 90 percentage of packets successfully.
Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks
Paramasivan, B.; Kaliappan, M.
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP. PMID:25143986
Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.
Paramasivan, B; Kaliappan, M
2014-01-01
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.
Audit of the management and cost of the Department of Energy`s protective forces
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1994-07-01
The Department of Energy`s safeguards and security program is designed to provide appropriate, efficient, and effective protection of the Department`s nuclear weapons, nuclear materials, facilities, and classified information. These items must be protected against theft, sabotage, espionage, and terrorist activity, with continuing emphasis on protection against the insider threat. The purpose of the audit was to determine if protective forces were efficiently managed and appropriately sized in light of the changing missions and current budget constraints. The authors found that the cost of physical security at some sites had grown beyond those costs incurred when the site was in fullmore » production. This increase was due to a combination of factors, including concerns about the adequacy of physical security, reactions to the increase in terrorism in the early 1980s with the possibility of hostile attacks, and the selection of security system upgrades without adequate consideration of cost effectiveness. Ongoing projects to upgrade security systems were not promptly reassessed when missions changed and levels of protection were not determined in a way which considered the attractiveness of the material being protected. The authors also noted several opportunities for the Department to improve the operational efficiency of its protective force operations, including, eluminating overtime paid to officers prior to completion of the basic 40-hour workweek, paying hourly wages of unarmed guards which are commensurate with their duties, consolidating protective force units, transferring law enforcement duties to local law agencies, eliminating or reducing paid time to exercise, and standardizing supplies and equipment used by protective force members.« less
Energy Market and Economic Impacts of H.R. 2454, the American Clean Energy and Security Act of 2009
2009-01-01
This report responds to a request from Chairman Henry Waxman and Chairman Edward Markey for an analysis of H.R. 2454, the American Clean Energy and Security Act of 2009 (ACESA). ACESA, as passed by the House of Representatives on June 26, 2009, is a complex bill that regulates emissions of greenhouse gases through market-based mechanisms, efficiency programs, and economic incentives.
The Sustainable Energy Utility (SEU) Model for Energy Service Delivery
ERIC Educational Resources Information Center
Houck, Jason; Rickerson, Wilson
2009-01-01
Climate change, energy price spikes, and concerns about energy security have reignited interest in state and local efforts to promote end-use energy efficiency, customer-sited renewable energy, and energy conservation. Government agencies and utilities have historically designed and administered such demand-side measures, but innovative…
Microgrid Study: Energy Security for DoD Installations
2012-06-18
security, efficiency, and the incorporation of renewable and distributed energy resources into microgrids, as well as the factors that might facilitate...better understand how different environmental factors affected the choice of optimal microgrid architecture. Environmental factors in this context...lower costs—Networking generation assets allow for load sharing, allowing fewer generators to run at higher load factors and therefore with greater
A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET
Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei
2017-01-01
Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV. PMID:28629142
A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.
Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei
2017-06-17
Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
The report is an overview of electric energy efficiency programs. It takes a concise look at what states are doing to encourage energy efficiency and how it impacts electric utilities. Energy efficiency programs began to be offered by utilities as a response to the energy crises of the 1970s. These regulatory-driven programs peaked in the early-1990s and then tapered off as deregulation took hold. Today, rising electricity prices, environmental concerns, and national security issues have renewed interest in increasing energy efficiency as an alternative to additional supply. In response, new methods for administering, managing, and delivering energy efficiency programs aremore » being implemented. Topics covered in the report include: Analysis of the benefits of energy efficiency and key methods for achieving energy efficiency; evaluation of the business drivers spurring increased energy efficiency; Discussion of the major barriers to expanding energy efficiency programs; evaluation of the economic impacts of energy efficiency; discussion of the history of electric utility energy efficiency efforts; analysis of the impact of energy efficiency on utility profits and methods for protecting profitability; Discussion of non-utility management of energy efficiency programs; evaluation of major methods to spur energy efficiency - systems benefit charges, resource planning, and resource standards; and, analysis of the alternatives for encouraging customer participation in energy efficiency programs.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Salasovich, James; LoVullo, David; Kandt, Alicen
This report summarizes results from the energy efficiency, water efficiency, and renewable energy site assessment of the Mendenhall Glacier Visitor Center and site in Juneau, Alaska. The assessment is an American Society of Heating, Refrigerating, and Air-Conditioning Engineers Level 2 audit and meets Energy Independence and Security Act requirements. A team led by the U.S. Department of Energy's National Renewable Energy Laboratory conducted the assessment with U.S. Forest Service personnel August 19-20, 2015, as part of ongoing efforts by USFS to reduce energy and water use.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-01
... consider other forms of renewable energy. The purpose of the proposed action is to reduce dependency on fossil fuels and increase energy security and efficiency through development of small-scale wind energy...
NASA Astrophysics Data System (ADS)
Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.
2016-03-01
Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhou, Nan; Romankiewicz, John; Vine, Edward
2012-12-15
In recent years, the number of energy efficiency policies implemented has grown very rapidly as energy security and climate change have become top policy issues for many governments around the world. Within the sphere of energy efficiency policy, governments (federal and local), electric utilities, and other types of businesses and institutions are implementing a wide variety of programs to spread energy efficiency practices in industry, buildings, transport, and electricity. As programs proliferate, there is an administrative and business imperative to evaluate the savings and processes of these programs to ensure that program funds spent are indeed leading to a moremore » energy-efficient economy.« less
Crabtree, George
2018-01-12
The expected doubling of global energy demand by 2050 challenges our traditional patterns of energy production, distribution and use.  The continued use of fossil fuels raises concerns about supply, security, environment and climate. New routes are needed for the efficient conversion of energy from chemical fuel, sunlight, and heat to electricity or hydrogen as an energy carrier and finally to end uses like transportation, lighting, and heating. Opportunities for efficient new energy conversion routes based on nanoscale materials will be presented, with emphasis on the sustainable energy technologies they enable.
State Energy Program Results: More Projects That Work
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1998-12-01
A Summary of Success stories of the State Energy Programs. The goal of the State Energy Program is to strengthen the capabilities of States to promote energy efficiency and to adopt renewable energy technologies, thereby helping the nation save energy and realize a stronger economy, cleaner environment, and a more secure future.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
To meet the U.S. Navy's energy goals, the National Renewable Energy Laboratory (NREL) and the Naval Facilities Engineering Command (NAVFAC) spent two years collaborating on demonstrations that tested market-ready energy efficiency measures, renewable energy generation, and energy systems integration. One such technology - an energy management system - was identified as a promising method for reducing energy use and costs, and can contribute to increasing energy security.
ERIC Educational Resources Information Center
Cook, Emma
2011-01-01
Increased energy efficiency and reduced reliance on fossil fuels are both essential if people are to have any chance of avoiding escalating energy prices and the grim reality of catastrophic climate change. By increasing the diversity of energy sources people can also achieve increased security, reducing their dependence on imports. As…
A secure cluster-based multipath routing protocol for WMSNs.
Almalkawi, Islam T; Zapata, Manel Guerrero; Al-Karaki, Jamal N
2011-01-01
The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.
A Secure Cluster-Based Multipath Routing Protocol for WMSNs
Almalkawi, Islam T.; Zapata, Manel Guerrero; Al-Karaki, Jamal N.
2011-01-01
The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images) as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature) in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption. PMID:22163854
Targeting Net Zero Energy at Marine Corps Base Hawaii, Kaneohe Bay: Preprint
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burman, K.; Kandt, A.; Lisell, L.
2012-05-01
This paper summarizes the results of an NREL assessment of Marine Corps Base Hawaii (MCBH), Kaneohe Bay to appraise the potential of achieving net zero energy status through energy efficiency, renewable energy, and hydrogen vehicle integration. In 2008, the U.S. Department of Defense's U.S. Pacific Command partnered with the U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL) to assess opportunities for increasing energy security through renewable energy and energy efficiency at Hawaii military installations. DOE selected Marine Corps Base Hawaii (MCBH), Kaneohe Bay, to receive technical support for net zero energy assessment and planning funded through the Hawaiimore » Clean Energy Initiative (HCEI). NREL performed a comprehensive assessment to appraise the potential of MCBH Kaneohe Bay to achieve net zero energy status through energy efficiency, renewable energy, and hydrogen vehicle integration. This paper summarizes the results of the assessment and provides energy recommendations. The analysis shows that MCBH Kaneohe Bay has the potential to make significant progress toward becoming a net zero installation. Wind, solar photovoltaics, solar hot water, and hydrogen production were assessed, as well as energy efficiency technologies. Deploying wind turbines is the most cost-effective energy production measure. If the identified energy projects and savings measures are implemented, the base will achieve a 96% site Btu reduction and a 99% source Btu reduction. Using excess wind and solar energy to produce hydrogen for a fleet and fuel cells could significantly reduce energy use and potentially bring MCBH Kaneohe Bay to net zero. Further analysis with an environmental impact and interconnection study will need to be completed. By achieving net zero status, the base will set an example for other military installations, provide environmental benefits, reduce costs, increase energy security, and exceed its energy goals and mandates.« less
Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective
NASA Astrophysics Data System (ADS)
Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha
2017-07-01
Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.
Multi-Layer Approach for the Detection of Selective Forwarding Attacks
Alajmi, Naser; Elleithy, Khaled
2015-01-01
Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499
Multi-Layer Approach for the Detection of Selective Forwarding Attacks.
Alajmi, Naser; Elleithy, Khaled
2015-11-19
Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.
Secure and Authenticated Data Communication in Wireless Sensor Networks.
Alfandi, Omar; Bochem, Arne; Kellner, Ansgar; Göge, Christian; Hogrefe, Dieter
2015-08-10
Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes.
Secure and Authenticated Data Communication in Wireless Sensor Networks
Alfandi, Omar; Bochem, Arne; Kellner, Ansgar; Göge, Christian; Hogrefe, Dieter
2015-01-01
Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes. PMID:26266413
NASA Astrophysics Data System (ADS)
Lee, Hansang; Jung, Seungmin; Cho, Yoonsung; Yoon, Donghee; Jang, Gilsoo
2013-11-01
This paper proposes an application of the 100 kWh superconducting flywheel energy storage systems to reduce the peak power of the electric railway system. The electric railway systems have high-power characteristics and large amount of regenerative energy during vehicles’ braking. The high-power characteristic makes operating cost high as the system should guarantee the secure capacity of electrical equipment and the low utilization rate of regenerative energy limits the significant energy efficiency improvement. In this paper, it had been proved that the peak power reduction and energy efficiency improvement can be achieved by using 100 kWh superconducting flywheel energy storage systems with the optimally controlled charging or discharging operations. Also, economic benefits had been assessed.
Energy efficiency in buildings, industry and transportation
NASA Astrophysics Data System (ADS)
Milovanovic, Dobrica; Babic, Milun; Jovicic, Nebojsa; Gordic, Dusan
2012-11-01
This paper reviews the literature concerning the energy saving and outlines the importance of energy efficiency, particularly in three the most important areas: buildings, industry and transportation. Improving energy efficiency plays a crucial role in minimizing the societal and environmental impacts of economic growth and offers a powerful tool for achieving sustainable development by reducing the need for investment in new infrastructure, by cutting fuel costs, and by increasing competitiveness for businesses and welfare for consumers. It creates environmental benefits through reduced emissions of greenhouse gases and local air pollutants. It can offer social benefits in the form of increased energy security (through reduced dependence on fossil fuels, particularly when imported) and better energy services.
Federal roles to realize national energy-efficiency opportunities in the 1990s
NASA Astrophysics Data System (ADS)
Hirst, Eric
1989-10-01
Improving energy efficiency throughout the U.S. economy is a vital component of our nation's energy future, with many benefits. Improving efficiency can: save money consumers, increase economic productivity and international competitiveness, reduce oil and gas prices by reducing the demand for foreign oil, enhance national security by lowering oil imports, reduce the adverse environmental consequences of fuel cycles, especially acid rain and global warming, add diversity and flexibility to the nation's portfolio of energy resources, respond to public interest in, and support of, energy efficiency. The primary purpose of this report is to suggest expanded roles for the U.S. Department of Energy (DOE) in improving energy efficiency during the 1990s. In an ideal world, the normal workings of the market place would yield optimal energy-efficiency purchase and operating decisions. Unfortunately, distortions in fuel prices, limited access to capital, misplaced incentives, lack of information, and difficulty in processing information complicate energy-related decision making. Thus, consumers in all sectors of the economy underinvest in energy-efficient systems. These market barriers, coupled with growing concern about environmental quality, justify a larger Federal role.
Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines.
Mazur, Katarzyna; Wydra, Michal; Ksiezopolski, Bogdan
2017-07-11
Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs) as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Network (WSN) for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs.
Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines
Mazur, Katarzyna; Wydra, Michal; Ksiezopolski, Bogdan
2017-01-01
Existing transmission power grids suffer from high maintenance costs and scalability issues along with a lack of effective and secure system monitoring. To address these problems, we propose to use Wireless Sensor Networks (WSNs)as a technology to achieve energy efficient, reliable, and low-cost remote monitoring of transmission grids. With WSNs, smart grid enables both utilities and customers to monitor, predict and manage energy usage effectively and react to possible power grid disturbances in a timely manner. However, the increased application of WSNs also introduces new security challenges, especially related to privacy, connectivity, and security management, repeatedly causing unpredicted expenditures. Monitoring the status of the power system, a large amount of sensors generates massive amount of sensitive data. In order to build an effective Wireless Sensor Networks (WSNs) for a smart grid, we focus on designing a methodology of efficient and secure delivery of the data measured on transmission lines. We perform a set of simulations, in which we examine different routing algorithms, security mechanisms and WSN deployments in order to select the parameters that will not affect the delivery time but fulfill their role and ensure security at the same time. Furthermore, we analyze the optimal placement of direct wireless links, aiming at minimizing time delays, balancing network performance and decreasing deployment costs. PMID:28696390
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kumar, Dinesh; Thapliyal, Himanshu; Mohammad, Azhar
Differential Power Analysis (DPA) attack is considered to be a main threat while designing cryptographic processors. In cryptographic algorithms like DES and AES, S-Box is used to indeterminate the relationship between the keys and the cipher texts. However, S-box is prone to DPA attack due to its high power consumption. In this paper, we are implementing an energy-efficient 8-bit S-Box circuit using our proposed Symmetric Pass Gate Adiabatic Logic (SPGAL). SPGAL is energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. SPGAL is energy-efficient due to reduction of non-adiabatic loss during the evaluate phase of the outputs.more » Further, the S-Box circuit implemented using SPGAL is resistant to DPA attacks. The results are verified through SPICE simulations in 180nm technology. SPICE simulations show that the SPGAL based S-Box circuit saves upto 92% and 67% of energy as compared to the conventional CMOS and Secured Quasi-Adiabatic Logic (SQAL) based S-Box circuit. From the simulation results, it is evident that the SPGAL based circuits are energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. In nutshell, SPGAL based gates can be used to build secure hardware for lowpower portable electronic devices and Internet-of-Things (IoT) based electronic devices.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
As part of the U.S. Navy's overall energy strategy, the National Renewable Energy Laboratory (NREL) partnered with the Naval Facilities Engineering Command (NAVFAC) to demonstrate market-ready energy efficiency measures, renewable energy generation, and energy systems integration. One such technology - retrofitting rooftop air-conditioning units with an advanced rooftop control system - was identified as a promising source for reducing energy use and costs, and can contribute to increasing energy security.
Assurance of energy efficiency and data security for ECG transmission in BASNs.
Ma, Tao; Shrestha, Pradhumna Lal; Hempel, Michael; Peng, Dongming; Sharif, Hamid; Chen, Hsiao-Hwa
2012-04-01
With the technological advancement in body area sensor networks (BASNs), low cost high quality electrocardiographic (ECG) diagnosis systems have become important equipment for healthcare service providers. However, energy consumption and data security with ECG systems in BASNs are still two major challenges to tackle. In this study, we investigate the properties of compressed ECG data for energy saving as an effort to devise a selective encryption mechanism and a two-rate unequal error protection (UEP) scheme. The proposed selective encryption mechanism provides a simple and yet effective security solution for an ECG sensor-based communication platform, where only one percent of data is encrypted without compromising ECG data security. This part of the encrypted data is essential to ECG data quality due to its unequally important contribution to distortion reduction. The two-rate UEP scheme achieves a significant additional energy saving due to its unequal investment of communication energy to the outcomes of the selective encryption, and thus, it maintains a high ECG data transmission quality. Our results show the improvements in communication energy saving of about 40%, and demonstrate a higher transmission quality and security measured in terms of wavelet-based weighted percent root-mean-squared difference.
2016 National Algal Biofuels Technology Review
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barry, Amanda; Wolfe, Alexis; English, Christine
The Bioenergy Technologies Office (BETO) of the U.S. Department of Energy (DOE), Office of Energy Efficiency and Renewable Energy, is committed to advancing the vision of a viable, sustainable domestic biomass industry that produces renewable biofuels, bioproducts, and biopower; enhances U.S. energy security; reduces our dependence on fossil fuels; provides environmental benefits; and creates economic opportunities across the nation. BETO’s goals are driven by various federal policies and laws, including the Energy Independence and Security Act of 2007 (EISA). To accomplish its goals, BETO has undertaken a diverse portfolio of research, development, and demonstration (RD&D) activities, in partnership with nationalmore » laboratories, academia, and industry.« less
2016-2020 Strategic Plan and Implementing Framework
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2015-11-01
The 2016-2020 Strategic Plan and Implementing Framework from the Office of Energy Efficiency and Renewable Energy (EERE) is the blueprint for launching the nation’s leadership in the global clean energy economy. This document will guide the organization to build on decades of progress in powering our nation from clean, affordable and secure energy.
Materials for Sustainable Energy
NASA Astrophysics Data System (ADS)
Crabtree, George
2009-03-01
The global dependence on fossil fuels for energy is among the greatest challenges facing our economic, social and political future. The uncertainty in the cost and supply of oil threatens the global economy and energy security, the pollution of fossil combustion threatens human health, and the emission of greenhouse gases threatens global climate. Meeting the demand for double the current global energy use in the next 50 years without damaging our economy, security, environment or climate requires finding alternative sources of energy that are clean, abundant, accessible and sustainable. The transition to greater sustainability involves tapping unused energy flows such as sunlight and wind, producing electricity without carbon emissions from clean coal and high efficiency nuclear power plants, and using energy more efficiently in solid-state lighting, fuel cells and transportation based on plug-in hybrid and electric cars. Achieving these goals requires creating materials of increasing complexity and functionality to control the transformation of energy between light, electrons and chemical bonds. Challenges and opportunities for developing the complex materials and controlling the chemical changes that enable greater sustainability will be presented.
A review of integration strategies for solid oxide fuel cells
NASA Astrophysics Data System (ADS)
Zhang, Xiongwen; Chan, S. H.; Li, Guojun; Ho, H. K.; Li, Jun; Feng, Zhenping
Due to increasing oil and gas demand, the depletion of fossil resources, serious global warming, efficient energy systems and new energy conversion processes are urgently needed. Fuel cells and hybrid systems have emerged as advanced thermodynamic systems with great promise in achieving high energy/power efficiency with reduced environmental loads. In particular, due to the synergistic effect of using integrated solid oxide fuel cell (SOFC) and classical thermodynamic cycle technologies, the efficiency of the integrated system can be significantly improved. This paper reviews different concepts/strategies for SOFC-based integration systems, which are timely transformational energy-related technologies available to overcome the threats posed by climate change and energy security.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-15
... Draft PEA does not consider other forms of renewable energy. The purpose of the proposed action is to reduce dependency on fossil fuels and increase energy security and efficiency through development of...
Net carbon uptake by establishing biofuel crops in Central Illinois
USDA-ARS?s Scientific Manuscript database
Clean and renewable sources of energy as wind, solar or biofuels comprise a valuable set of options available to deal with the pressing topics of energy security and mitigation of climate change effects. However, the efficiency in energy conversion and the environmental impacts of each new source of...
The pressure cold wind system on the impact of industrial boiler economy and security
NASA Astrophysics Data System (ADS)
Li, Henan; Qian, Hongli; Jiang, Lei; Yu, Dekai; Li, Guannan; Yuan, Hong
2017-05-01
Industrial boiler is one of the most energy-consuming equipment in china, the annual consumption of energy accounts for about one-third of the national energy consumption.Industrial boiler in service at present have several severe problems such as small capacity, low efficiency, high energy consumption and causing severe pollution on environment, the average industrial boiler operation efficiency is only 65%. If the efficiency increased by 15% ∼ 20%, which meet the international advanced level, each year 70 million tons of coal saving and reduce environmental pollution[1]. As energy conservation and emissions reduction becomes the basic national policy of our country, improving the efficiency of industrial boiler energy is facing opportunities and challenges, optimizing the operation mode of the existing units, it is necessary to increase the flexibility of the boiler control.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tucker, R.A.
This paper reports that properly applied, light sources and lighting systems not only enhance a building's attractiveness and usability, they also create a secure environment. An effectively lighted area can minimize pedestrian hazards and auto accidents. Good security lighting also eliminates the darkness that vandals, thieves, and felons thrive on. Unfortunately, lighting quality has sometimes been sacrificed for the sake of energy efficiency, and resulting savings offset by poor aesthetics and user dissatisfaction. However, trade-offs in quality and efficiency are not necessary, thanks to recent developments in light source technology.
How the Energy Independence and Security Act of 2007 Affects Light Bulbs
Inefficient light bulbs are being phased out under the New Light Bulb Law. It does not sweepingly ban incandescent bulbs, just those not energy efficient (with some exemptions). It also includes many provisions not pertaining to lighting.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
One of the Department of Energy’s (DOE) primary forums for helping state and local governments implement costeffective and productive energy systems for American homes, communities, businesses, and industries is the Weatherization and Intergovernmental Programs Office (WIP). WIP is part of DOE’s Office of Energy Efficiency and Renewable Energy’s “all of the above” national energy strategy to create greater energy affordability, security and resiliency.
Cyber physical systems based on cloud computing and internet of things for energy efficiency
NASA Astrophysics Data System (ADS)
Suciu, George; Butca, Cristina; Suciu, Victor; Cretu, Alexandru; Fratu, Octavian
2016-12-01
Cyber Physical Systems (CPS) and energy efficiency play a major role in the context of industry expansion. Management practices for improving efficiency in the field of energy consumption became a priority of many major industries who are inefficient in terms of exploitation costs. The effort of adopting energy management means in an organization is quite challenging due to the lack of resources and expertise. One major problem consists in the lack of knowledge for energy management and practices. This paper aims to present authors' concept in creating a Cyber Physical Energy System (CPES) that will change organizations' way of consuming energy, by making them aware of their use. The presented concept will consider the security of the whole system and the easy integration with the existing electric network infrastructure.
Gasoline: The Achilles Heel of U.S. Energy Security
2010-03-01
reduce demand for petroleum, improve energy efficiency, and develop feasible alternative energy solutions to include emission capture technologies. The...United States remains the largest consumer of energy products in the world and is the second leading producer of green house gas (GHG) emissions ...energy solutions to include emission capture technologies. The United States remains the largest consumer of energy products in the world and is the
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2016-06-08
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2016-01-01
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382
Cybersecurity and Optimization in Smart “Autonomous” Buildings
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mylrea, Michael E.; Gourisetti, Sri Nikhil Gup
Significant resources have been invested in making buildings “smart” by digitizing, networking and automating key systems and operations. Smart autonomous buildings create new energy efficiency, economic and environmental opportunities. But as buildings become increasingly networked to the Internet, they can also become more vulnerable to various cyber threats. Automated and Internet-connected buildings systems, equipment, controls, and sensors can significantly increase cyber and physical vulnerabilities that threaten the confidentiality, integrity, and availability of critical systems in organizations. Securing smart autonomous buildings presents a national security and economic challenge to the nation. Ignoring this challenge threatens business continuity and the availability ofmore » critical infrastructures that are enabled by smart buildings. In this chapter, the authors address challenges and explore new opportunities in securing smart buildings that are enhanced by machine learning, cognitive sensing, artificial intelligence (AI) and smart-energy technologies. The chapter begins by identifying cyber-threats and challenges to smart autonomous buildings. Then it provides recommendations on how AI enabled solutions can help smart buildings and facilities better protect, detect and respond to cyber-physical threats and vulnerabilities. Next, the chapter will provide case studies that examine how combining AI with innovative smart-energy technologies can increase both cybersecurity and energy efficiency savings in buildings. The chapter will conclude by proposing recommendations for future cybersecurity and energy optimization research for examining AI enabled smart-energy technology.« less
Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments.
Lee, Jaeseung; Sung, Yunsick; Park, Jong Hyuk
2016-12-01
The Internet of Things (IoT) is the intelligent technologies and services that mutually communicate information between humans and devices or between Internet-based devices. In IoT environments, various device information is collected from the user for intelligent technologies and services that control the devices. Recently, wireless sensor networks based on IoT environments are being used in sectors as diverse as medicine, the military, and commerce. Specifically, sensor techniques that collect relevant area data via mini-sensors after distributing smart dust in inaccessible areas like forests or military zones have been embraced as the future of information technology. IoT environments that utilize smart dust are composed of the sensor nodes that detect data using wireless sensors and transmit the detected data to middle nodes. Currently, since the sensors used in these environments are composed of mini-hardware, they have limited memory, processing power, and energy, and a variety of research that aims to make the best use of these limited resources is progressing. This paper proposes a method to utilize these resources while considering energy efficiency, and suggests lightweight mutual verification and key exchange methods based on a hash function that has no restrictions on operation quantity, velocity, and storage space. This study verifies the security and energy efficiency of this method through security analysis and function evaluation, comparing with existing approaches. The proposed method has great value in its applicability as a lightweight security technology for IoT environments.
Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments
Lee, Jaeseung; Sung, Yunsick; Park, Jong Hyuk
2016-01-01
The Internet of Things (IoT) is the intelligent technologies and services that mutually communicate information between humans and devices or between Internet-based devices. In IoT environments, various device information is collected from the user for intelligent technologies and services that control the devices. Recently, wireless sensor networks based on IoT environments are being used in sectors as diverse as medicine, the military, and commerce. Specifically, sensor techniques that collect relevant area data via mini-sensors after distributing smart dust in inaccessible areas like forests or military zones have been embraced as the future of information technology. IoT environments that utilize smart dust are composed of the sensor nodes that detect data using wireless sensors and transmit the detected data to middle nodes. Currently, since the sensors used in these environments are composed of mini-hardware, they have limited memory, processing power, and energy, and a variety of research that aims to make the best use of these limited resources is progressing. This paper proposes a method to utilize these resources while considering energy efficiency, and suggests lightweight mutual verification and key exchange methods based on a hash function that has no restrictions on operation quantity, velocity, and storage space. This study verifies the security and energy efficiency of this method through security analysis and function evaluation, comparing with existing approaches. The proposed method has great value in its applicability as a lightweight security technology for IoT environments. PMID:27916962
ERIC Educational Resources Information Center
Eley, Charles, Ed.
This three-volume manual, focusing on California's K-12 public schools, presents guidelines for establishing schools that are healthy, comfortable, energy efficient, resource efficient, water efficient, secure, adaptable, and easy to operate and maintain. The first volume describes why high performance schools are important, what components are…
A Cluster-Based Framework for the Security of Medical Sensor Environments
NASA Astrophysics Data System (ADS)
Klaoudatou, Eleni; Konstantinou, Elisavet; Kambourakis, Georgios; Gritzalis, Stefanos
The adoption of Wireless Sensor Networks (WSNs) in the healthcare sector poses many security issues, mainly because medical information is considered particularly sensitive. The security mechanisms employed are expected to be more efficient in terms of energy consumption and scalability in order to cope with the constrained capabilities of WSNs and patients’ mobility. Towards this goal, cluster-based medical WSNs can substantially improve efficiency and scalability. In this context, we have proposed a general framework for cluster-based medical environments on top of which security mechanisms can rely. This framework fully covers the varying needs of both in-hospital environments and environments formed ad hoc for medical emergencies. In this paper, we further elaborate on the security of our proposed solution. We specifically focus on key establishment mechanisms and investigate the group key agreement protocols that can best fit in our framework.
SmartWay is an EPA program that helps the freight transportation sector improve supply chain efficiency. SmartWay reduces transportation-related emissions, environmental risks for companies and increases global energy security.
Rule to finalize standards for medium- and heavy-duty vehicles that would improve fuel efficiency and cut carbon pollution to reduce the impacts of climate change, while bolstering energy security and spurring manufacturing innovation.
Final environmental assessment: Sacramento Energy Service Center
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1994-03-01
The Sacramento Area Office (SAO) of the Western Area Power Administration (Western) needs to increase the security of operations, to eliminate overcrowding at the current leased location of the existing facilities, to provide for future growth, to improve efficiency, and to reduce operating costs. The proposed action is to construct an approximate 40,000-square foot building and adjacent parking lot with a Solar Powered Electric Vehicle Charging Station installed to promote use of energy efficient transportation. As funding becomes available and technology develops, additional innovative energy-efficient measures will be incorporated into the building. For example the proposed construction of the Solarmore » Powered Electric Vehicle Charging.« less
ERIC Educational Resources Information Center
McNeal, McKenzie, III.
2012-01-01
Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…
Rapid Building Assessment Project
2014-05-01
Efficiency Buildings Hub EISA Energy Independence Security Act EPRI The Electric Power and Research Institute ESTCP Environmental Security Technology...Ordinary Least Squares PG&E Pacific Gas & Electric R&D research and development RBA Remote Building Analytics REST representational state...utilities across North America and Europe. Requiring only hourly utility electric meter data, the building type, and address, FirstFuel can produce a
Land-use and alternative bioenergy pathways for waste biomass.
Campbell, J E; Block, E
2010-11-15
Rapid escalation in biofuels consumption may lead to a trade regime that favors exports of food-based biofuels from tropical developing countries to developed countries. There is growing interest in mitigating the land-use impacts of these potential biofuels exports by converting biorefinery waste streams into cellulosic ethanol, potentially reducing the amount of land needed to meet production goals. This increased land-use efficiency for ethanol production may lower the land-use greenhouse gas emissions of ethanol but would come at the expense of converting the wastes into bioelectricity which may offset fossil fuel-based electricity and could provide a vital source of domestic electricity in developing countries. Here we compare these alternative uses of wastes with respect to environmental and energy security outcomes considering a range of electricity production efficiencies, ethanol yields, land-use scenarios, and energy offset assumptions. For a given amount of waste biomass, we found that using bioelectricity production to offset natural gas achieves 58% greater greenhouse gas reductions than using cellulosic ethanol to offset gasoline but similar emissions when cellulosic ethanol is used to offset the need for more sugar cane ethanol. If bioelectricity offsets low-carbon energy sources such as nuclear power then the liquid fuels pathway is preferred. Exports of cellulosic ethanol may have a small impact on the energy security of importing nations while bioelectricity production may have relatively large impacts on the energy security in developing countries.
NASA Astrophysics Data System (ADS)
Khan, Muazzam A.; Ahmad, Jawad; Javaid, Qaisar; Saqib, Nazar A.
2017-03-01
Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or environmental conditions. Data gathered from WSN is transmitted via network to a central location for further processing. Numerous applications of WSN can be found in smart homes, intelligent buildings, health care, energy efficient smart grids and industrial control systems. In recent years, computer scientists has focused towards findings more applications of WSN in multimedia technologies, i.e. audio, video and digital images. Due to bulky nature of multimedia data, WSN process a large volume of multimedia data which significantly increases computational complexity and hence reduces battery time. With respect to battery life constraints, image compression in addition with secure transmission over a wide ranged sensor network is an emerging and challenging task in Wireless Multimedia Sensor Networks. Due to the open nature of the Internet, transmission of data must be secure through a process known as encryption. As a result, there is an intensive demand for such schemes that is energy efficient as well as highly secure since decades. In this paper, discrete wavelet-based partial image encryption scheme using hashing algorithm, chaotic maps and Hussain's S-Box is reported. The plaintext image is compressed via discrete wavelet transform and then the image is shuffled column-wise and row wise-wise via Piece-wise Linear Chaotic Map (PWLCM) and Nonlinear Chaotic Algorithm, respectively. To get higher security, initial conditions for PWLCM are made dependent on hash function. The permuted image is bitwise XORed with random matrix generated from Intertwining Logistic map. To enhance the security further, final ciphertext is obtained after substituting all elements with Hussain's substitution box. Experimental and statistical results confirm the strength of the anticipated scheme.
76 FR 59125 - 2011 Fall Meeting of the Ozone Transport Commission
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-23
... security/energy efficiency; architectural industrial and maintenance coatings; consumer products... storage tanks; seaports; aftermarket catalysts; lightering and non-road idling. DATES: The meeting will be...
2013-04-01
products for energy generation, including solar, wind , and gas turbines , energy storage, power conversion, grid integration, and software for...potential security advantages over centralized systems • DER promote fuel diversity (e.g., biomass, landfill gas, flare gas, wind , solar) and...therefore reduce overall energy price volatility • Renewable DER such as wind and solar photovoltaics provide emissions-free energy • DER offer a quicker
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Zhen; Chau, K. T., E-mail: ktchau@eee.hku.hk; Liu, Chunhua
2014-05-07
This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption.
Peng, Haipeng; Tian, Ye; Kurths, Jurgen; Li, Lixiang; Yang, Yixian; Wang, Daoshun
2017-06-01
Applications of wireless body area networks (WBANs) are extended from remote health care to military, sports, disaster relief, etc. With the network scale expanding, nodes increasing, and links complicated, a WBAN evolves to a body-to-body network. Along with the development, energy saving and data security problems are highlighted. In this paper, chaotic compressive sensing (CCS) is proposed to solve these two crucial problems, simultaneously. Compared with the traditional compressive sensing, CCS can save vast storage space by only storing the matrix generation parameters. Additionally, the sensitivity of chaos can improve the security of data transmission. Aimed at image transmission, modified CCS is proposed, which uses two encryption mechanisms, confusion and mask, and performs a much better encryption quality. Simulation is conducted to verify the feasibility and effectiveness of the proposed methods. The results show that the energy efficiency and security are strongly improved, while the storage space is saved. And the secret key is extremely sensitive, [Formula: see text] perturbation of the secret key could lead to a total different decoding, the relative error is larger than 100%. Particularly for image encryption, the performance of the modified method is excellent. The adjacent pixel correlation is smaller than 0.04 in different directions including horizontal, vertical, and diagonal; the entropy of the cipher image with a 256-level gray value is larger than 7.98.
Microgrid Analysis Tools Summary
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jimenez, Antonio; Haase, Scott G; Mathur, Shivani
2018-03-05
The over-arching goal of the Alaska Microgrid Partnership is to reduce the use of total imported fuel into communities to secure all energy services by at least 50% in Alaska's remote microgrids without increasing system life cycle costs while also improving overall system reliability, security, and resilience. One goal of the Alaska Microgrid Partnership is to investigate whether a combination of energy efficiency and high-contribution (from renewable energy) power systems can reduce total imported energy usage by 50% while reducing life cycle costs and improving reliability and resiliency. This presentation provides an overview of the following four renewable energy optimizationmore » tools. Information is from respective tool websites, tool developers, and author experience. Distributed Energy Resources Customer Adoption Model (DER-CAM) Microgrid Design Toolkit (MDT) Renewable Energy Optimization (REopt) Tool Hybrid Optimization Model for Electric Renewables (HOMER).« less
NASA Astrophysics Data System (ADS)
Brown, C. E.
1995-12-01
The purpose of this report is to describe the research programs and program activities of the US Department of Energy (DOE) that most directly relate to topics in the field of environmental geology. In this light, the mission of the DOE and the definition of environmental geology will be discussed. In a broad sense, environmental geology is that branch of earth science that emphasizes the entire spectrum of human interactions with the physical environment that include environmental health, mineral exploration and exploitation, waste management, energy use and conservation, global change, environmental law, natural and man-made hazard assessment, and land-use planning. A large number of research, development, and demonstration programs are under DOE's administration and guidance that directly or indirectly relate to topics in environmental geology. The primary mission of the DOE is to contribute to the welfare of the nation by providing the scientific foundation, technology, policy, and institutional leadership necessary to achieve efficiency in energy use, diversity in energy sources, a more productive and competitive economy, improved environmental quality, and a secure national defense. The research and development funding effort has most recently been redirected toward greater utilization of clean fossil fuels, especially natural gas, weatherization, renewable energy, energy efficiency, fusion energy, and high-energy physics. This paper will summarize the role that environmental geology has played and will continue to play in the execution of DOE's mission and the energy options that DOE has investigated closely. The specific options are those that center around energy choices, such as alternative-fueled transportation, building technologies, energy-efficient lighting, and clean energy.
Army Net Zero: Energy Roadmap and Program Summary, Fiscal Year 2013 (Brochure)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
The U.S. Army (Army) partnered with the National Renewable Energy Laboratory (NREL) and the U.S. Army Corps of Engineers to assess opportunities for increasing energy security through improved energy efficiency and optimized renewable energy strategies at nine installations across the Army's portfolio. Referred to as Net Zero Energy Installations (NZEIs), these projects demonstrate and validate energy efficiency and renewable energy technologies with approaches that can be replicated across DOD and other Federal agencies, setting the stage for broad market adoption. This report summarizes the results of the energy project roadmaps developed by NREL, shows the progress each installation could makemore » in achieving Net Zero Energy by 2020, and presents lessons learned and unique challenges from each installation.« less
Engage States on Energy Assurance and Energy Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kara Colton; John Ratliff; Sue Gander
2008-09-30
The NGA Center's 'Engaging States on Energy Security and Energy Assurance' has been successful in achieving the stated project purposes and objectives both in the initial proposal as well as in subsequent revisions to it. Our activities, which involve the NGA Center for Best Practices (The NGA Center) Homeland Security and Technology Division, included conducting tabletop exercises to help federal and state homeland security and energy officials determine roles and actions for various emergency scenarios. This included efforts to education state official on developing an energy assurance plan, harmonizing approaches to controlling price volatility, implementing reliability standards, understanding short andmore » long-term energy outlooks and fuel diversification, and capitalizing on DOE's research and development activities. Regarding our work on energy efficiency and renewable energy, the NGA Center's Environment, Energy and Natural Resources Division hosted three workshops which engaged states on the clean energy and alternative transportation fuel and also produced several reports on related topics. In addition, we convened 18 meetings, via conference call, of the Energy Working Group. Finally, through the NGA Center's Front and Center newsletter articles, the NGA Center disseminated promising practices to a wide audience of state policymakers. The NGA Center also hosted a number of workshops and web conferences designed to directly engage states on the deliverables under this Cooperative Agreement. Through the NGA Center's written products and newsletter articles, the NGA Center was able to disseminate promising practices to a wide audience of state policymakers.« less
Operations & Maintenance Best Practices - A Guide to Achieving Operational Efficiency Release 3.0
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This Operations and Maintenance (O&M) Best Practices Guide was developed under the direction of the U.S. Department of Energy’s Federal Energy Management Program (FEMP). The mission of FEMP is to facilitate the Federal Government’s implementation of sound, cost effective energy management and investment practices to enhance the nation’s energy security and environmental stewardship.
Light-Duty Vehicle Fuel Consumption Displacement Potential up to 2045
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moawad, Ayman; Rousseau, Aymeric
2016-04-01
The U.S. Department of Energy (DOE) Vehicle Technologies Program (VTP) is developing more energy-efficient and environmentally friendly highway transportation technologies that will enable America to use less petroleum. The long-term aim is to develop "leapfrog" technologies that will provide Americans with greater freedom of mobility and energy security, while lowering costs and reducing impacts on the environment.
Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization
Tsoukalas, Lefteri
2018-01-24
In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.
Energy efficiency in urban management: Russian and world experience
NASA Astrophysics Data System (ADS)
Pryadko, Igor
2017-10-01
The article discusses the role of energetics in creating a comfortable and safe environment of modern megacities, and the problem is considered in the socio-economic aspect. The object is the energy security of the city, and the subject is the influence of urban society on the formation of energy security. In particular, the problems are raised: ecological problems of urban energy supply, the condition of surface layer of the atmosphere near electric power lines. The author assesses the actions, implemented by the urban authorities in Mytischi, in the southwestern areas of New Moscow. The author assesses these sample areas on the basis of Ch. Landry’s concept of self-training, designated for municipal authorities and urban communities, and offers several successfully implemented self-study cases and in the light of modern methods of ensuring energy security. The forecasts of creation of energy-safe space, made by modern sociologist-urbanist Leo Hollis, are taken into account. The author also considers some of the economic aspects of biosphere safety. In particular, he insists that biosphere safety, convenience, and comfort have developed into competitive advantages in the housing market.
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
Topics covered include: energy security; clean energy and low carbon; energy for growth and poverty reduction in Africa; financing of energy efficiency; SMEs for decentralised energy service provision; potential for biofuels in developing countries; clean energy and sustainable development; clean energy finance and private equity funds; power generation and low carbon technologies; beyond traditional finance; rehabilitation and emission control in thermal power plants; and carbon finance. The presentations are mainly in ppt (Power Point) or pdf (Acrobat) format. Some videos of the conference are also available on the website.
Wang, Wei; Wang, Chunqiu; Zhao, Min
2014-03-01
To ease the burdens on the hospitalization capacity, an emerging swallowable-capsule technology has evolved to serve as a remote gastrointestinal (GI) disease examination technique with the aid of the wireless body sensor network (WBSN). Secure multimedia transmission in such a swallowable-capsule-based WBSN faces critical challenges including energy efficiency and content quality guarantee. In this paper, we propose a joint resource allocation and stream authentication scheme to maintain the best possible video quality while ensuring security and energy efficiency in GI-WBSNs. The contribution of this research is twofold. First, we establish a unique signature-hash (S-H) diversity approach in the authentication domain to optimize video authentication robustness and the authentication bit rate overhead over a wireless channel. Based on the full exploration of S-H authentication diversity, we propose a new two-tier signature-hash (TTSH) stream authentication scheme to improve the video quality by reducing authentication dependence overhead while protecting its integrity. Second, we propose to combine this authentication scheme with a unique S-H oriented unequal resource allocation (URA) scheme to improve the energy-distortion-authentication performance of wireless video delivery in GI-WBSN. Our analysis and simulation results demonstrate that the proposed TTSH with URA scheme achieves considerable gain in both authenticated video quality and energy efficiency.
Energy performance of areas for urban development (Arkhangelsk is given as example)
NASA Astrophysics Data System (ADS)
Popova, Olga; Glebova, Yulia
2017-01-01
The present research provides an overview and analysis of the legal framework and the technology to increase energy save and energy efficiency. The challenges of the mentioned activities implementation in urban areas are revealed in the paper. A comparison was made of the principal methods of increasing energy efficiency that is based on payback period. The basic shortcomings of the methods used are found. The way of capital reproducing assets acquisition is proposed with consideration of the rate of wear and tear and upgrading of urban residential development. The present research aims at characterizing energy sustainability of urban areas for forming the information basis that identifies capital construction projects together within the urban area. A new concept - area energy sustainability is introduced in the study to use system-structural approach to energy saving and energy efficiency. Energy sustainability of the area as an integral indicator of the static characteristics of the territory is considered as a complex involving the following terms: energy security, energy intensity and energy efficiency dynamic indicators of all the components of the power system of the area. Dimensions and parameters of energy sustainability of the area are determined. Arkhangelsk is given as example.
2011-01-01
maritime sector holistically, across its entire spectrum—improving safety and security, gover - nance, and industrial infrastructure and efficiency. There...includes the enabling elements of gover - nance, infrastructure, trade, safety, and security and plainly tells global partners where they can best...refugees, human rights, transparency, and accountability Infrastructure and Energy: transport (including maritime transport in its core function); tourism
Predicting Human Thermal Comfort in Automobiles
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rugh, J.; Bharathan, D.; Chaney, L.
The objects of this report are to: (1) increase national energy security by reducing fuel use for vehicle climate control systems; (2) show/demonstrate technology that can reduce the fuel used by LD vehicles' ancillary systems; and (3) develop tools to evaluate the effectiveness of energy-efficient systems including--comfort, cost, practicality, ease-of-use, and reliability.
NASA Astrophysics Data System (ADS)
Maraseni, T. N.; Mushtaq, S.; Reardon-Smith, K.
2012-09-01
The Australian Government is currently addressing the challenge of increasing water scarcity through significant on-farm infrastructure investment to facilitate the adoption of new water-efficient pressurized irrigation systems. However, it is highly likely that conversion to these systems will increase on-farm energy consumption and greenhouse gas (GHG) emissions, suggesting potential conflicts in terms of mitigation and adaptation policies. This study explored the trade-offs associated with the adoption of more water efficient but energy-intensive irrigation technologies by developing an integrated assessment framework. Integrated analysis of five case studies revealed trade-offs between water security and environmental security when conversion to pressurized irrigation systems was evaluated in terms of fuel and energy-related emissions, except in cases where older hand-shift sprinkler irrigation systems were replaced. These results suggest that priority should be given, in implementing on-farm infrastructure investment policy, to replacing inefficient and energy-intensive sprinkler irrigation systems such as hand-shift and roll-line. The results indicated that associated changes in the use of agricultural machinery and agrochemicals may also be important. The findings of this study support the use of an integrated approach to avoid possible conflicts in designing national climate change mitigation and adaptation policies, both of which are being developed in Australia.
Republic of the Marshall Islands. Energy Project Development Options and Technical Assessment (2013)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Conrad, Misty Dawn; Olis, Dan; Ness, J. Erik
2015-09-01
The advancement of renewable energy and energy efficient technologies continues to be fluid. There are many technical opportunities and strategies that can be utilized to guide communities to deploy cost-effective commercial alternative energy options; however, to achieve aggressive economic, environmental, and security goals, it requires a comprehensive, integrated approach. This document reports on the initial findings of an energy assessment that was conducted for the Republic of the Marshall Islands.
Zhang, Lin; Yin, Na; Fu, Xiong; Lin, Qiaomin; Wang, Ruchuan
2017-01-01
With the development of wireless sensor networks, certain network problems have become more prominent, such as limited node resources, low data transmission security, and short network life cycles. To solve these problems effectively, it is important to design an efficient and trusted secure routing algorithm for wireless sensor networks. Traditional ant-colony optimization algorithms exhibit only local convergence, without considering the residual energy of the nodes and many other problems. This paper introduces a multi-attribute pheromone ant secure routing algorithm based on reputation value (MPASR). This algorithm can reduce the energy consumption of a network and improve the reliability of the nodes’ reputations by filtering nodes with higher coincidence rates and improving the method used to update the nodes’ communication behaviors. At the same time, the node reputation value, the residual node energy and the transmission delay are combined to formulate a synthetic pheromone that is used in the formula for calculating the random proportion rule in traditional ant-colony optimization to select the optimal data transmission path. Simulation results show that the improved algorithm can increase both the security of data transmission and the quality of routing service. PMID:28282894
Research and Energy Efficiency: Selected Success Stories
DOE R&D Accomplishments Database
Garland, P. W.; Garland, R. W.
1997-06-26
Energy use and energy technology play critical roles in the U.S. economy and modern society. The Department of Energy (DOE) conducts civilian energy research and development (R&D) programs for the purpose of identifying promising technologies that promote energy security, energy efficiency, and renewable energy use. DOE-sponsored research ranges from basic investigation of phenomena all the way through development of applied technology in partnership with industry. DOE`s research programs are conducted in support of national strategic energy objectives, however austere financial times have dictated that R&D programs be measured in terms of cost vs. benefit. In some cases it is difficult to measure the return on investment for the basic "curiosity-driven" research, however many applied technology development programs have resulted in measurable commercial successes. The DOE has published summaries of their most successful applied technology energy R&D programs. In this paper, we will discuss five examples from the Building Technologies area of the DOE Energy Efficiency program. Each story will describe the technology, discuss the level of federal funding, and discuss the returns in terms of energy savings, cost savings, or national economic impacts.
Energy Department Launches National Fuel Cell Technology Evaluation Center
technologies by strengthening data collection from fuel cell systems and components operating under real-world also houses one of the most energy efficient data centers in the world. NFCTEC will use a secure work proprietary hydrogen and fuel cell technologies in real-world operation since 2004. To date, NREL has
Evaluating Realized Impacts of DOE/EERE R&D Programs. Standard impact evaluation method
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ruegg, Rosalie; O'Connor, Alan C.; Loomis, Ross J.
2014-08-01
This document provides guidance for evaluators who conduct impact assessments of research and development (R&D) programs for the U.S. Department of Energy’s (DOE) Office of Energy Efficiency and Renewable Energy (EERE). It is also targeted at EERE program staff responsible for initiating and managing commissioned impact studies. The guide specifies how to estimate economic benefits and costs, energy saved and installed or generated, environmental impacts, energy security impacts, and knowledge impacts of R&D investments in advanced energy technologies.
Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage
Liu, Fang; Cai, Zhiping; Xiao, Nong; Zhao, Ziming
2018-01-01
Smart sensor-equipped mobile devices sense, collect, and process data generated by the edge network to achieve intelligent control, but such mobile devices usually have limited storage and computing resources. Mobile cloud storage provides a promising solution owing to its rich storage resources, great accessibility, and low cost. But it also brings a risk of information leakage. The encryption of sensitive data is the basic step to resist the risk. However, deploying a high complexity encryption and decryption algorithm on mobile devices will greatly increase the burden of terminal operation and the difficulty to implement the necessary privacy protection algorithm. In this paper, we propose ENSURE (EfficieNt and SecURE), an efficient and secure encrypted search architecture over mobile cloud storage. ENSURE is inspired by edge computing. It allows mobile devices to offload the computation intensive task onto the edge server to achieve a high efficiency. Besides, to protect data security, it reduces the information acquisition of untrusted cloud by hiding the relevance between query keyword and search results from the cloud. Experiments on a real data set show that ENSURE reduces the computation time by 15% to 49% and saves the energy consumption by 38% to 69% per query. PMID:29652810
Edge-Based Efficient Search over Encrypted Data Mobile Cloud Storage.
Guo, Yeting; Liu, Fang; Cai, Zhiping; Xiao, Nong; Zhao, Ziming
2018-04-13
Smart sensor-equipped mobile devices sense, collect, and process data generated by the edge network to achieve intelligent control, but such mobile devices usually have limited storage and computing resources. Mobile cloud storage provides a promising solution owing to its rich storage resources, great accessibility, and low cost. But it also brings a risk of information leakage. The encryption of sensitive data is the basic step to resist the risk. However, deploying a high complexity encryption and decryption algorithm on mobile devices will greatly increase the burden of terminal operation and the difficulty to implement the necessary privacy protection algorithm. In this paper, we propose ENSURE (EfficieNt and SecURE), an efficient and secure encrypted search architecture over mobile cloud storage. ENSURE is inspired by edge computing. It allows mobile devices to offload the computation intensive task onto the edge server to achieve a high efficiency. Besides, to protect data security, it reduces the information acquisition of untrusted cloud by hiding the relevance between query keyword and search results from the cloud. Experiments on a real data set show that ENSURE reduces the computation time by 15% to 49% and saves the energy consumption by 38% to 69% per query.
Implementation of the Energy Efficiency Directive: Opportunities and Challenges
NASA Astrophysics Data System (ADS)
Zīgurs, A.; Sarma, U.
2015-12-01
Discussions in Latvia are ongoing regarding the optimum solution to implementing Directive 2012/27/EU of the European Parliament and of the Council of 25 October 2012 on energy efficiency, amending Directives 2009/125/EC and 2010/30/EU and repealing Directives 2004/8/EC and 2006/32/EC (Directive 2012/27/EU). Without a doubt, increased energy efficiency contributes significantly to energy supply security, competitive performance, increased quality of life, reduced energy dependence and greenhouse gas (GHG) emissions. However, Directive 2012/27/EU should be implemented with careful planning, evaluating every aspect of the process. This study analyses a scenario, where a significant fraction of target energy efficiency is achieved by obliging energy utilities to implement user-end energy efficiency measures. With implementation of this scheme towards energy end-use savings, user payments for energy should be reduced; on the other hand, these measures will require considerable investment. The energy efficiency obligation scheme stipulates that these investments must be paid by energy utilities; however, they will actually be covered by users, because the source of energy utilities' income is user payments for energy. Thus, expenses on such measures will be included in energy prices and service tariffs. The authors analyse the ways to achieve a balance between user gains from energy end-use savings and increased energy prices and tariffs as a result of obligations imposed upon energy utilities. Similarly, the suitability of the current regulatory regime for effective implementation of Directive 2012/27/EU is analysed in the energy supply sectors, where supply tariffs are regulated.
EU energy policies achievement by industries in decentralized areas
NASA Astrophysics Data System (ADS)
Destro, Nicola; Stoppato, Anna; Benato, Alberto; Schiro, Fabio
2017-11-01
Energy Roadmap outlined by the European Commission sets out several routes for a more sustainable, competitive and secure energy system in 2050. All the outlined scenarios consider energy efficiency, renewable energy, nuclear energy and carbon capture and storage. In this paper, more attention has been devoted to the energy efficiency issue, by the identification of new micro and small networks opportunity fed by hybrid plants in the North-East of Italy. National energy balance and national transmission system operator data allowed to collect industrial energy consumptions data on the investigated area. Applying industrial statistics to the local energy needs allows to collect a dataset including consumption information by factory and by company structure (size and employees) for each industrial sector highlighting the factory density in the area. Preliminary outcomes from the model address to the exploitation of local by-product for energy purposes.
DoD Installation Energy Security: Evolving to a Smart Grid
2012-03-20
located at the Naval Air Weapons Station in China Lake, California. This series of geothermal power plants produces a peak power output of 270 megawatts...initiatives are driving the DoD to invest significantly in renewable energy resources like solar, wind, and geothermal , as well as energy efficient vehicles...hydroelectric, geothermal ) resources. The most common and largest forms of electrical generation come from power plants that use fossil fuels
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wong, Amy S.; Powell, Kimberly S.
Los Alamos National Laboratory's newest facility, the Radiological Laboratory Utility Office Building (RLUOB), is also its first to achieve both the Leadership in Energy and Environmental Design (LEED) status and LEED Gold certification from the U.S. Green Building Council (USGBC). From its robust design to its advanced scientific equipment, RLUOB is essential to the Laboratory's national security mission in support of the National Nuclear Security Administration's (NNSA) nuclear weapons program. At more than 200,000 square feet, this building is the only radiological facility within the Department of Energy to have attained LEED Gold, which contributes to NNSA's achievement towards themore » high performance sustainable building goals outlined in Executive Order 13514, Federal Leadership in Environmental, Energy, and Economic Performance. 'As we celebrate RLUOB being completed almost one year ahead of schedule and having achieved LEED certification at the Gold level, we approach our plutonium mission at Los Alamos and NNSA with a great sense of achievement,' said Don Cook, NNSA's deputy administrator for defense programs. 'RLUOB adds a major component to NNSA's plutonium support capability and RLUOB demonstrates our commitment in helping to deliver President Obama's nuclear security agenda which includes ensuring the safety, security and effectiveness of the nuclear deterrent without testing.' The facility contains laboratories for analytical chemistry and materials characterization of special nuclear material, along with space for offices, training and emergency operations. Its multi-functional purpose makes RLUOB a unique project for which LEED certification was sought. 'LEED certification was a huge goal and one we sought from the very beginning of this project,' said Laboratory Director Charlie McMillan. 'It's an important step forward, allowing us to advance national security science in modern, safer, more efficient infrastructure.' The Laboratory's project team and its contractor partners, especially in coordination with Jacobs Engineering, focused on green design and construction in LEED categories, such as sustainable sites, water efficiency, energy and atmosphere, materials and resources, indoor environmental quality and innovation in design. RLUOB's features include: (1) Building envelope design (orientation, materials and insulation) yielded a 20 percent improvement in energy performance; (2) Incorporation of building materials with 24 percent recycled content; (3) Diversion of 72 percent of construction-generated materials through reuse, recycle and salvage; (4) Roofing comprised of 93 percent highly-reflective materials to reduce heat island effects; (5) High efficiency, gas-fired hot water boilers, air-cooled chillers, thermal storage systems and variable frequency drives for compressors, fans and pumps; (6) Energy efficient lighting for interiors, exteriors, process glove boxes and fume hoods; (7) Water efficient fixtures resulting in 30 percent reduction in usage; (8) Low emission paints and carpeting for improved indoor air quality; (9) Landscaping that doesn't require permanent irrigation; (10) Enhanced building system commissioning; and (11) Comprehensive transportation alternatives, including public transportation, bicycle storage and changing rooms, and a refueling station for government vehicles using alternative fuels. 'RLUOB's LEED certification demonstrates tremendous leadership in green building,' says Rick Fedrizzi, president and CEO of USGBC. 'The urgency of our mission has challenged the industry to move faster and reach further than ever before, and RLUOB serves as a prime example of just how much we can accomplish.'« less
Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tsoukalas, Lefteri
2009-04-29
In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energymore » internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.« less
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
2017-03-24
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
2017-01-01
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure. PMID:28338632
Evaluating knowledge benefits of automotive lightweighting materials R&D projects.
Peretz, Jean H; Das, Sujit; Tonn, Bruce E
2009-08-01
This paper presents a set of metrics used to evaluate short-run knowledge benefits that accrued from research and development (R&D) projects funded in fiscal years 2000-2004 by automotive lightweighting materials (ALM) of the U.S. Department of Energy (DOE). Although DOE presents to Congress energy, environmental, and security benefits and costs of its R&D efforts under the Government Performance and Results Act, DOE has yet to include knowledge benefits in that report [U.S. Department of Energy. (2007). Projected benefits of federal energy efficiency and renewable energy programs: FY2008 budget request. NREL/TP-640-41347 (March). Washington, DC: National Renewable Energy Laboratory for DOE Energy Efficiency and Renewable Energy. Retrieved February 12, 2007 from http://www1.eere.energy.gov/ba/pba/2008_benefits.html]. ALM focuses on development and validation of advanced technologies that significantly reduce automotive vehicle body and chassis weight without compromising other attributes such as safety, performance, recyclability, and cost [U.S. Department of Energy. (2005a). Automotive lightweighting materials 2004 annual progress report. Washington, DC: DOE Energy Efficiency and Renewable Energy. Retrieved March 30, 2005 from http://www.eere.energy.gov/vehiclesandfuels/resources/fcvt_alm_fy04.shtml]. The ultimate goal of ALM to have lightweighter materials in vehicles hinges on many issues, including the (1) collaborative nature of ALMs R&D with the automobile industry and (2) manufacturing knowledge gained through the R&D effort. The ALM projects evaluated in this paper yielded numerous knowledge benefits in the short run. While these knowledge benefits are impressive, there remains uncertainty about whether the research will lead to incorporation of lightweight materials by the Big Three automakers into their manufacturing process and introduction of lightweight vehicles into the marketplace. The uncertainty illustrates a difference between (1) knowledge benefits and (2) energy, environmental, and security benefits emanating from R&D.
Federal Agency Energy Efficiency Improvement Act of 2009
Sen. Collins, Susan M. [R-ME
2009-10-21
Senate - 04/12/2010 By Senator Lieberman from Committee on Homeland Security and Governmental Affairs filed written report. Report No. 111-167. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Metering Best Practices, A Guide to Achieving Utility Resource Efficiency, Release 2.0
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sullivan, Greg; Hunt, W. D.; Pugh, Ray
2011-08-31
This release is an update and expansion of the information provided in Release 1.0 of the Metering Best Practice Guide that was issued in October 2007. This release, as was the previous release, was developed under the direction of the U.S. Department of Energy's Federal Energy Management Program (FEMP). The mission of FEMP is to facilitate the Federal Government's implementation of sound cost-effective energy management and investment practices to enhance the nation's energy security and environmental stewardship. Each of these activities is directly related to achieving requirements set forth in the Energy Policy Acts of 1992 and 2005, the Energymore » Independence and Security Act (EISA) of 2007, and the goals that have been established in Executive Orders 13423 and 13514 - and also those practices that are inherent in sound management of Federal financial and personnel resources.« less
The EU sustainable energy policy indicators framework.
Streimikiene, Dalia; Sivickas, Gintautas
2008-11-01
The article deals with indicators framework to monitor implementation of the main EU (European Union) directives and other policy documents targeting sustainable energy development. The main EU directives which have impact on sustainable energy development are directives promoting energy efficiency and use of renewable energy sources, directives implementing greenhouse gas mitigation and atmospheric pollution reduction policies and other policy documents and strategies targeting energy sector. Promotion of use of renewable energy sources and energy efficiency improvements are among priorities of EU energy policy because the use of renewable energy sources and energy efficiency improvements has positive impact on energy security and climate change mitigation. The framework of indicators can be developed to establish the main targets set by EU energy and environmental policies allowing to connect indicators via chain of mutual impacts and to define policies and measures necessary to achieve established targets based on assessment of their impact on the targeted indicators representing sustainable energy development aims. The article discusses the application of indicators framework for EU sustainable energy policy analysis and presents the case study of this policy tool application for Baltic States. The article also discusses the use of biomass in Baltic States and future considerations in this field.
Engineering cyanobacteria for fuels and chemicals production.
Zhou, Jie; Li, Yin
2010-03-01
The world's energy and global warming crises call for sustainable, renewable, carbon-neutral alternatives to replace fossil fuel resources. Currently, most biofuels are produced from agricultural crops and residues, which lead to concerns about food security and land shortage. Compared to the current biofuel production system, cyanobacteria, as autotrophic prokaryotes, do not require arable land and can grow to high densities by efficiently using solar energy, CO(2), water, and inorganic nutrients. Moreover, powerful genetic techniques of cyanobacteria have been developed. For these reasons, cyanobacteria, which carry out oxygenic photosynthesis, are attractive hosts for production of fuels and chemicals. Recently, several chemicals including ethanol, isobutanol and isoprene have been produced by engineered cyanobacteria directly using solar energy, CO(2), and water. Cyanobacterium is therefore a potential novel cell factory for fuels and chemicals production to address global energy security and climate change issues.
NASA Astrophysics Data System (ADS)
Chen, Wei-Ming
Energy is the backbone of modern life which is highly related to national security, economic growth, and environmental protection. For Taiwan, a region having limited conventional energy resources but constructing economies and societies with high energy intensity, energy became the throat of national security and development. This dissertation explores energy solutions for Taiwan by constructing a sustainable and comprehensive energy planning framework (SCENE) and by simulating alternative energy pathways on the horizon to 2030. The Long-range Energy Alternatives Planning system (LEAP) is used as a platform for the energy simulation. The study models three scenarios based on the E4 (energy -- environment -- economic -- equity) perspectives. Three scenarios refer to the business-as-usual scenario (BAU), the government target scenario (GOV), and the renewable and efficiency scenario (REEE). The simulation results indicate that the most promising scenario for Taiwan is the REEE scenario, which aims to save 48.7 million tonnes of oil equivalent (Mtoe) of final energy consumption. It avoids USD 11.1 billion on electricity expenditure in final demand sectors. In addition, the cost of the REEE path is the lowest among all scenarios before 2020 in the electricity generation sector. In terms of global warming potential (GWP), the REEE scenario could reduce 35 percent of the GWP in the demand sectors, the lowest greenhouse gases emission in relation to all other scenarios. Based on lowest energy consumption, competitive cost, and least harm to the environment, the REEE scenario is the best option to achieve intergenerational equity. This dissertation proposes that promoting energy efficiency and utilizing renewable energy is the best strategy for Taiwan. For efficiency improvement, great energy saving potentials do exist in Taiwan so that Taiwan needs more ambitious targets, policies, and implementation mechanisms for energy efficiency enhancement to slow down and decrease total final energy demand in the long term. In terms of adopting renewable energy, this dissertation suggests increasing the proportion of renewable electricity to 30 percent by 2030, using proven and market competitive renewable technologies to harvest Taiwan's abundant renewable potential. To achieve this goal, it is crucial to construct stable funding sources and promote the transparency, longevity, and certainty of policies.
2010 Vehicle Technologies Market Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ward, Jacob; Davis, Stacy Cagle; Diegel, Susan W
2011-06-01
In the past five years, vehicle technologies have advanced on a number of fronts: power-train systems have become more energy efficient, materials have become more lightweight, fuels are burned more cleanly, and new hybrid electric systems reduce the need for traditional petroleum-fueled propulsion. This report documents the trends in market drivers, new vehicles, and component suppliers. This report is supported by the U.S. Department of Energy s (DOE s) Vehicle Technologies Program, which develops energy-efficient and environmentally friendly transportation technologies that will reduce use of petroleum in the United States. The long-term aim is to develop "leap frog" technologies thatmore » will provide Americans with greater freedom of mobility and energy security, while lowering costs and reducing impacts on the environment.« less
Wide-area situation awareness in electric power grid
NASA Astrophysics Data System (ADS)
Greitzer, Frank L.
2010-04-01
Two primary elements of the US energy policy are demand management and efficiency and renewable sources. Major objectives are clean energy transmission and integration, reliable energy transmission, and grid cyber security. Development of the Smart Grid seeks to achieve these goals by lowering energy costs for consumers, achieving energy independence and reducing greenhouse gas emissions. The Smart Grid is expected to enable real time wide-area situation awareness (SA) for operators. Requirements for wide-area SA have been identified among interoperability standards proposed by the Federal Energy Regulatory Commission and the National Institute of Standards and Technology to ensure smart-grid functionality. Wide-area SA and enhanced decision support and visualization tools are key elements in the transformation to the Smart Grid. This paper discusses human factors research to promote SA in the electric power grid and the Smart Grid. Topics that will be discussed include the role of human factors in meeting US energy policy goals, the impact and challenges for Smart Grid development, and cyber security challenges.
NREL Fuels and Engines R&D Revs Up Vehicle Efficiency, Performance
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
NREL bridges fuels and engines R&D to maximize vehicle efficiency and performance. The lab’s fuels and engines research covers the full spectrum of innovation—from fuel chemistry, conversion, and combustion to the evaluation of how fuels interact with engine and vehicle design. This innovative approach has the potential to positively impact our economy, national energy security, and air quality.
Butanol production by fermentation: efficient bioreactors
USDA-ARS?s Scientific Manuscript database
Energy security, environmental concerns, and business opportunities in the emerging bio-economy have generated strong interest in the production of n-butanol by fermentation. Acetone butanol ethanol (ABE or solvent) batch fermentation process is product limiting because butanol even at low concentra...
Rule to finalize standards for medium- and heavy-duty vehicles that would improve fuel efficiency and cut carbon pollution to reduce the impacts of climate change, while bolstering energy security and spurring manufacturing innovation.
IEEE TRANSACTIONS ON CYBERNETICS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Craig R. RIeger; David H. Scheidt; William D. Smart
2014-11-01
MODERN societies depend on complex and critical infrastructures for energy, transportation, sustenance, medical care, emergency response, communications security. As computers, automation, and information technology (IT) have advanced, these technologies have been exploited to enhance the efficiency of operating the processes that make up these infrastructures
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
2014-01-01
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
2014-06-10
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.
NASA Astrophysics Data System (ADS)
Voskresenskaya, Elena; Vorona-Slivinskaya, Lubov
2018-03-01
The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.
Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel
2016-03-31
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.
Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel
2016-01-01
The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572
10 CFR 706.2 - Basis and scope.
Code of Federal Regulations, 2010 CFR
2010-01-01
... ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS General § 706.2 Basis and... objectives for labor-management relations in the DOE program, namely: (a) Wholehearted acceptance by... efficient management expected from DOE contractors; (e) Minimum interference with the traditional rights and...
Improving Biofuel Recovery Processes For Efficiency and Sustainability
The 2007 Energy Independence and Security Act (EISA) provided for increased production of biofuels with, among other provisions, a specified share to be derived from non-sugar or cellulose feedstocks. The EISA further established standards for renewable fuels achieving 20, 50, a...
FY2010 Annual Progress Report for Propulsion Materials
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, Patrick B.; Schutte, Carol L.; Gibbs, Jerry L.
The Propulsion Materials Technology actively supports the energy security and reduction of greenhouse emissions goals of the Vehicle Technologies Program by developing advanced materials that enable development of higher efficiency powertrains for ground transportation. Propulsion Materials works closely with the other disciplines within the VT Program to identify the materials properties essential for the development of cost-effective, highly efficient, and environmentally friendly next-generation heavy and light duty powertrains.
The Evaluation of Feasibility of Thermal Energy Storage System at Riga TPP-2
NASA Astrophysics Data System (ADS)
Ivanova, P.; Linkevics, O.; Cers, A.
2015-12-01
The installation of thermal energy storage system (TES) provides the optimisation of energy source, energy security supply, power plant operation and energy production flexibility. The aim of the present research is to evaluate the feasibility of thermal energy system installation at Riga TPP-2. The six modes were investigated: four for non-heating periods and two for heating periods. Different research methods were used: data statistic processing, data analysis, analogy, forecasting, financial method and correlation and regression method. In the end, the best mode was chosen - the increase of cogeneration unit efficiency during the summer.
Joint the Center for Applied Scientific Computing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gamblin, Todd; Bremer, Timo; Van Essen, Brian
The Center for Applied Scientific Computing serves as Livermore Lab’s window to the broader computer science, computational physics, applied mathematics, and data science research communities. In collaboration with academic, industrial, and other government laboratory partners, we conduct world-class scientific research and development on problems critical to national security. CASC applies the power of high-performance computing and the efficiency of modern computational methods to the realms of stockpile stewardship, cyber and energy security, and knowledge discovery for intelligence applications.
NASA Technical Reports Server (NTRS)
Levinson, S.
1977-01-01
Scanning scheme is more efficient than conventional scanning. Originally designed for optical radar in space vehicles, scheme may also find uses in site-surveillance security systems and in other industrial applications. It should be particularly useful when system must run on battery energy, as would be case in power outages.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Executive Order 13148 of April 21, 2000, Greening the Government through Leadership in Environmental Management. (e) Executive Order 13101 of September 14, 1998, Greening the Government through Waste Prevention... through Efficient Energy Management. (g) Farm Security and Rural Investment Act of 2002 (FSRIA) (7 U.S.C...
Report on the first Quadrennial Technology Review (QTR)
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2011-09-30
Access to clean, affordable, secure, and reliable energy has been a cornerstone of America’s economic growth. The Nation’s systems that produce, store, transmit, and use energy are falling short of U.S. needs. Maintaining energy security, bolstering U.S. competitiveness, and mitigating the environmental impacts of energy are long-standing challenges. Governments, consumers, and the private sector have worked for decades to address these challenges, yet they remain among the Nation’s most pressing issues. President Obama has articulated broad national energy goals for reducing U.S. dependence on oil, reducing pollution, and investing in research and development (R&D) for clean-energy technologies in the Unitedmore » States to create jobs. These include: Reducing oil imports by one-third by 2025; Supporting the deployment of 1 million electric vehicles on the road by 2015; Making non-residential buildings 20% more energy efficient by 2020; Deriving 80% of America's electricity from clean-energy sources by 2035; and Reducing greenhouse gas emissions by 175 by 2020 and 83% of 2050, from a 2005 baseline.« less
Secure and lightweight network admission and transmission protocol for body sensor networks.
He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Zhang, Pingxin
2013-05-01
A body sensor network (BSN) is a wireless network of biosensors and a local processing unit, which is commonly referred to as the personal wireless hub (PWH). Personal health information (PHI) is collected by biosensors and delivered to the PWH before it is forwarded to the remote healthcare center for further processing. In a BSN, it is critical to only admit eligible biosensors and PWH into the network. Also, securing the transmission from each biosensor to PWH is essential not only for ensuring safety of PHI delivery, but also for preserving the privacy of PHI. In this paper, we present the design, implementation, and evaluation of a secure network admission and transmission subsystem based on a polynomial-based authentication scheme. The procedures in this subsystem to establish keys for each biosensor are communication efficient and energy efficient. Moreover, based on the observation that an adversary eavesdropping in a BSN faces inevitable channel errors, we propose to exploit the adversary's uncertainty regarding the PHI transmission to update the individual key dynamically and improve key secrecy. In addition to the theoretical analysis that demonstrates the security properties of our system, this paper also reports the experimental results of the proposed protocol on resource-limited sensor platforms, which show the efficiency of our system in practice.
2015-11-01
energy efficiency.25 The rules are scheduled to go into effect in 2016. One of the toughest components for coal power plants to meet will be the NOx...coal power plants out of business by the early-2020s.30 High Cost and Other Challenges of Renewables. Renewable energy has been a focus of the envi...will be explained later in detail. Coal: An Environmentally Problematic Energy Source. Besides CO2 emissions, burning coal pollutes the environment
2013-06-19
restriction. At that time, Congress also amended the “Declaration of Policy” to include renewable energy sources “ biomass ” and “more efficient energy...minimum mandates for advanced biofuels are one billion gallons for biomass -based diesel, 16 billion gallons for cellulosic fuels, and four billion...biofuels-and- the-u-s-military-has-it-wrong/ 162 BARTIS, supra note 159. 163 United to Purchase Biofuels from AltAir Fuels, BIOMASS MAGAZINE (July 1
Secure communication via an energy-harvesting untrusted relay in the presence of an eavesdropper
NASA Astrophysics Data System (ADS)
Tuan, Van Phu; Kong, Hyung Yun
2018-02-01
This article studies a secure communication of a simultaneous wireless information and power transfer system in which an energy-constrained untrusted relay, which harvests energy from the wireless signals, helps the communication between the source and destination and is able to decode the source's confidential signal. Additionally, the source's confidential signal is also overheard by a passive eavesdropper. To create positive secrecy capacity, a destination-assisted jamming signal that is completely cancelled at the destination is adopted. Moreover, the jamming signal is also exploited as an additional energy source. To evaluate the secrecy performance, analytical expressions for the secrecy outage probability (SOP) and the average secrecy capacity are derived. Moreover, a high-power approximation for the SOP is presented. The accuracy of the analytical results is verified by Monte Carlo simulations. Numerical results provide valuable insights into the effect of various system parameters, such as the energy-harvesting efficiency, secrecy rate threshold, power-splitting ratio, transmit powers, and locations of the relay and eavesdropper, on the secrecy performance.
Efficient security mechanisms for mHealth applications using wireless body sensor networks.
Sahoo, Prasan Kumar
2012-01-01
Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme.
Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks
Sahoo, Prasan Kumar
2012-01-01
Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme. PMID:23112734
Nutrient Use Efficiency in Bioenergy Cropping Systems: Critical Research Questions
USDA-ARS?s Scientific Manuscript database
Current U.S. plans for energy security rely on converting large areas of cropland from food to biofuel production. Additionally, lands currently considered too marginal for intensive food production may be considered suitable for biofuels production; predominant cropping systems may shift to more va...
Transportation Efficiency Act to End Oil Addiction: Securing America’s Future
2011-03-17
250 to $300 billion.20 These numbers represent an uneasy dependence that the nation maintains on foreign suppliers. General Charles Wald , USAF (RET... Lisa A, The Geopolitics of Energy: Emerging Trends, Changing Landscapes, Uncertain Times (Washington, DC: Center for Strategic and International
Optimal damper placement research
NASA Astrophysics Data System (ADS)
Smirnov, Vladimir; Kuzhin, Bulat
2017-10-01
Nowadays increased noise and vibration pollution on technopark and research laboratories territories, which is negatively influencing on production of high-precision measuring instruments. The problem is actual for transport hubs, which experience influence of machines, vehicles, trains and planes. Energy efficiency is one of major functions in modern road transport development. The problem of environmental pollution, lack of energy resources and energy efficiency requires research, production and implementation of energy efficient materials that would be the foundation of environmentally sustainable transport infrastructure in road traffic. Improving the efficiency of energy use is a leading option to gain better energy security, improve industry profitability and competitiveness, and reduce the overall energy sector impacts on climate change. This paper has next indirect goals. Research impact of vibration on constructions, such as bus and train stations, terminals, which are mostly exposed to oscillation. Extend the buildings operation by decreasing the negative influence. Reduce expenses on maintenance and repair works. It is important not to forget about seismic protection, which is actual nowadays, when the safety stands first. Analysis of devastating earthquakes for last few years proves reasonableness of application such systems. The article is dedicated to learning dependence of damper location on natural frequency. As a model for analyze was simulated concrete construction with variable profile. We used program complex Patran for analyzing the model.
Ethanol for a sustainable energy future.
Goldemberg, José
2007-02-09
Renewable energy is one of the most efficient ways to achieve sustainable development. Increasing its share in the world matrix will help prolong the existence of fossil fuel reserves, address the threats posed by climate change, and enable better security of the energy supply on a global scale. Most of the "new renewable energy sources" are still undergoing large-scale commercial development, but some technologies are already well established. These include Brazilian sugarcane ethanol, which, after 30 years of production, is a global energy commodity that is fully competitive with motor gasoline and appropriate for replication in many countries.
NASA Astrophysics Data System (ADS)
Bariss, Uldis; Bazbauers, Gatis; Blumberga, Andra; Blumberga, Dagnija
2017-11-01
Increased energy efficiency of the building sector is high on the list of priorities for energy policy since better energy efficiency would help to reduce impact on climate change and increase security of energy supply. One aim of the present study was to find a relative effect of growth of demand for energy services due to changes in income, energy consumption per unit of demand due to technological development, changes in electricity price and household income on household electricity consumption in Latvia. The method applied included system dynamics modeling and data from a household survey regarding the relationship between electricity saving activities and the electricity cost-income ratio. The results revealed that, in direct contrast to the expected, a potential reduction of the electricity consumption is rather insensitive to electricity price and electricity cost-income ratio, and that the efficiency of technologies could be the main drivers for future electricity savings. The results suggest that support to advancement of technologies and faster replacement of inefficient ones rather than influencing the energy price could be effective energy policy measures. The model, developed in the study could be used in similar assessments in other countries.
NASA Astrophysics Data System (ADS)
Chowdhury, Md Mukul
With the increased practice of modularization and prefabrication, the construction industry gained the benefits of quality management, improved completion time, reduced site disruption and vehicular traffic, and improved overall safety and security. Whereas industrialized construction methods, such as modular and manufactured buildings, have evolved over decades, core techniques used in prefabrication plants vary only slightly from those employed in traditional site-built construction. With a focus on energy and cost efficient modular construction, this research presents the development of a simulation, measurement and optimization system for energy consumption in the manufacturing process of modular construction. The system is based on Lean Six Sigma principles and loosely coupled system operation to identify the non-value adding tasks and possible causes of low energy efficiency. The proposed system will also include visualization functions for demonstration of energy consumption in modular construction. The benefits of implementing this system include a reduction in the energy consumption in production cost, decrease of energy cost in the production of lean-modular construction, and increase profit. In addition, the visualization functions will provide detailed information about energy efficiency and operation flexibility in modular construction. A case study is presented to validate the reliability of the system.
Three Essays Examining Household Energy Demand and Behavior
NASA Astrophysics Data System (ADS)
Murray, Anthony G.
This dissertation consists of three essays examining household energy decisions and behavior. The first essay examines the adoption of energy efficient Energy Star home appliances by U.S. households. Program effectiveness requires that consumers be aware of the labeling scheme and also change their purchase decisions based on label information. The first essay examines the factors associated with consumer awareness of the Energy Star label of recently purchased major appliances and the factors associated with the choice of Energy Star labeled appliances. The findings suggest that eliminating identified gaps in Energy Star appliance adoption would result in house electricity cost savings of $164 million per year and associated carbon emission reductions of about 1.1 million metric tons per year. The second essay evaluates household energy security and the effectiveness of the Low-Income Home Energy Assistance Program (LIHEAP), the single largest energy assistance program available to poor households within the United States. Energy security is conceptually akin to the well-known concept of food security. Rasch models and household responses to energy security questions in the 2005 Residential Energy Consumption Survey are used to generate an energy insecurity index that is consistent with those found in the food insecurity literature. Participating in LIHEAP is found to significantly reduce household energy insecurity score in the index. Further, simulations show that the elimination of the energy assistance safety net currently available to households increases the number of energy insecure house- holds by over 16 percent. The third essay develops a five equation demand system to estimate household own-price, cross-price and income elasticities between electricity, natural gas, food at home, food away from home, and non-durable commodity groups. Household cross-price elasticities between energy and food commodities are of particular importance. Energy price shocks reduce food expenditures for low-income households, as indicated by negative cross-price elasticity estimates for food and energy commodities. Additionally, low-income households reduce energy expenditures more than other households, further indicating "heat or eat" behavior. Results from all three essays provide policy makers with helpful information to shape future federal energy programs.
Feng, Qianmei
2007-10-01
Federal law mandates that every checked bag at all commercial airports be screened by explosive detection systems (EDS), explosive trace detection systems (ETD), or alternative technologies. These technologies serve as critical components of airport security systems that strive to reduce security risks at both national and global levels. To improve the operational efficiency and airport security, emerging image-based technologies have been developed, such as dual-energy X-ray (DX), backscatter X-ray (BX), and multiview tomography (MVT). These technologies differ widely in purchasing cost, maintenance cost, operating cost, processing rate, and accuracy. Based on a mathematical framework that takes into account all these factors, this article investigates two critical issues for operating screening devices: setting specifications for continuous security responses by different technologies; and selecting technology or combination of technologies for efficient 100% baggage screening. For continuous security responses, specifications or thresholds are used for classifying threat items from nonthreat items. By investigating the setting of specifications on system security responses, this article assesses the risk and cost effectiveness of various technologies for both single-device and two-device systems. The findings provide the best selection of image-based technologies for both single-device and two-device systems. Our study suggests that two-device systems outperform single-device systems in terms of both cost effectiveness and accuracy. The model can be readily extended to evaluate risk and cost effectiveness of multiple-device systems for airport checked-baggage security screening.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lercher, Johannes
PNNL’s catalysis research is serving as a catalyst for changing how our nation will secure a strong, clean energy future. Senior Physical Chemist Johannes Lercher leads an award-winning team that is developing catalysts that efficiently make fuels from alternate feedstocks, such as biomass, and can store electrical energy in chemical bonds. The researchers are also creating catalysts that can increase vehicle fuel efficiency, while simultaneously cutting emissions. About 80 percent of all man-made materials — from plastics to pharmaceuticals — are made using catalysts. Through PNNL’s Institute for Integrated Catalysis, Johannes and colleagues study how to speed the catalysis reactionmore » process for manufacturers, which ultimately cuts costs and production time.« less
An investigation on nuclear energy policy in Turkey and public perception
NASA Astrophysics Data System (ADS)
Coskun, Mehmet Burhanettin; Tanriover, Banu
2016-11-01
Turkey, which meets nearly 70 per cent of its energy demands with import, is facing the problems of energy security and current account deficit as a result of its dependence on foreign sources in terms of energy input. It is also known that Turkey is having environmental problems due to the increases in CO2 emission. Considering these problems in Turkish economy, where energy input is commonly used, it is necessary to use energy sources efficiently and provide alternative energy sources. Due to the dependency of renewable sources on meteorological conditions (the absence of enough sun, wind, and water sources), the energy generation could not be provided efficiently and permanently from these sources. At this point, nuclear energy as analternative energy source maintains its importance as a sustainable energy source that providing energy in 7 days and 24 hours. The main purpose of this study is to evaluate the nuclear energy subject within the context of negative public perceptions emerged after Chernobyl (1986) and Fukushima (2011) disasters and to investigate in the economic framework.
Alternative Fuels Data Center: Electricity
efficiency. Using electricity to power vehicles can have significant energy security and emissions benefits . Icon of an information sign. Basics Find information about using electricity as a vehicle fuel Considerations Explore the benefits and considerations of using electricity as a vehicle fuel. Icon of a fueling
Solar fed DC-DC single ended primary inductance converter for low power applications
NASA Astrophysics Data System (ADS)
Narendranath, K. V.; Viswanath, Y.; Babu, K. Suresh; Arunkumar, G.; Elangovan, D.
2017-11-01
This paper presents 34 to 36 volts. SEPIC converter for solar fed applications. Now days, there has been tremendous increase in the usage of solar energy and this solar energy is most valuable energy source available all around the world. The solar energy system require a Dc-Dc converter in order to modulate and govern the changing output of the panel. In this paper, a system comprising of Single Ended Primary Inductance Converter [SEPIC] integrated with solar panel is proposed. This paper proposes SEPIC power converter design that will secure high performance and cost efficiency while powering up a LAMP load. This power converter designed with low output ripple voltage, higher efficiency and less electrical pressure on the power switching elements. The simulation and prototype hardware results are presented in this paper.
NASA Astrophysics Data System (ADS)
Hebner, Greg
2010-11-01
Products and consumer goods that utilize low temperature plasmas at some point in their creation touch and enrich our lives on almost a continuous basis. Examples are many but include the tremendous advances in microelectronics and the pervasive nature of the internet, advanced material coatings that increase the strength and reliability of products from turbine engines to potato chip bags, and the recent national emphasis on energy efficient lighting and compact fluorescent bulbs. Each of these products owes their contributions to energy security and international competiveness to fundamental research investments. However, it would be a mistake to believe that the great commercial success of these products implies a robust understanding of the complicated interactions inherent in plasma systems. Rather, current development of the next generation of low temperature plasma enabled products and processes is clearly exposing a new set of exciting scientific challenges that require leaps in fundamental understanding and interdisciplinary research teams. Emerging applications such as liquid-plasma systems to improve water quality and remediate hazardous chemicals, plasma-assisted combustion to increase energy efficiency and reduce emissions, and medical applications promise to improve our lives and the environment only if difficult science questions are solved. This talk will take a brief look back at the role of low temperature plasma science in enabling entirely new markets and then survey the next generation of emerging plasma applications. The emphasis will be on describing the key science questions and the opportunities for scientific cross cutting collaborations that underscore the need for increased outreach on the part of the plasma science community to improve visibility at the federal program level. This work is supported by the DOE, Office of Science for Fusion Energy Sciences, and Sandia National Laboratories, a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000
AES based secure low energy adaptive clustering hierarchy for WSNs
NASA Astrophysics Data System (ADS)
Kishore, K. R.; Sarma, N. V. S. N.
2013-01-01
Wireless sensor networks (WSNs) provide a low cost solution in diversified application areas. The wireless sensor nodes are inexpensive tiny devices with limited storage, computational capability and power. They are being deployed in large scale in both military and civilian applications. Security of the data is one of the key concerns where large numbers of nodes are deployed. Here, an energy-efficient secure routing protocol, secure-LEACH (Low Energy Adaptive Clustering Hierarchy) for WSNs based on the Advanced Encryption Standard (AES) is being proposed. This crypto system is a session based one and a new session key is assigned for each new session. The network (WSN) is divided into number of groups or clusters and a cluster head (CH) is selected among the member nodes of each cluster. The measured data from the nodes is aggregated by the respective CH's and then each CH relays this data to another CH towards the gateway node in the WSN which in turn sends the same to the Base station (BS). In order to maintain confidentiality of data while being transmitted, it is necessary to encrypt the data before sending at every hop, from a node to the CH and from the CH to another CH or to the gateway node.
Emerging Regional Energy Security Issues China
2009-09-29
moving toward European standards and taxation of least efficient vehicles www.csis.org | 7 China’s Energy Strategy - Clean Power Generation...Project Type of Contract Signature Date Estimated Value Contractor(s) Remarks Malaysian Amona (Main Contractor), Chinese COSL and CNOOC The first...infrastructure. List of Upstream Agreements Between Iran and China in Recent Years ** The original buyback contract w as signed betw een Malaysian Amona and
US Clean Energy Sector and the Opportunity for Modeling and Simulation
NASA Technical Reports Server (NTRS)
Inge, Carole Cameron
2011-01-01
The following paper sets forth the current understanding of the US clean energy demand and opportunity. As clean energy systems come online and technology is developed, modeling and simulation of these complex energy programs provides an untapped business opportunity. The US Department of Defense provides a great venue for developing new technology in the energy sector because it is demanding lower fuel costs, more energy efficiencies in its buildings and bases, and overall improvements in its carbon footprint. These issues coupled with the security issues faced by foreign dependence on oil will soon bring more clean energy innovations to the forefront (lighter batteries for soldiers, alternative fuel for jets, energy storage systems for ships, etc).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Erhart, Steven C.; Spencer, Charles G.
The accomplishments to date and the long-range planning of the Y-12 Energy Management and Sustainability and Stewardship programs support the U.S. Department of Energy (DOE) and the National Nuclear Security Administration (NNSA) vision for a commitment to energy effi ciency and sustainability and to achievement of the Guiding Principles. Specifi cally, the Y-12 vision is to support the Environment, Safety and Health Policy and the DOE Strategic Sustainability Performance Plan (SSPP), while promoting overall sustainability and reduction of greenhouse gas (GHG) emissions. The mission of the Y-12 Energy Management program is to incorporate energy-efficient technologies site-wide and to position Y-12more » to meet NNSA energy requirement needs through 2025 and beyond. This plan addresses: Greenhouse Gas Reduction and Comprehensive Greenhouse Gas Inventory; Buildings, ESPC Initiative Schedule, and Regional and Local Planning; Fleet Management; Water Use Efficiency and Management; Pollution Prevention and Waste Reduction; Sustainable Acquisition; Electronic Stewardship and Data Centers; Renewable Energy; Climate Change; and Budget and Funding.« less
The Water-Energy-Food Nexus in Kazakhstan: Trends and Analyses
NASA Astrophysics Data System (ADS)
Karatayev, Marat; Rivotti, Pedro; Sobral Mourão, Zenaida; Konadu, D. Dennis; Clarke, Michèle
2017-04-01
The concept of the water, energy and food nexus is extremely relevant to Kazakhstan as the country faces population growth, economic progress and environmental challenges such as water scarcity, desertification, and climate change. Furthermore, poor sectoral coordination and institutional fragmentation have caused an unsustainable resource use and threaten the long-term sustainability of water, energy and food security in Kazakhstan. Specifically, low tariffs in the water and electricity sectors have led to under-investment in water and energy efficiency measures, leading to extensive water losses, soil salinity, as well as degradation of agricultural land. Using the nexus approach, this study aims to investigate and map the linkages between water resources, energy production and food security in Kazakhstan, with an emphasis on the current coordination framework. This will enable the identification of critical interdependency issues in the management of these resources. The results will provide a better understanding of the current interconnectedness of the sectors, and support the coordination of decision-making at various levels of governance and research of land, water and energy to meet sustainable development goals.
MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain.
Fan, Kai; Wang, Shangyang; Ren, Yanhui; Li, Hui; Yang, Yintang
2018-06-21
With the development of electronic information technology, electronic medical records (EMRs) have been a common way to store the patients' data in hospitals. They are stored in different hospitals' databases, even for the same patient. Therefore, it is difficult to construct a summarized EMR for one patient from multiple hospital databases due to the security and privacy concerns. Meanwhile, current EMRs systems lack a standard data management and sharing policy, making it difficult for pharmaceutical scientists to develop precise medicines based on data obtained under different policies. To solve the above problems, we proposed a blockchain-based information management system, MedBlock, to handle patients' information. In this scheme, the distributed ledger of MedBlock allows the efficient EMRs access and EMRs retrieval. The improved consensus mechanism achieves consensus of EMRs without large energy consumption and network congestion. In addition, MedBlock also exhibits high information security combining the customized access control protocols and symmetric cryptography. MedBlock can play an important role in the sensitive medical information sharing.
Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford
2015-04-01
While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implementedmore » a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.« less
Perumal, Madhumathy; Dhandapani, Sivakumar
2015-01-01
Data gathering and optimal path selection for wireless sensor networks (WSN) using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS). This protocol finds the rendezvous point for optimal transmission of data using a "splitting tree" technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the "Biased Random Walk" model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS) is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR) protocol to prove that there is increase in the network lifetime compared with other routing protocols.
Economic and environmental evaluation of compressed-air cars
NASA Astrophysics Data System (ADS)
Creutzig, Felix; Papson, Andrew; Schipper, Lee; Kammen, Daniel M.
2009-10-01
Climate change and energy security require a reduction in travel demand, a modal shift, and technological innovation in the transport sector. Through a series of press releases and demonstrations, a car using energy stored in compressed air produced by a compressor has been suggested as an environmentally friendly vehicle of the future. We analyze the thermodynamic efficiency of a compressed-air car powered by a pneumatic engine and consider the merits of compressed air versus chemical storage of potential energy. Even under highly optimistic assumptions the compressed-air car is significantly less efficient than a battery electric vehicle and produces more greenhouse gas emissions than a conventional gas-powered car with a coal intensive power mix. However, a pneumatic-combustion hybrid is technologically feasible, inexpensive and could eventually compete with hybrid electric vehicles.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anderson, K.; Markel, T.; Simpson, M.
The U.S. Army's Fort Carson installation was selected to serve as a prototype for net zero energy assessment and planning. NREL performed the comprehensive assessment to appraise the potential of Fort Carson to achieve net zero energy status through energy efficiency, renewable energy, and electric vehicle integration. This report summarizes the results of the assessment and provides energy recommendations. This study is part of a larger cross-laboratory effort that also includes an assessment of renewable opportunities at seven other DoD Front Range installations, a microgrid design for Fort Carson critical loads and an assessment of regulatory and market-based barriers tomore » a regional secure smart grid.« less
NASA Astrophysics Data System (ADS)
Şoimoşan, Teodora M.; Danku, Gelu; Felseghi, Raluca A.
2017-12-01
Within the thermo-energy optimization process of an existing heating system, the increase of the system's energy efficiency and speeding-up the transition to green energy use are pursued. The concept of multi-energy district heating system, with high harnessing levels of the renewable energy sources (RES) in order to produce heat, is expected to be the key-element in the future urban energy infrastructure, due to the important role it can have in the strategies of optimizing and decarbonizing the existing district heating systems. The issues that arise are related to the efficient integration of different technologies of harnessing renewable energy sources in the energy mix and to the increase of the participation levels of RES, respectively. For the holistic modeling of the district heating system, the concept of the energy hub was used, where the synergy of different primary forms of entered energy provides the system a high degree energy security and flexibility in operation. The optimization of energy flows within the energy hub allows the optimization of the thermo-energy district system in order to approach the dual concept of smart city & smart energy.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-24
... associated with climate change in addition to securing energy independence through reduction of oil imports... (NHTSA) is denying the petition of Plant Oil Powered Diesel Fuel Systems, Inc. (``POP Diesel'') to amend... petitioner's assertion that a failure to specifically consider pure vegetable oil, and technology to enable...
Security and privacy issues in implantable medical devices: A comprehensive survey.
Camara, Carmen; Peris-Lopez, Pedro; Tapiador, Juan E
2015-06-01
Bioengineering is a field in expansion. New technologies are appearing to provide a more efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) constitute one example, these being devices with more computing, decision making and communication capabilities. Several research works in the computer security field have identified serious security and privacy risks in IMDs that could compromise the implant and even the health of the patient who carries it. This article surveys the main security goals for the next generation of IMDs and analyzes the most relevant protection mechanisms proposed so far. On the one hand, the security proposals must have into consideration the inherent constraints of these small and implanted devices: energy, storage and computing power. On the other hand, proposed solutions must achieve an adequate balance between the safety of the patient and the security level offered, with the battery lifetime being another critical parameter in the design phase. Copyright © 2015 Elsevier Inc. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Petersen, Joseph M.; Boyd, Paul A.; Dahowski, Robert T.
The purpose of this assessment was to undertake an assessment and analysis of cost-effective options for energy-efficiency improvements and the deployment of a micro-grid to increase the energy resilience at the U.S. Virgin Islands Industrial Development Park (IDP) and adjacent facilities in St. Croix, Virgin Islands. The Economic Development Authority sought assistance from the U.S. Department of Energy to undertake this assessment undertaken by Pacific Northwest National Laboratory. The assessment included 18 buildings plus the perimeter security lighting at the Virgin Islands Bureau of Correctional Facility, four buildings plus exterior lighting at the IDP, and five buildings (one of whichmore » is to be constructed) at the Virgin Islands Police Department for a total of 27 buildings with a total of nearly 323,000 square feet.« less
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-04-12
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.
Smart Buildings: An Introduction to the Library of the Future.
Hoy, Matthew B
2016-01-01
Advances in building technologies are combining energy efficiency, networked sensors, and data recording in exciting ways. Modern facilities can adjust lighting, heating, and cooling outputs to maximize efficiency, provide better physical security, improve wayfinding for occupants, and provide detailed reports of building use. This column will briefly explore the idea of "smart buildings," describe some of the technologies that are being developed for these buildings, and explore their implications for libraries. A brief listing of selected smart building technologies is also provided.
High-Octane Mid-Level Ethanol Blend Market Assessment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Johnson, Caley; Newes, Emily; Brooker, Aaron
2015-12-01
The United States government has been promoting increased use of biofuels, including ethanol from non-food feedstocks, through policies contained in the Energy Independence and Security Act of 2007. The objective is to enhance energy security, reduce greenhouse gas (GHG) emissions, and provide economic benefits. However, the United States has reached the ethanol blend wall, where more ethanol is produced domestically than can be blended into standard gasoline. Nearly all ethanol is blended at 10 volume percent (vol%) in gasoline. At the same time, the introduction of more stringent standards for fuel economy and GHG tailpipe emissions is driving research tomore » increase the efficiency of spark ignition (SI) engines. Advanced strategies for increasing SI engine efficiency are enabled by higher octane number (more highly knock-resistant) fuels. Ethanol has a research octane number (RON) of 109, compared to typical U.S. regular gasoline at 91-93. Accordingly, high RON ethanol blends containing 20 vol% to 40 vol% ethanol are being extensively studied as fuels that enable design of more efficient engines. These blends are referred to as high-octane fuel (HOF) in this report. HOF could enable dramatic growth in the U.S. ethanol industry, with consequent energy security and GHG emission benefits, while also supporting introduction of more efficient vehicles. HOF could provide the additional ethanol demand necessary for more widespread deployment of cellulosic ethanol. However, the potential of HOF can be realized only if it is adopted by the motor fuel marketplace. This study assesses the feasibility, economics, and logistics of this adoption by the four required participants--drivers, vehicle manufacturers, fuel retailers, and fuel producers. It first assesses the benefits that could motivate these participants to adopt HOF. Then it focuses on the drawbacks and barriers that these participants could face when adopting HOF and proposes strategies--including incentives and policies--to curtail these barriers. These curtailment strategies are grouped into scenarios that are then modeled to investigate their feasibility and explore the dynamics involved in HOF deployment. This report does not advocate for or against incentives or policies, but presents simulations of their effects.« less
Global CLEWs model - A novel application of OSeMOSYS
NASA Astrophysics Data System (ADS)
Avgerinopoulos, Georgios; Pereira Ramos, Eunice; Howells, Mark
2017-04-01
Over the past years, studies that analyse Nexus issues from a holistic point of view and not energy, land or water separately have been gaining momentum. This project aims at giving insights into global issues through the application and the analysis of a global scale OSeMOSYS model. The latter -which is based on a fully open and amendable code- has been used successfully in the latest years as it has been the producing fully accessible energy models suitable for capacity building and policy making suggestions. This study develops a CLEWs (climate, land, energy and water) model with the objective of interrogating global challenges (e.g. increasing food demand) and international trade features, with policy priorities on food security, resource efficiency, low-carbon energy and climate change mitigation, water availability and vulnerability to water stress and floods, water quality, biodiversity and ecosystem services. It will for instance assess (i) the impact of water constraints on food security and human development (clean water for human use; industrial and energy water demands), as well as (ii) the impact of climate change on aggravating or relieving water problems.
Guo, Wenzhong; Hong, Wei; Zhang, Bin; Chen, Yuzhong; Xiong, Naixue
2014-01-01
Mobile security is one of the most fundamental problems in Wireless Sensor Networks (WSNs). The data transmission path will be compromised for some disabled nodes. To construct a secure and reliable network, designing an adaptive route strategy which optimizes energy consumption and network lifetime of the aggregation cost is of great importance. In this paper, we address the reliable data aggregation route problem for WSNs. Firstly, to ensure nodes work properly, we propose a data aggregation route algorithm which improves the energy efficiency in the WSN. The construction process achieved through discrete particle swarm optimization (DPSO) saves node energy costs. Then, to balance the network load and establish a reliable network, an adaptive route algorithm with the minimal energy and the maximum lifetime is proposed. Since it is a non-linear constrained multi-objective optimization problem, in this paper we propose a DPSO with the multi-objective fitness function combined with the phenotype sharing function and penalty function to find available routes. Experimental results show that compared with other tree routing algorithms our algorithm can effectively reduce energy consumption and trade off energy consumption and network lifetime. PMID:25215944
NASA Astrophysics Data System (ADS)
Prada, Jose Fernando
Keeping a contingency reserve in power systems is necessary to preserve the security of real-time operations. This work studies two different approaches to the optimal allocation of energy and reserves in the day-ahead generation scheduling process. Part I presents a stochastic security-constrained unit commitment model to co-optimize energy and the locational reserves required to respond to a set of uncertain generation contingencies, using a novel state-based formulation. The model is applied in an offer-based electricity market to allocate contingency reserves throughout the power grid, in order to comply with the N-1 security criterion under transmission congestion. The objective is to minimize expected dispatch and reserve costs, together with post contingency corrective redispatch costs, modeling the probability of generation failure and associated post contingency states. The characteristics of the scheduling problem are exploited to formulate a computationally efficient method, consistent with established operational practices. We simulated the distribution of locational contingency reserves on the IEEE RTS96 system and compared the results with the conventional deterministic method. We found that assigning locational spinning reserves can guarantee an N-1 secure dispatch accounting for transmission congestion at a reasonable extra cost. The simulations also showed little value of allocating downward reserves but sizable operating savings from co-optimizing locational nonspinning reserves. Overall, the results indicate the computational tractability of the proposed method. Part II presents a distributed generation scheduling model to optimally allocate energy and spinning reserves among competing generators in a day-ahead market. The model is based on the coordination between individual generators and a market entity. The proposed method uses forecasting, augmented pricing and locational signals to induce efficient commitment of generators based on firm posted prices. It is price-based but does not rely on multiple iterations, minimizes information exchange and simplifies the market clearing process. Simulations of the distributed method performed on a six-bus test system showed that, using an appropriate set of prices, it is possible to emulate the results of a conventional centralized solution, without need of providing make-whole payments to generators. Likewise, they showed that the distributed method can accommodate transactions with different products and complex security constraints.
Development of a performance-based industrial energy efficiency indicator for corn refining plants.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Boyd, G. A.; Decision and Information Sciences; USEPA
2006-07-31
Organizations that implement strategic energy management programs have the potential to achieve sustained energy savings if the programs are carried out properly. A key opportunity for achieving energy savings that plant managers can take is to determine an appropriate level of energy performance by comparing their plant's performance with that of similar plants in the same industry. Manufacturing facilities can set energy efficiency targets by using performance-based indicators. The U.S. Environmental Protection Agency (EPA), through its ENERGY STAR{reg_sign} program, has been developing plant energy performance indicators (EPIs) to encourage a variety of U.S. industries to use energy more efficiently. Thismore » report describes work with the corn refining industry to provide a plant-level indicator of energy efficiency for facilities that produce a variety of products--including corn starch, corn oil, animal feed, corn sweeteners, and ethanol--for the paper, food, beverage, and other industries in the United States. Consideration is given to the role that performance-based indicators play in motivating change; the steps needed to develop indicators, including interacting with an industry to secure adequate data for an indicator; and the actual application and use of an indicator when complete. How indicators are employed in the EPA's efforts to encourage industries to voluntarily improve their use of energy is discussed as well. The report describes the data and statistical methods used to construct the EPI for corn refining plants. Individual equations are presented, as are the instructions for using them in an associated Excel spreadsheet.« less
Coles, Graeme D; Wratten, Stephen D; Porter, John R
2016-01-01
Human food security requires the production of sufficient quantities of both high-quality protein and dietary energy. In a series of case-studies from New Zealand, we show that while production of food ingredients from crops on arable land can meet human dietary energy requirements effectively, requirements for high-quality protein are met more efficiently by animal production from such land. We present a model that can be used to assess dietary energy and quality-corrected protein production from various crop and crop/animal production systems, and demonstrate its utility. We extend our analysis with an accompanying economic analysis of commercially-available, pre-prepared or simply-cooked foods that can be produced from our case-study crop and animal products. We calculate the per-person, per-day cost of both quality-corrected protein and dietary energy as provided in the processed foods. We conclude that mixed dairy/cropping systems provide the greatest quantity of high-quality protein per unit price to the consumer, have the highest food energy production and can support the dietary requirements of the highest number of people, when assessed as all-year-round production systems. Global food and nutritional security will largely be an outcome of national or regional agroeconomies addressing their own food needs. We hope that our model will be used for similar analyses of food production systems in other countries, agroecological zones and economies.
Energy Security: The Pathway to a Cost-Effective, Efficient, and Reliable Energy Future
2010-03-12
mention of these facilities is likely to incite talk of grisly death and destruction of biblical proportion. Such is the plight of the nuclear...gulf-of-mexico/,. (accessed January 12, 2010)0 31 John W Schoen, "Can Technology Help find Oil Fast Enough?", msnbc.com, December 20, 2004, http:l...John W. "Can Technology Help find Oil Fast Enough?", msnbc.com, December 20, 2004, http://www.msnbc.msn.com/id/6072980/, (accessed January 11, 2010
Analysis of Marine Corps Renewable Energy Planning to Meet Installation Energy Security Requirements
2013-12-03
experimentation eventually gives way to the era of ferment . A few new technologies break through in the industry and are applied to a growing number of niche...experimentation and ferment eventually give way to an era of incremental change, where the industry down-selects to the most successful and efficient...clearly in the later part of the era of incremental change. Most renewables, however, are only just now moving into the second phase, the era of ferment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lawton, Craig R.; Welch, Kimberly M.; Kerper, Jessica
2010-06-01
The Department of Defense's (DoD) Energy Posture identified dependence of the US Military on fossil fuel energy as a key issue facing the military. Inefficient energy consumption leads to increased costs, effects operational performance and warfighter protection through large and vulnerable logistics support infrastructures. Military's use of energy is a critical national security problem. DoD's proposed metrics Fully Burdened Cost of Fuel and Energy Efficiency Key Performance Parameter (FBCF and Energy KPP) are a positive step to force energy use accountability onto Military programs. The ability to measure impacts of sustainment are required to fully measure Energy KPP. Sandia's workmore » with Army demonstrates the capability to measure performance which includes energy constraint.« less
Energy Efficiency and Air Quality Repairs at Lyonsdale Biomass
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brower, Michael R; Morrison, James A; Spomer, Eric
2012-07-31
This project enabled Lyonsdale Biomass, LLC to effect analyses, repairs and upgrades for its biomass cogeneration facility located in Lewis County, New York and close by the Adirondack Park to reduce air emissions by improving combustion technique and through the overall reduction of biomass throughput by increasing the system's thermodynamic efficiency for its steam-electrical generating cycle. Project outcomes result in significant local, New York State, Northeast U.S. and national benefits including improved renewable energy operational surety, enhanced renewable energy efficiency and more freedom from foreign fossil fuel source dependence. Specifically, the reliability of the Lyonsdale Biomass 20MWe woody biomass combined-heatmore » and power (CHP) was and is now directly enhanced. The New York State and Lewis County benefits are equally substantial since the facility sustains 26 full-time equivalency (FTE) jobs at the facility and as many as 125 FTE jobs in the biomass logistics supply chain. Additionally, the project sustains essential local and state payment in lieu of taxes revenues. This project helps meet several USDOE milestones and contributes directly to the following sustainability goals: Climate: Reduces greenhouse gas emissions associated with bio-power production, conversion and use, in comparison to fossil fuels. Efficiency and Productivity: Enhances efficient use of renewable resources and maximizes conversion efficiency and productivity. Profitability: Lowers production costs. Rural Development: Enhances economic welfare and rural development through job creation and income generation. Standards: Develop standards and corresponding metrics for ensuring sustainable biopower production. Energy Diversification and Security: Reduces dependence on foreign oil and increases energy supply diversity. Net Energy Balance: Ensures positive net energy balance for all alternatives to fossil fuels.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-04
... security screening procedures. If a foreign national wishes to participate in the public meeting, please..., Microsoft Word, PDF, or ASCII file format, and avoid the use of special characters or any form of encryption... that comments sent by mail are often delayed and may be damaged by mail screening processes.) Hand...
Ethanol production from woody biomass: Silvicultural opportunities for suppressed western conifers
Andrew Youngblood; Junyong Zhu; C. Tim Scott
2010-01-01
The 2007 Energy Security and Independence Act (ESIA) requires 16 billion gallons of ethanol to be produced from lignocellulose biomass by 2022 in the United States. Forests can be a key source of renewable lignocellulose for ethanol production if cost and conversion efficiency barriers can be overcome. We explored opportunities for using woody biomass from thinning...
2015 Enterprise Strategic Vision
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2015-08-01
This document aligns with the Department of Energy Strategic Plan for 2014-2018 and provides a framework for integrating our missions and direction for pursuing DOE’s strategic goals. The vision is a guide to advancing world-class science and engineering, supporting our people, modernizing our infrastructure, and developing a management culture that operates a safe and secure enterprise in an efficient manner.
Environmental Lessons from China: Finding Promising Policies in Unlikely Places
Zhang, Junfeng
2011-01-01
Background: Alongside the major health risks posed by environmental pollution in China are recent achievements on several environmental issues that have affluent Western nations racing to catch up. The country has propelled itself to a position of leadership in clean energy and efficiency, for instance, with important consequences for public health. Objectives: We comment on China’s challenges and recent accomplishments in addressing environmental problems from domestic pollution to global climate change. We compare China’s commitment to clean energy technology with that of other leading nations and discuss key achievements in other areas, including vehicle efficiency standards and transportation policy. Discussion: We discuss policy directions that would secure much-needed improvements to environmental quality and health in China, along with actions that could motivate global action on issues of energy conservation and pollution reduction. Conclusions: A comprehensive regulatory and institutional framework for environmental policy is within reach in China but will require addressing major hurdles such as the lack of an independent monitoring mechanism and the need for greater transparency and enforcement in environmental matters. Meanwhile, China can continue to set important examples by investing in renewable energy, improving energy efficiency, and limiting greenhouse gas emissions. PMID:21402514
Improving the Quality and Scope of EIA Data
2011-01-01
Section 805(a) of the Energy Independence and Security Act of 2007 (EISA), Public Law 110-1401 requires the U.S. Energy Information Administration (EIA) to establish a five-year plan to enhance the quality and scope of its data collection necessary to ensure that the scope, accuracy, and timeliness of the information needed for efficient functioning of energy markets and related financial operations. This report is in response to section 805(b) of EISA which calls on EIA to submit to Congress the plan established under subsection (a), including a description of any improvements needed to enhance the ability of the Administrator to collect and process energy information in a manner consistent with the needs of energy markets.
NASA Astrophysics Data System (ADS)
Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede
2015-12-01
Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki
Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Selfmore » Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.« less
2016-10-28
constraints and wire routing issues. • Outside sites have more space, but require outdoor rated equipment (NEMA outdoor rated.. ) and more maintenance...sustainable power, in many different types, sizes and capacities, as follows: • Cogen Plant #1 B1579: 7.2MW gas-fired turbine at Substation “AA...Cogen Plant #2 B1991: (2) 4.6MW gas-fired turbines at “Gillespie” Substation • 300kW fuel cell at Substation “AA” • PPA: 1.015MW solar photovoltaic
Tang, Jiawei; Liu, Anfeng; Zhang, Jian; Xiong, Neal N; Zeng, Zhiwen; Wang, Tian
2018-03-01
The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in Energy-Harvesting Wireless Sensor Networks (EHWSNs). The main contributions of a TBSR are (a) the source nodes send data and notification to sinks through disjoint paths, separately; in such a mechanism, the data and notification can be verified independently to ensure their security. (b) Furthermore, the data and notification adopt a dynamic probability of marking and logging approach during the routing. Therefore, when attacked, the network will adopt the traceback approach to locate and clear malicious nodes to ensure security. The probability of marking is determined based on the level of battery remaining; when nodes harvest more energy, the probability of marking is higher, which can improve network security. Because if the probability of marking is higher, the number of marked nodes on the data packet routing path will be more, and the sink will be more likely to trace back the data packet routing path and find malicious nodes according to this notification. When data packets are routed again, they tend to bypass these malicious nodes, which make the success rate of routing higher and lead to improved network security. When the battery level is low, the probability of marking will be decreased, which is able to save energy. For logging, when the battery level is high, the network adopts a larger probability of marking and smaller probability of logging to transmit notification to the sink, which can reserve enough storage space to meet the storage demand for the period of the battery on low level; when the battery level is low, increasing the probability of logging can reduce energy consumption. After the level of battery remaining is high enough, nodes then send the notification which was logged before to the sink. Compared with past solutions, our results indicate that the performance of the TBSR scheme has been improved comprehensively; it can effectively increase the quantity of notification received by the sink by 20%, increase energy efficiency by 11%, reduce the maximum storage capacity needed by nodes by 33.3% and improve the success rate of routing by approximately 16.30%.
Tang, Jiawei; Zhang, Jian; Zeng, Zhiwen; Wang, Tian
2018-01-01
The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in Energy-Harvesting Wireless Sensor Networks (EHWSNs). The main contributions of a TBSR are (a) the source nodes send data and notification to sinks through disjoint paths, separately; in such a mechanism, the data and notification can be verified independently to ensure their security. (b) Furthermore, the data and notification adopt a dynamic probability of marking and logging approach during the routing. Therefore, when attacked, the network will adopt the traceback approach to locate and clear malicious nodes to ensure security. The probability of marking is determined based on the level of battery remaining; when nodes harvest more energy, the probability of marking is higher, which can improve network security. Because if the probability of marking is higher, the number of marked nodes on the data packet routing path will be more, and the sink will be more likely to trace back the data packet routing path and find malicious nodes according to this notification. When data packets are routed again, they tend to bypass these malicious nodes, which make the success rate of routing higher and lead to improved network security. When the battery level is low, the probability of marking will be decreased, which is able to save energy. For logging, when the battery level is high, the network adopts a larger probability of marking and smaller probability of logging to transmit notification to the sink, which can reserve enough storage space to meet the storage demand for the period of the battery on low level; when the battery level is low, increasing the probability of logging can reduce energy consumption. After the level of battery remaining is high enough, nodes then send the notification which was logged before to the sink. Compared with past solutions, our results indicate that the performance of the TBSR scheme has been improved comprehensively; it can effectively increase the quantity of notification received by the sink by 20%, increase energy efficiency by 11%, reduce the maximum storage capacity needed by nodes by 33.3% and improve the success rate of routing by approximately 16.30%. PMID:29494561
Energy System Integration Facility Secure Data Center | Energy Systems
Integration Facility | NREL Energy System Integration Facility Secure Data Center Energy System Integration Facility Secure Data Center The Energy Systems Integration Facility's Secure Data Center provides
Zhang, Shun; Chen, Chen; Zhou, Yangen; Qian, Yumin; Ye, Jing; Xiong, Shiyun; Zhao, Yu; Zhang, Xiaohong
2018-06-27
The rapid deployment of renewable energy is resulting in significant energy security, climate change mitigation, and economic benefits. We demonstrate here the direct solar-energy harvesting and storage in a rechargeable solar-powered redox cell, which can be charged solely by solar irradiation. The cell follows a conventional redox-flow cell design with one integrated TiO 2 photoanode in the cathode side. Direct charging of the cell by solar irradiation results in the conversion of solar energy in to chemical energy. Whereas discharging the cell leads to the release of chemical energy in the form of electricity. The cell integrates energy conversion and storage processes in a single device, making the solar energy directly and efficiently dispatchable. When using redox couples of Br 2 /Br - and I 3 - /I - in the cathode side and anode side, respectively, the cell can be directly charged upon solar irradiation, yielding a discharge potential of 0.5 V with good round-trip efficiencies. This design is expected to be a potential alternative toward the development of affordable, inexhaustible, and clean solar-energy technologies.
Neutron detection with a NaI spectrometer using high-energy photons
NASA Astrophysics Data System (ADS)
Holm, Philip; Peräjärvi, Kari; Sihvonen, Ari-Pekka; Siiskonen, Teemu; Toivonen, Harri
2013-01-01
Neutrons can be indirectly detected by high-energy photons. The performance of a 4″×4″×16″ NaI portal monitor was compared to a 3He-based portal monitor with a comparable cross-section of the active volume. Measurements were performed with bare and shielded 252Cf and AmBe sources. With an optimum converter and moderator structure for the NaI detector, the detection efficiencies and minimum detectable activities of the portal monitors were similar. The NaI portal monitor preserved its detection efficiency much better with shielded sources, making the method very interesting for security applications. For heavily shielded sources, the NaI detector was 2-3 times more sensitive than the 3He-based detector.
Renewable Energy Laboratory Development for Biofuels Advanced Combustion Studies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Soloiu, Valentin A.
2012-03-31
The research advanced fundamental science and applied engineering for increasing the efficiency of internal combustion engines and meeting emissions regulations with biofuels. The project developed a laboratory with new experiments and allowed investigation of new fuels and their combustion and emissions. This project supports a sustainable domestic biofuels and automotive industry creating economic opportunities across the nation, reducing the dependence on foreign oil, and enhancing U.S. energy security. The one year period of research developed fundamental knowledge and applied technology in advanced combustion, emissions and biofuels formulation to increase vehicle's efficiency. Biofuels combustion was investigated in a Compression Ignition Directmore » Injection (DI) to develop idling strategies with biofuels and an Indirect Diesel Injection (IDI) intended for auxiliary power unit.« less
Sustainable sunlight to biogas is via marginal organics.
Shilton, Andy; Guieysse, Benoit
2010-06-01
Although biogas production from algae offers higher sunlight to biomass energy conversion efficiencies its production costs simply cannot compete with terrestrial plants. Unfortunately terrestrial plant cropping for biogas production is, in its own right, neither particularly sustainable nor profitable and its ongoing application is only driven by energy security concerns resulting in taxpayer subsidies. By comparison, scavenging the organic energy residual/wastes from food production offers a far more profitable and sustainable proposition and has an energy potential that dwarfs anything biogas production from dedicated energy crops can realistically offer. Thus researchers wanting to assist the development of sustainable biogas systems with viable process economics should forget about terrestrial and algal energy cropping and focus on the realm of scavengers. Copyright 2010 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anderson, E.; Antkowiak, M.; Butt, R.
The Strategic Environmental Research and Developmental Program (SERDP)/Environmental Security Technology Certification Program (ESTCP) is the Department of Defense?s (DOD) environmental science and technology program focusing on issues related to environment and energy for the military services. The SERDP/ESTCP Office requested that the National Renewable Energy Laboratory (NREL) provide technical assistance with strategic planning by evaluating the potential for several types of renewable energy technologies at DOD installations. NREL was tasked to provide technical expertise and strategic advice for the feasibility of geothermal resources, waste-to-energy technology, photovoltaics (PV), wind, microgrids, and building system technologies on military installations. This technical report ismore » the deliverable for these tasks.« less
ARPA-E: Accelerating U.S. Energy Innovation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Manser, Joseph S.; Rollin, Joseph A.; Brown, Kristen E.
ARPA-E is charged with addressing the most pressing issues facing the U.S. energy sector today, as well as those projected to impact national energy security in the future. The agency’s mission is clearly elucidated in its authorizing statute:2 “To overcome long-term and high-risk technological barriers in the development of energy technologies.” The three principal thrusts of the agency’s mission are (i) reducing energy imports, (ii) reducing energy-related emissions and greenhouse gases, and (iii) improving energy efficiency in all sectors of the U.S. economy. Meeting these ambitious challenges requires focused, interdisciplinary effort on a national scale that will help ensure themore » United States maintains a competitive lead in developing and deploying advanced energy technologies.« less
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-01-01
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866
Ensuring Data Storage Security in Tree cast Routing Architecture for Sensor Networks
NASA Astrophysics Data System (ADS)
Kumar, K. E. Naresh; Sagar, U. Vidya; Waheed, Mohd. Abdul
2010-10-01
In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, this routing architecture moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this paper, we focus on data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in this architecture, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
Security issues in healthcare applications using wireless medical sensor networks: a survey.
Kumar, Pardeep; Lee, Hoon-Jae
2012-01-01
Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.
Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey
Kumar, Pardeep; Lee, Hoon-Jae
2012-01-01
Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458
Department of Energy: Nuclear S&T workforce development programs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bingham, Michelle; Bala, Marsha; Beierschmitt, Kelly
The U.S. Department of Energy (DOE) national laboratories use their expertise in nuclear science and technology (S&T) to support a robust national nuclear S&T enterprise from the ground up. Traditional academic programs do not provide all the elements necessary to develop this expertise, so the DOE has initiated a number of supplemental programs to develop and support the nuclear S&T workforce pipeline. This document catalogs existing workforce development programs that are supported by a number of DOE offices (such as the Offices of Nuclear Energy, Science, Energy Efficiency, and Environmental Management), and by the National Nuclear Security Administration (NNSA) andmore » the Naval Reactor Program. Workforce development programs in nuclear S&T administered through the Department of Homeland Security, the Nuclear Regulatory Commission, and the Department of Defense are also included. The information about these programs, which is cataloged below, is drawn from the program websites. Some programs, such as the Minority Serving Institutes Partnership Programs (MSIPPs) are available through more than one DOE office, so they appear in more than one section of this document.« less
Waste-to-Energy: Hawaii and Guam Energy Improvement Technology Demonstration Project
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, J.; Gelman, R.; Tomberlin, G.
2014-03-01
The National Renewable Energy Laboratory (NREL) and the U.S. Navy have worked together to demonstrate new or leading-edge commercial energy technologies whose deployment will support the U.S. Department of Defense (DOD) in meeting its energy efficiency and renewable energy goals while enhancing installation energy security. This is consistent with the 2010 Quadrennial Defense Review report1 that encourages the use of 'military installations as a test bed to demonstrate and create a market for innovative energy efficiency and renewable energy technologies coming out of the private sector and DOD and Department of Energy laboratories,' as well as the July 2010 memorandummore » of understanding between DOD and the U.S. Department of Energy (DOE) that documents the intent to 'maximize DOD access to DOE technical expertise and assistance through cooperation in the deployment and pilot testing of emerging energy technologies.' As part of this joint initiative, a promising waste-to-energy (WTE) technology was selected for demonstration at the Hickam Commissary aboard the Joint Base Pearl Harbor-Hickam (JBPHH), Hawaii. The WTE technology chosen is called high-energy densification waste-to-energy conversion (HEDWEC). HEDWEC technology is the result of significant U.S. Army investment in the development of WTE technology for forward operating bases.« less
Water-energy-food security nexus: the road map
NASA Astrophysics Data System (ADS)
Hamdy, Atef
2015-04-01
The world's growing population and increased prosperity will increase global demand for energy, as well as food and water supplies in the coming decades. In the arid and semi arid regions as in most of the world water and energy have historically been managed separately, with little consideration of cross sectoral interactions, yet in reality, water and energy are closely interconnected. By addressing water and energy together planners can identify crucial interactions, conflicting demands and potential synergies. For many countries around the world it is needed to establish a road map on: (i) how to implement nexus policies to increase efficiency of natural resources management? (ii) how to bridge science with policy and business? (iii) how governments be inspired by business? (iv) how can be business be inspired by science? (v) how can we learn from each other and how collaborate to address the challenges ahead? Such road map should seek to bring together stakeholders involved in the nexus implementation approach over the coming years to develop nexus tools for decision making to quantify water energy food resources on both national and regional level. However, experiences gained and learned lessons indicate clearly that numerous countries are facing several barriers in putting in action their nexus road map due to the lack of integrated resource management, lack of capacity for research development, lack of knowledge sharing across sectors, and not enough interaction between policy makers and scientists. Those are major challenges to be faced to achieve the water, energy and food security nexus. Furthermore, such goal cannot be reached without building and strengthening the synergy between education, research and innovation for sustainable resource management. Those issues beside others will be fully discussed in this paper. Keywords: water-energy-food security; nexus
Supporting Clean Energy Development in Swaziland
DOE Office of Scientific and Technical Information (OSTI.GOV)
2016-04-01
Swaziland, a country largely dependent on regional fossil fuel imports to meet power needs, is vulnerable to supply changes and price shocks. To address this challenge, the country's National Energy Policy and Implementation Strategy prioritizes actions to enhance energy independence through scaling up renewable energy and energy efficiency. With approximately 70 percent of the country lacking electricity, Swaziland is also strongly committed to expanding energy access to support key economic and social development goals. Within this context, energy security and energy access are two foundational objectives for clean energy development in Swaziland. The partnership between the Swaziland Energy Regulatory Authoritymore » and the Clean Energy Solutions Center led to concrete outcomes to support clean energy development in Swaziland. Improving renewable energy project licensing processes will enable Swaziland to achieve key national objectives to expand clean energy access and transition to greater energy independence.« less
Three essays of economics and policy on renewable energy and energy efficiency
NASA Astrophysics Data System (ADS)
Meng, Yuxi
In face of the crisis in energy security, environmental contamination, and climate change, energy saving and carbon emission reduction have become the top concerns of the whole human world. To address those concerns, renewable energy and energy efficiency are the two fields that many countries are paying attention to, which are also my research focus. The dissertation consists of three papers, including the innovation behavior of renewable energy producers, the impact of renewable energy policy on renewable innovation, and the market feedback to energy efficient building benchmarking ordinance. Here are the main conclusions I have reached in this dissertation. First, through the study on foreign patenting intention with the case study of Chinese solar PV industry, I looked at the patenting behaviors of 15 non-Chinese solar PV producers in solar PV technologies in China, and pointed out that foreign firms may file patents in the home country or production base of their competitors in order to earn the competitive edge in the global market. The second study is about the "Innovation by Generating" process. I specifically focused on Renewable Portfolio Standard (RPS) in the United States and the innovation performance within each state, and found out that wind power generation in RPS states has developed rapidly after the adoption of RPS, while the "Innovating by Generating" effect is more significant in solar PV technologies. In general, the innovations of the two technology groups are not prominently encouraged by RPS. My last study is about the benchmarking law and market response in the scenario of Philadelphia Benchmarking Law. By comparing the rental rate of LEED/EnergyStar buildings and ordinary buildings in the city of Philadelphia before and after the adoption of the building energy efficiency benchmarking law, I believe that the passage of Philadelphia Benchmarking Law may be helpful in improving the public awareness and understanding of energy efficiency information of buildings.
NASA Astrophysics Data System (ADS)
Apriyanti, Dwi; Nugrahanto, Aris Ida; Shrestha, Sanjaya
2018-02-01
Energy consumption in the industrial sector in Indonesia is increasing as a result of population and economic growth. The government is aware of this and seeks the answer to improve industrial competitiveness and increase energy security through energy efficiency programs. Some industries have implemented energy efficiency programs as ad-hoc, but have not applied systematically, so the results are not optimal. Through the cooperation of the Ministry of Energy and Mineral Resources (ESDM) with the United Nations Industrial Development Organization (UNIDO), there has been training and mentoring activities for industry on Energy Management System (EnMS) based on SNI ISO 50001. Based on the results of identification through survey conducted to 226 industry that has attended the training and 64 industries that have been trained and received assistance, obtained data that 45% of industries have fully adopted EnMS SNI ISO 50001, 17% industry has adopted a part of EnMS SNI ISO 50001 and 38% industry does not adopt EnMS SNI ISO 50001 altogether.
Zhang, Ying; Chen, Wei; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming
2015-01-01
It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes’ mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM) is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which supports sensor node movement. It can ensure the balance of clustering, and reduce the energy consumption. In the topology maintenance stage, the digital signature authentication based on Error Correction Code (ECC) and the communication mechanism of soft handover are adopted. After verifying the legal identity of the mobile nodes, secure communications can be established, and this can increase the amount of data transmitted. Compared to some existing schemes, the proposed scheme has significant advantages regarding network topology stability, amounts of data transferred, lifetime and safety performance of the network. PMID:26633405
Zhang, Ying; Chen, Wei; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming
2015-12-01
It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes' mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM) is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which supports sensor node movement. It can ensure the balance of clustering, and reduce the energy consumption. In the topology maintenance stage, the digital signature authentication based on Error Correction Code (ECC) and the communication mechanism of soft handover are adopted. After verifying the legal identity of the mobile nodes, secure communications can be established, and this can increase the amount of data transmitted. Compared to some existing schemes, the proposed scheme has significant advantages regarding network topology stability, amounts of data transferred, lifetime and safety performance of the network.
The EGS Data Collaboration Platform: Enabling Scientific Discovery
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weers, Jonathan D; Johnston, Henry; Huggins, Jay V
Collaboration in the digital age has been stifled in recent years. Reasonable responses to legitimate security concerns have created a virtual landscape of silos and fortified castles incapable of sharing information efficiently. This trend is unfortunately opposed to the geothermal scientific community's migration toward larger, more collaborative projects. To facilitate efficient sharing of information between team members from multiple national labs, universities, and private organizations, the 'EGS Collab' team has developed a universally accessible, secure data collaboration platform and has fully integrated it with the U.S. Department of Energy's (DOE) Geothermal Data Repository (GDR) and the National Geothermal Data Systemmore » (NGDS). This paper will explore some of the challenges of collaboration in the modern digital age, highlight strategies for active data management, and discuss the integration of the EGS Collab data management platform with the GDR to enable scientific discovery through the timely dissemination of information.« less
Basic Science for a Secure Energy Future
NASA Astrophysics Data System (ADS)
Horton, Linda
2010-03-01
Anticipating a doubling in the world's energy use by the year 2050 coupled with an increasing focus on clean energy technologies, there is a national imperative for new energy technologies and improved energy efficiency. The Department of Energy's Office of Basic Energy Sciences (BES) supports fundamental research that provides the foundations for new energy technologies and supports DOE missions in energy, environment, and national security. The research crosses the full spectrum of materials and chemical sciences, as well as aspects of biosciences and geosciences, with a focus on understanding, predicting, and ultimately controlling matter and energy at electronic, atomic, and molecular levels. In addition, BES is the home for national user facilities for x-ray, neutron, nanoscale sciences, and electron beam characterization that serve over 10,000 users annually. To provide a strategic focus for these programs, BES has held a series of ``Basic Research Needs'' workshops on a number of energy topics over the past 6 years. These workshops have defined a number of research priorities in areas related to renewable, fossil, and nuclear energy -- as well as cross-cutting scientific grand challenges. These directions have helped to define the research for the recently established Energy Frontier Research Centers (EFRCs) and are foundational for the newly announced Energy Innovation Hubs. This overview will review the current BES research portfolio, including the EFRCs and user facilities, will highlight past research that has had an impact on energy technologies, and will discuss future directions as defined through the BES workshops and research opportunities.
Dimethyl ether (DME) as an alternative fuel
NASA Astrophysics Data System (ADS)
Semelsberger, Troy A.; Borup, Rodney L.; Greene, Howard L.
With ever growing concerns on environmental pollution, energy security, and future oil supplies, the global community is seeking non-petroleum based alternative fuels, along with more advanced energy technologies (e.g., fuel cells) to increase the efficiency of energy use. The most promising alternative fuel will be the fuel that has the greatest impact on society. The major impact areas include well-to-wheel greenhouse gas emissions, non-petroleum feed stocks, well-to-wheel efficiencies, fuel versatility, infrastructure, availability, economics, and safety. Compared to some of the other leading alternative fuel candidates (i.e., methane, methanol, ethanol, and Fischer-Tropsch fuels), dimethyl ether appears to have the largest potential impact on society, and should be considered as the fuel of choice for eliminating the dependency on petroleum. DME can be used as a clean high-efficiency compression ignition fuel with reduced NO x, SO x, and particulate matter, it can be efficiently reformed to hydrogen at low temperatures, and does not have large issues with toxicity, production, infrastructure, and transportation as do various other fuels. The literature relevant to DME use is reviewed and summarized to demonstrate the viability of DME as an alternative fuel.
NASA Astrophysics Data System (ADS)
Dayananda, Karanam Ravichandran; Straub, Jeremy
2017-05-01
This paper proposes a new hybrid algorithm for security, which incorporates both distributed and hierarchal approaches. It uses a mobile data collector (MDC) to collect information in order to save energy of sensor nodes in a wireless sensor network (WSN) as, in most networks, these sensor nodes have limited energy. Wireless sensor networks are prone to security problems because, among other things, it is possible to use a rogue sensor node to eavesdrop on or alter the information being transmitted. To prevent this, this paper introduces a security algorithm for MDC-based WSNs. A key use of this algorithm is to protect the confidentiality of the information sent by the sensor nodes. The sensor nodes are deployed in a random fashion and form group structures called clusters. Each cluster has a cluster head. The cluster head collects data from the other nodes using the time-division multiple access protocol. The sensor nodes send their data to the cluster head for transmission to the base station node for further processing. The MDC acts as an intermediate node between the cluster head and base station. The MDC, using its dynamic acyclic graph path, collects the data from the cluster head and sends it to base station. This approach is useful for applications including warfighting, intelligent building and medicine. To assess the proposed system, the paper presents a comparison of its performance with other approaches and algorithms that can be used for similar purposes.
Debate heats up over U.S. Energy Policy, as Senate Bill is introduced
NASA Astrophysics Data System (ADS)
Showstack, Randy
Wrapping their proposal for a national energy policy in the cloak of national security and economic prosperity a group of mostly Republican U.S. senators introduced legislation on February 26 that was praised by numerous industry groups as far-reaching, long overdue, and striking a balance between energy production and environmental protection.The bill was panned by some other senators and conservation groups as short-sighted because of what they said are its measures to continue relying on fossil fuels that could produce increased greenhouse gas emissions, its inadequate focus on energy-use efficiency and alternative energies, and—perhaps most controversially—its call for opening parts of the Arctic National Wildlife Refuge (ANWR) for oil drilling.
Sault Tribe Building Efficiency Energy Audits
DOE Office of Scientific and Technical Information (OSTI.GOV)
Holt, Jeffrey W.
2013-09-26
The Sault Ste. Marie Tribe of Chippewa Indians is working to reduce energy consumption and expense in Tribally-owned governmental buildings. The Sault Ste. Marie Tribe of Chippewa Indians will conduct energy audits of nine Tribally-owned governmental buildings in three counties in the Upper Peninsula of Michigan to provide a basis for evaluating and selecting the technical and economic viability of energy efficiency improvement options. The Sault Ste. Marie Tribe of Chippewa Indians will follow established Tribal procurement policies and procedures to secure the services of a qualified provider to conduct energy audits of nine designated buildings. The contracted provider willmore » be required to provide a progress schedule to the Tribe prior to commencing the project and submit an updated schedule with their monthly billings. Findings and analysis reports will be required for buildings as completed, and a complete Energy Audit Summary Report will be required to be submitted with the provider?s final billing. Conducting energy audits of the nine governmental buildings will disclose building inefficiencies to prioritize and address, resulting in reduced energy consumption and expense. These savings will allow Tribal resources to be reallocated to direct services, which will benefit Tribal members and families.« less
Food security: the challenge of feeding 9 billion people.
Godfray, H Charles J; Beddington, John R; Crute, Ian R; Haddad, Lawrence; Lawrence, David; Muir, James F; Pretty, Jules; Robinson, Sherman; Thomas, Sandy M; Toulmin, Camilla
2010-02-12
Continuing population and consumption growth will mean that the global demand for food will increase for at least another 40 years. Growing competition for land, water, and energy, in addition to the overexploitation of fisheries, will affect our ability to produce food, as will the urgent requirement to reduce the impact of the food system on the environment. The effects of climate change are a further threat. But the world can produce more food and can ensure that it is used more efficiently and equitably. A multifaceted and linked global strategy is needed to ensure sustainable and equitable food security, different components of which are explored here.
Authentication and Key Establishment in Dynamic Wireless Sensor Networks
Qiu, Ying; Zhou, Jianying; Baek, Joonsang; Lopez, Javier
2010-01-01
When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing. In order to provide a high level of security in this environment, the moving sensor node needs to be authenticated to new neighboring nodes and a key established for secure communication. The paper proposes an efficient and scalable protocol to establish and update the authentication key in a dynamic wireless sensor network environment. The protocol guarantees that two sensor nodes share at least one key with probability 1 (100%) with less memory and energy cost, while not causing considerable communication overhead. PMID:22319321
Energy Aware Clustering Algorithms for Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Rakhshan, Noushin; Rafsanjani, Marjan Kuchaki; Liu, Chenglian
2011-09-01
The sensor nodes deployed in wireless sensor networks (WSNs) are extremely power constrained, so maximizing the lifetime of the entire networks is mainly considered in the design. In wireless sensor networks, hierarchical network structures have the advantage of providing scalable and energy efficient solutions. In this paper, we investigate different clustering algorithms for WSNs and also compare these clustering algorithms based on metrics such as clustering distribution, cluster's load balancing, Cluster Head's (CH) selection strategy, CH's role rotation, node mobility, clusters overlapping, intra-cluster communications, reliability, security and location awareness.
Facilities and Infrastructure FY 2017 Budget At-A-Glance
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2016-03-01
The Facilities and Infrastructure Program includes EERE’s capital investments, operations and maintenance, and site-wide support of the National Renewable Energy Laboratory (NREL). It is the nation’s only national laboratory with a primary mission dedicated to the research, development and demonstration (RD&D) of energy efficiency, renewable energy and related technologies. EERE is NREL’s steward, primary client and sponsor of NREL’s designation as a Federally Funded Research and Development Center. The Facilities and Infrastructure (F&I) budget maintains NREL’s research and support infrastructure, ensures availability for EERE’s use, and provides a safe and secure workplace for employees.
Updating energy security and environmental policy: Energy security theories revisited.
Proskuryakova, L
2018-06-18
The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.
Ma, Chao; Huang, Zhonghua; Wang, Zhiqi; Zhou, Linxuan; Li, Yinlin
2017-01-01
Capacitive coupling intra-body communication (CC-IBC) has become one of the candidates for healthcare sensor networks due to its positive prevailing features of energy efficiency, transmission rate and security. Under the CC-IBC scheme, some of the electric field emitted from signal (SIG) electrode of the transmitter will couple directly to the ground (GND) electrode, acting equivalently as an internal impedance of the signal source and inducing considerable energy losses. However, none of the previous works have fully studied the problem. In this paper, the underlying theory of such energy loss is investigated and quantitatively evaluated using conventional parameters. Accordingly, a method of electric active shielding is proposed to reduce the displacement current across the SIG-GND electrodes, leading to less power loss. In addition, the variation of such loss in regard to frequency range and positions on human body was also considered. The theory was validated by finite element method simulation and experimental measurement. The prototype result shows that the receiving power has been improved by approximate 5.5 dBm while the total power consumption is maximally 9 mW less using the proposed technique, providing an energy efficient option in physical layer for wearable and implantable healthcare sensor networks. PMID:28885546
A comparative assessment of resource efficiency in petroleum refining
DOE Office of Scientific and Technical Information (OSTI.GOV)
Han, Jeongwoo; Forman, Grant S.; Elgowainy, Amgad
Because of increasing environmental and energy security concerns, a detailed understanding of energy efficiency and greenhouse gas (GHG) emissions in the petroleum refining industry is critical for fair and equitable energy and environmental policies. To date, this has proved challenging due in part to the complex nature and variability within refineries. In an effort to simplify energy and emissions refinery analysis, we delineated LP modeling results from 60 large refineries from the US and EU into broad categories based on crude density (API gravity) and heavy product (HP) yields. Product-specific efficiencies and process fuel shares derived from this study weremore » incorporated in Argonne National Laboratory’s GREET life-cycle model, along with regional upstream GHG intensities of crude, natural gas and electricity specific to the US and EU regions. The modeling results suggest that refineries that process relatively heavier crude inputs and have lower yields of HPs generally have lower energy efficiencies and higher GHG emissions than refineries that run lighter crudes with lower yields of HPs. The former types of refineries tend to utilize energy-intensive units which are significant consumers of utilities (heat and electricity) and hydrogen. Among the three groups of refineries studied, the major difference in the energy intensities is due to the amount of purchased natural gas for utilities and hydrogen, while the sum of refinery feed inputs are generally constant. These results highlight the GHG emissions cost a refiner pays to process deep into the barrel to produce more of the desirable fuels with low carbon to hydrogen ratio.« less
A Comparative Assessment of Resource Efficiency in Petroleum Refining
DOE Office of Scientific and Technical Information (OSTI.GOV)
Han, Jeongwoo; Forman, G; Elgowainy, Amgad
2015-10-01
Because of increasing environmental and energy security concerns, a detailed understanding of energy efficiency and greenhouse gas (GHG) emissions in the petroleum refining industry is critical for fair and equitable energy and environmental policies. To date, this has proved challenging due in part to the complex nature and variability within refineries. In an effort to simplify energy and emissions refinery analysis, we delineated LP modeling results from 60 large refineries from the US and EU into broad categories based on crude density (API gravity) and heavy product (HP) yields. Product-specific efficiencies and process fuel shares derived from this study weremore » incorporated in Argonne National Laboratory's GREET life-cycle model, along with regional upstream GHG intensities of crude, natural gas and electricity specific to the US and EU regions. The modeling results suggest that refineries that process relatively heavier crude inputs and have lower yields of HPs generally have lower energy efficiencies and higher GHG emissions than refineries that run lighter crudes with lower yields of HPs. The former types of refineries tend to utilize energy-intensive units which are significant consumers of utilities (heat and electricity) and hydrogen. Among the three groups of refineries studied, the major difference in the energy intensities is due to the amount of purchased natural gas for utilities and hydrogen, while the sum of refinery feed inputs are generally constant. These results highlight the GHG emissions cost a refiner pays to process deep into the barrel to produce more of the desirable fuels with low carbon to hydrogen ratio. (c) 2015 Argonne National Laboratory. Published by Elsevier Ltd.« less
A comparative assessment of resource efficiency in petroleum refining
Han, Jeongwoo; Forman, Grant S.; Elgowainy, Amgad; ...
2015-03-25
Because of increasing environmental and energy security concerns, a detailed understanding of energy efficiency and greenhouse gas (GHG) emissions in the petroleum refining industry is critical for fair and equitable energy and environmental policies. To date, this has proved challenging due in part to the complex nature and variability within refineries. In an effort to simplify energy and emissions refinery analysis, we delineated LP modeling results from 60 large refineries from the US and EU into broad categories based on crude density (API gravity) and heavy product (HP) yields. Product-specific efficiencies and process fuel shares derived from this study weremore » incorporated in Argonne National Laboratory’s GREET life-cycle model, along with regional upstream GHG intensities of crude, natural gas and electricity specific to the US and EU regions. The modeling results suggest that refineries that process relatively heavier crude inputs and have lower yields of HPs generally have lower energy efficiencies and higher GHG emissions than refineries that run lighter crudes with lower yields of HPs. The former types of refineries tend to utilize energy-intensive units which are significant consumers of utilities (heat and electricity) and hydrogen. Among the three groups of refineries studied, the major difference in the energy intensities is due to the amount of purchased natural gas for utilities and hydrogen, while the sum of refinery feed inputs are generally constant. These results highlight the GHG emissions cost a refiner pays to process deep into the barrel to produce more of the desirable fuels with low carbon to hydrogen ratio.« less
Connection technology of HPTO type WECs and DC nano grid in island
NASA Astrophysics Data System (ADS)
Wang, Kun-lin; Tian, Lian-fang; You, Ya-ge; Wang, Xiao-hong; Sheng, Song-wei; Zhang, Ya-qun; Ye, Yin
2016-07-01
Wave energy fluctuating a great deal endangers the security of power grid especially micro grid in island. A DC nano grid supported by batteries is proposed to smooth the output power of wave energy converters (WECs). Thus, renewable energy converters connected to DC grid is a new subject. The characteristics of WECs are very important to the connection technology of HPTO type WECs and DC nano grid. Hydraulic power take-off system (HPTO) is the core unit of the largest category of WECs, with the functions of supplying suitable damping for a WEC to absorb wave energy, and converting captured wave energy to electricity. The HPTO is divided into a hydraulic energy storage system (HESS) and a hydraulic power generation system (HPGS). A primary numerical model for the HPGS is established in this paper. Three important basic characteristics of the HPGS are deduced, which reveal how the generator load determines the HPGS rotation rate. Therefore, the connector of HPTO type WEC and DC nano grid would be an uncontrollable rectifier with high reliability, also would be a controllable power converter with high efficiency, such as interleaved boost converter-IBC. The research shows that it is very flexible to connect to DC nano grid for WECs, but bypass resistance loads are indispensable for the security of WECs.
Efficient material decomposition method for dual-energy X-ray cargo inspection system
NASA Astrophysics Data System (ADS)
Lee, Donghyeon; Lee, Jiseoc; Min, Jonghwan; Lee, Byungcheol; Lee, Byeongno; Oh, Kyungmin; Kim, Jaehyun; Cho, Seungryong
2018-03-01
Dual-energy X-ray inspection systems are widely used today for it provides X-ray attenuation contrast of the imaged object and also its material information. Material decomposition capability allows a higher detection sensitivity of potential targets including purposely loaded impurities in agricultural product inspections and threats in security scans for example. Dual-energy X-ray transmission data can be transformed into two basis material thickness data, and its transformation accuracy heavily relies on a calibration of material decomposition process. The calibration process in general can be laborious and time consuming. Moreover, a conventional calibration method is often challenged by the nonuniform spectral characteristics of the X-ray beam in the entire field-of-view (FOV). In this work, we developed an efficient material decomposition calibration process for a linear accelerator (LINAC) based high-energy X-ray cargo inspection system. We also proposed a multi-spot calibration method to improve the decomposition performance throughout the entire FOV. Experimental validation of the proposed method has been demonstrated by use of a cargo inspection system that supports 6 MV and 9 MV dual-energy imaging.
2015-04-14
9EIA is a statistical agency within the Department of Energy that...For example, in 2014, we identified three actions that Congress could authorize that could increase tax revenue collections from delinquent ...about $500 million over a 5- year period by revoking or denying passports to those with certain federal tax delinquencies . • Social Security Offsets
Sandia National Laboratories: Directed-energy tech receives funding to
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research
10 CFR 1016.12 - Termination of security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.12 Termination of security facility approval. Security facility approval will be terminated...
10 CFR 1016.12 - Termination of security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Termination of security facility approval. 1016.12 Section 1016.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.12 Termination of security facility approval. Security facility approval will be terminated...
CO2 - The Canary in the Energy Efficiency Coal Mine
NASA Astrophysics Data System (ADS)
Somssich, Peter
2011-04-01
While much of the discussion surrounding CO2 is focused on its role as a GHG (green house gas) and its affect on Climate Change, CO2 can also be viewed as an indicator for reductions in fossil fuel use and increased energy efficiency. Much as the canary in a mine was used to warn miners of unsafe health conditions in a mine, CO2 can be seen as allowing us to effectively track progress towards energy efficiency and sustainability. Such an effort can best be achieved by either a Carbon Tax or a Cap and Trade system which was highly effective as part of the 1992 Clean Air Act, contributing to a significant reduction of SO2 and acid rain. A similar attempt has been made using the 1997 Kyoto Protocol to reduce carbon emissions. The mechanisms of how this treaty was intended to work will be explained, and examples will be given, both in the USA and Europe, of how the protocol was used to reduce energy consumption and energy dependence, while also reducing CO2 emissions. Regardless of how strong an impact CO2 reduction may have for Climate Change issues, a reduction of CO2 is guaranteed to produce energy benefits, monetary benefits and can even enhance national security. For all of these reasons, we need the CO2 canary.
Electrorheology for energy production and conservation
NASA Astrophysics Data System (ADS)
Huang, Ke
Recently, based on the physics of viscosity, we developed a new technology, which utilizes electric or magnetic fields to change the rheology of complex fluids to reduce the viscosity, while keeping the temperature unchanged. The method is universal and applicable to all complex fluids with suspended particles of nano-meter, submicrometer, or micrometer size. Completely different from the traditional viscosity reduction method, raising the temperature, this technology is energy-efficient, as it only requires small amount of energy to aggregate the suspended particles. In this thesis, we will first discuss this new technology in detail, both in theory and practice. Then, we will report applications of our technology to energy science research. Presently, 80% of all energy sources are liquid fuels. The viscosity of liquid fuels plays an important role in energy production and energy conservation. With an electric field, we can reduce the viscosity of asphalt-based crude oil. This is important and useful for heavy crude oil and off-shore crude oil production and transportation. Especially, since there is no practical way to raise the temperature of crude oil inside the deepwater pipelines, our technology may play a key role in future off-shore crude oil production. Electrorehology can also be used to reduce the viscosity of refinery fuels, such as diesel fuel and gasoline. When we apply this technology to fuel injection, the fuel droplets in the fuel atomization become smaller, leading to faster combustion in the engine chambers. As the fuel efficiency of internal combustion engines depends on the combustion speed and timing, the fast combustion produces much higher fuel efficiency. Therefore, adding our technology on existing engines improves the engine efficiency significantly. A theoretical model for the engine combustion, which explains how fast combustion improves the engine efficiency, is also presented in the thesis. As energy is the key to our national security, we believe that our technology is important and will have a strong impact on energy production and conversation in the future.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kong, Bo
China’s energy insecurity largely originates from its constrained availability, questionable reliability, and uncertain affordability of its oil supplies. The country’s fast industrialization and urbanization, together with demand for infrastructure and increasing popularity of automobiles, requires a lot of energy, but it consumes energy both intensively and inefficiently, threatening the environmental well-being of China and its neighbors. China’s risk aversion and poor energy policy making system further magnifies its perceptions of the low availability, reliability and affordability of oil imports, which further compounds its sense of energy insecurity. Distrustful of the market, and suspicious of other major energy players in themore » international market, the Chinese leadership relies on the state-centered approach, or economic nationalism, rather than a market approach to enhance its energy security. However, the country lacks not only an energy policy making system that can make and implement sound energy policies but also an energy market that relies on market prices to allocate energy resources efficiently. As a result of this domestic failure, China has pushed its national flagship companies to undertake a global scavenger hunt for energy while muddling along a messy road of energy reform at home. Setbacks in acquiring new sources of oil have validated the Chinese leadership’s belief that the international oil market is not free and China’s access to international oil is not guaranteed through the market. China’s problems in the international energy market are also perceived as evidence of attempts to prevent China from exerting international influence. China’s leadership is convinced that China should focus on areas where western capital is not heavily concentrated or where western influences are weak. With the recent revaluation of Chinese currency and growing economy, China has both the wherewithal and appetite to acquire more oil assets abroad. Both China and the United States stand at a critical juncture of history where China’s rise depends on reliable energy supplies which it increasingly imports from abroad and where the growing wealth of the United States is increasingly dependent upon China’s success. If China does not have energy security it’s 1.3 billion fuel-starved people will prevent the rest of the world from achieving energy security.« less
Energy Security: Emerging Challenges and Opportunities
2010-08-01
46 Appendix A: Electrical Capacity Margins...options........................................................................................ 21 6 Net electrical capacity compared to the North...Energy Security The Army Energy and Water Campaign Plan for Installations defines energy security as: the capacity to avoid adverse impact of energy
Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N
2015-12-01
With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.
Cook, John T; Frank, Deborah A; Casey, Patrick H; Rose-Jacobs, Ruth; Black, Maureen M; Chilton, Mariana; Ettinger de Cuba, Stephanie; Appugliese, Danielle; Coleman, Sharon; Heeren, Timothy; Berkowitz, Carol; Cutts, Diana B
2008-10-01
Household energy security has not been measured empirically or related to child health and development but is an emerging concern for clinicians and researchers as energy costs increase. The objectives of this study were to develop a clinical indicator of household energy security and assess associations with food security, health, and developmental risk in children <36 months of age. A cross-sectional study that used household survey and surveillance data was conducted. Caregivers were interviewed in emergency departments and primary care clinics form January 2001 through December 2006 on demographics, public assistance, food security, experience with heating/cooling and utilities, Parents Evaluation of Developmental Status, and child health. The household energy security indicator includes energy-secure, no energy problems; moderate energy insecurity, utility shutoff threatened in past year; and severe energy insecurity, heated with cooking stove, utility shutoff, or >or=1 day without heat/cooling in past year. The main outcome measures were household and child food security, child reported health status, Parents Evaluation of Developmental Status concerns, and hospitalizations. Of 9721 children, 11% (n = 1043) and 23% (n = 2293) experienced moderate and severe energy insecurity, respectively. Versus children with energy security, children with moderate energy insecurity had greater odds of household food insecurity, child food insecurity, hospitalization since birth, and caregiver report of child fair/poor health, adjusted for research site and mother, child, and household characteristics. Children with severe energy insecurity had greater adjusted odds of household food insecurity, child food insecurity, caregivers reporting significant developmental concerns on the Parents Evaluation of Developmental Status scale, and report of child fair/poor health. No significant association was found between energy security and child weight for age or weight for length. As household energy insecurity increases, infants and toddlers experienced increased odds of household and child food insecurity and of reported poor health, hospitalizations, and developmental risks.
Selectively Encrypted Pull-Up Based Watermarking of Biometric data
NASA Astrophysics Data System (ADS)
Shinde, S. A.; Patel, Kushal S.
2012-10-01
Biometric authentication systems are becoming increasingly popular due to their potential usage in information security. However, digital biometric data (e.g. thumb impression) are themselves vulnerable to security attacks. There are various methods are available to secure biometric data. In biometric watermarking the data are embedded in an image container and are only retrieved if the secrete key is available. This container image is encrypted to have more security against the attack. As wireless devices are equipped with battery as their power supply, they have limited computational capabilities; therefore to reduce energy consumption we use the method of selective encryption of container image. The bit pull-up-based biometric watermarking scheme is based on amplitude modulation and bit priority which reduces the retrieval error rate to great extent. By using selective Encryption mechanism we expect more efficiency in time at the time of encryption as well as decryption. Significant reduction in error rate is expected to be achieved by the bit pull-up method.
Energy Independence and Security Act of 2007
This page provides an overview of the Energy Independence and Security Act (EISA) of 2007, which aims to increase U.S. energy security, develop renewable energy production, and improve vehicle fuel economy.
NASA Astrophysics Data System (ADS)
Ostrikov, Kostya
2010-11-01
This presentation focuses on the plasma issues related to the solution of the grand challenge of directing energy and matter at nanoscales. This ability is critical for the renewable energy and energy-efficient technologies for sustainable future development. It will be discussed how to use environmentally and human health benign non-equilibrium plasma-solid systems and control the elementary processes of plasma-surface interactions to direct the fluxes of energy and matter at multiple temporal and spatial scales. In turn, this makes it possible to achieve the deterministic synthesis of self- organised arrays of metastable nanostructures in the size range beyond the reach of the present-day nanofabrication. Such structures have tantalising prospects to enhance performance of nanomaterials in virtually any area of human activity yet remain almost inaccessible because the Nature's energy minimisation rules allow only a small number of stable equilibrium states. By using precisely controlled and kinetically fast nanoscale transfer of energy and matter under non-equilibrium conditions and harnessing numerous plasma- specific controls of species creation, delivery to the surface, nucleation and large-scale self-organisation of nuclei and nanostructures, the arrays of metastable nanostructures can be created, arranged, stabilised, and further processed to meet the specific requirements of the envisaged applications. These approaches will eventually lead to faster, unprecedentedly- clean, human-health-friendly, and energy-efficient nanoscale synthesis and processing technologies for the next-generation renewable energy and light sources, biomedical devices, information and communication systems, as well as advanced functional materials for applications ranging from basic food, water, health and clean environment needs to national security and space missions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pruski, Marek; Sadow, Aaron D.; Slowing, Igor I.
Catalysis research at the U.S. Department of Energy's (DOE's) National Laboratories covers a wide range of research topics in heterogeneous catalysis, homogeneous/molecular catalysis, biocatalysis, electrocatalysis, and surface science. Since much of the work at National Laboratories is funded by DOE, the research is largely focused on addressing DOE's mission to ensure America's security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions. The catalysis research carried out at the DOE National Laboratories ranges from very fundamental catalysis science, funded by DOE's Office of Basic Energy Sciences (BES), to applied research and development (R&D)more » in areas such as biomass conversion to fuels and chemicals, fuel cells, and vehicle emission control with primary funding from DOE's Office of Energy Efficiency and Renewable Energy.« less
Green Secure Processors: Towards Power-Efficient Secure Processor Design
NASA Astrophysics Data System (ADS)
Chhabra, Siddhartha; Solihin, Yan
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.
The lead/acid battery — a key technology for global energy management
NASA Astrophysics Data System (ADS)
Rand, D. A. J.
As the nations of the world continue to develop, their industrialization and growing populations will require increasing amounts of energy. Yet, global energy consumption, even at present levels, is already giving rise to concerns over both the security of future supplies and the attendant problems of environmental degradation. Thus, a major objective for the energy industry — in all its sectors — is to develop procedures so that the burgeoning demand for energy can be tolerated without exhaustion of the planet's resources, and without further deterioration of the global ecosystem. A step in the right direction is to place lead/acid batteries — serviceable, efficient and clean technology — at the cutting edge of energy strategies, regardless of the relatively low price of such traditional fuels as coal, mineral oil and natural gas.
Saving Green: How the DoD Can Better Manage Energy Efficiency Initiatives
2017-12-01
Distribution is unlimited. THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for...Unclassified 19. SECURITY CLASSIFICATION OF ABSTRACT Unclassified 20. LIMITATION OF ABSTRACT UU NSN 7540–01-280-5500 Standard Form 298 (Rev...project adoption within the DOD. An abbreviated literature review is nested within the presentation of each hypothesis. These hypotheses form the
How America Can Look Within to Achieve Energy Security and Reduce Global Warming
2008-09-01
Linear Accelerator Center, Stanford University Maxine Savitz The Advisory Group Daniel Sperling University of California, Davis Study Group Members...Development Mr. Don Von Dollen, Electric Power Research Institute Mr. Anant Vyas, Argonne National Laboratory Dr. E.D. Tate, General Motors...other nation on Earth except China [EIA, 2007b]. Source: Lutsey and Sperling , 2005 Figure 6 U.S. fuel economy vs. fuel efficiency Passenger cars
Energy efficient skylight construction
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jentoft, A.P.; Couture, P.A.
1978-02-14
An energy efficient skylight construction is described. A skylight cover is secured by a frame to a curbing comprised of an insulating core, the interior and exterior surfaces of which are covered by non-combustible shields separated along the upper and lower surfaces of the curbing by a gap which serves as a ''thermal break'' between the highly conductive inner and outer shields. The frame is pierced by drain openings the exterior of which are covered by a filter type material such as foam or glass fibers that is both absorbtive of moisture and resistant to the passage of air. Themore » frame is secured to the outward portion of the curbing and includes a flange extending inward across the gap between the shields, which serves as a gutter to collect condensation which drips off the glazing. The inward portion of the flange is covered with an insulating gasket which prevents condensation from forming on the flange and which prevents the warmer, more moisture laden, inside air from reaching the cold underside of the gutter flange or the edge of the outerskin. The core insulation is inserted, without adhesives, into the assembled inside skin, and then the exposed surface of the insulation is bonded to the inside surface of the outer skin.« less
NASA Astrophysics Data System (ADS)
Rachi, Hideki
Sodium-Sulfur battery (NAS battery), which has more than 3 times of energy density compared with the conventional lead-acid battery and can be compactly established, has a great installation effects as a distributed energy storage system in the urban area which consumes big electric power. For the power company, NAS battery contributes to the load leveling, the supply capability up at the peak period, the efficient operation of the electric power equipment and the reduction of the capital expenditure. And for the customer, it is possible to enjoy the reduction of the electricity charges by utilizing nighttime electric power and the securing of a security. The contribution to the highly sophisticated information society where the higher electric power quality is desired, mainly office buildings and factories by the progress of IT, is very big. Tokyo Electric Power Company (TEPCO) developed the elementary technology of NAS battery from 1984 and ended the development of practical battery which has long-term durability and the safety and the performance verification of the megawatt scale. Finally TEPCO accomplished the practical application and commercialization of the stationary energy storage technology by NAS battery. In this paper, we introduces about conquered problems until practical application and commercialization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kok, Koen; Widergren, Steve
Secure, Clean and Efficient Energy is one of the great societal challenges of our time. Electricity as a sustainable energy carrier plays a central role in the most effective transition scenarios towards sustainability. To harness this potential, the current electricity infrastructure needs to be rigorously re-engineered into an integrated and intelligent electricity system: the smart grid. Key elements of the smart grid vision are the coordination mechanisms. In such a system, vast numbers of devices, currently just passively connected to the grid, will become actively involved in system-wide and local coordination tasks. In this light, transactive energy (TE) is emergingmore » as a strong contender for orchestrating the coordinated operation of so many devices.« less
Sandia National Laboratories: National Security Missions: Defense Systems
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Portasik, L.S.
In recent years, traditional electric utilities have become increasingly dependent upon enhanced competitive conditions in the bulk power market to improve efficiency and secure {open_quotes}least-cost{close_quotes} generation for their franchise and wholesale customers. The industry`s growing reliance on competitive wholesale markets both presaged and overtook the new legislation reflected in the Energy Policy Act of 1992 (EPAct). This article describes the new environment, as revealed in recent Federal Energy Regulatory Commission (FERC) decisions, and discusses its impact on the services and rates of affected utilities.
CAFE Standards (released in AEO2010)
2010-01-01
Pursuant to the Presidents announcement of a National Fuel Efficiency Policy, the National Highway Traffic Safety Administration (NHTSA) and the EPA have promulgated nationally coordinated standards for tailpipe Carbon Dioxide (CO2)-equivalent emissions and fuel economy for light-duty vehicles (LDVs), which includes both passenger cars and light-duty trucks. In the joint rulemaking, the Environmental Protection Agency is enacting CO2-equivalent emissions standards under the Clean Air Act (CAA), and NHTSA is enacting companion Corporate Average Fuel Economy standards under the Energy Policy and Conservation Act, as amended by the Energy Independence and Security Act of 2007.
A Study of Defense Applications of Space Solar Power
NASA Astrophysics Data System (ADS)
Jaffe, Paul
2010-01-01
Space solar power (SSP) is generally considered to be the collection in space of energy from the sun and its wireless transmission from space for use on earth. It has been observed that the implementation of such a system could offer energy security, environmental, and technological advantages to those who would undertake its development. A study conducted by the Naval Research Laboratory (NRL) sought to determine if unique, cost effective, and efficient approaches exist for supplying significant power on demand for Navy, Marine Corps, or other Department of Defense applications by employing a space-based solar power system. The study was initiated by and prepared for top NRL management in part as a result of the publication of the National Security Space Office's (NSSO) report "Space-Based Solar Power as an Opportunity for Strategic Security." The NSSO report's recommendations included statements calling for the U.S. Government to conduct analyses, retire technical risk, and become an early demonstrator for SBSP. It should be noted that the principal objective of the NRL study differed significantly from that of the multitude of previous studies performed in reference to SBSP in that it focused on defense rather than utility grid applications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Frazar, Sarah L.; Winters, Samuel T.; Kreyling, Sean J.
In 2016, the Office of International Nuclear Safeguards at the National Nuclear Security Administration (NNSA) within the Department of Energy (DOE) commissioned the Pacific Northwest National Laboratory (PNNL) to explore the potential implications of the digital currency bitcoin and its underlying technologies on the safeguards system. The authors found that one category of technologies referred to as Shared Ledger Technology (SLT) offers a spectrum of benefits to the safeguards system. While further research is needed to validate assumptions and findings in the paper, preliminary analysis suggests that both the International Atomic Energy Agency (IAEA) and Member States can use SLTmore » to promote efficient, effective, accurate, and timely reporting, and increase transparency in the safeguards system without sacrificing confidentiality of safeguards data. This increased transparency and involvement of Member States in certain safeguards transactions could lead to increased trust and cooperation among States and the public, which generates a number of benefits. This paper describes these benefits and the analytical framework for assessing SLT applications for specific safeguards problems. The paper will also describe other national security areas where SLT could provide benefits.« less
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false Security. 780.8 Section 780.8 Energy DEPARTMENT OF ENERGY PATENT COMPENSATION BOARD REGULATIONS General Provisions § 780.8 Security. In any proceeding under this... the Act to assure compliance with Department security regulations and the common defense. ...
Information security of power enterprises of North-Arctic region
NASA Astrophysics Data System (ADS)
Sushko, O. P.
2018-05-01
The role of information technologies in providing technological security for energy enterprises is a component of the economic security for the northern Arctic region in general. Applying instruments and methods of information protection modelling of the energy enterprises' business process in the northern Arctic region (such as Arkhenergo and Komienergo), the authors analysed and identified most frequent risks of information security. With the analytic hierarchy process based on weighting factor estimations, information risks of energy enterprises' technological processes were ranked. The economic estimation of the information security within an energy enterprise considers weighting factor-adjusted variables (risks). Investments in information security systems of energy enterprises in the northern Arctic region are related to necessary security elements installation; current operating expenses on business process protection systems become materialized economic damage.
Flexible operation of thermal plants with integrated energy storage technologies
NASA Astrophysics Data System (ADS)
Koytsoumpa, Efthymia Ioanna; Bergins, Christian; Kakaras, Emmanouil
2017-08-01
The energy system in the EU requires today as well as towards 2030 to 2050 significant amounts of thermal power plants in combination with the continuously increasing share of Renewables Energy Sources (RES) to assure the grid stability and to secure electricity supply as well as to provide heat. The operation of the conventional fleet should be harmonised with the fluctuating renewable energy sources and their intermittent electricity production. Flexible thermal plants should be able to reach their lowest minimum load capabilities while keeping the efficiency drop moderate as well as to increase their ramp up and down rates. A novel approach for integrating energy storage as an evolutionary measure to overcome many of the challenges, which arise from increasing RES and balancing with thermal power is presented. Energy storage technologies such as Power to Fuel, Liquid Air Energy Storage and Batteries are investigated in conjunction with flexible power plants.
NASA Astrophysics Data System (ADS)
Choi, YongMan; Lin, M. C.; Liu, Meilin
The search for clean and renewable sources of energy represents one of the most vital challenges facing us today. Solid oxide fuel cells (SOFCs) are among the most promising technologies for a clean and secure energy future due to their high energy efficiency and excellent fuel flexibility (e.g., direct utilization of hydrocarbons or renewable fuels). To make SOFCs economically competitive, however, development of new materials for low-temperature operation is essential. Here we report our results on a computational study to achieve rational design of SOFC cathodes with fast oxygen reduction kinetics and rapid ionic transport. Results suggest that surface catalytic properties are strongly correlated with the bulk transport properties in several material systems with the formula of La 0.5Sr 0.5BO 2.75 (where B = Cr, Mn, Fe, or Co). The predictions seem to agree qualitatively with available experimental results on these materials. This computational screening technique may guide us to search for high-efficiency cathode materials for a new generation of SOFCs.
NASA Astrophysics Data System (ADS)
Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.
2017-10-01
The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.
Harnessing high-dimensional hyperentanglement through a biphoton frequency comb
NASA Astrophysics Data System (ADS)
Xie, Zhenda; Zhong, Tian; Shrestha, Sajan; Xu, Xinan; Liang, Junlin; Gong, Yan-Xiao; Bienfang, Joshua C.; Restelli, Alessandro; Shapiro, Jeffrey H.; Wong, Franco N. C.; Wei Wong, Chee
2015-08-01
Quantum entanglement is a fundamental resource for secure information processing and communications, and hyperentanglement or high-dimensional entanglement has been separately proposed for its high data capacity and error resilience. The continuous-variable nature of the energy-time entanglement makes it an ideal candidate for efficient high-dimensional coding with minimal limitations. Here, we demonstrate the first simultaneous high-dimensional hyperentanglement using a biphoton frequency comb to harness the full potential in both the energy and time domain. Long-postulated Hong-Ou-Mandel quantum revival is exhibited, with up to 19 time-bins and 96.5% visibilities. We further witness the high-dimensional energy-time entanglement through Franson revivals, observed periodically at integer time-bins, with 97.8% visibility. This qudit state is observed to simultaneously violate the generalized Bell inequality by up to 10.95 standard deviations while observing recurrent Clauser-Horne-Shimony-Holt S-parameters up to 2.76. Our biphoton frequency comb provides a platform for photon-efficient quantum communications towards the ultimate channel capacity through energy-time-polarization high-dimensional encoding.
NASA Astrophysics Data System (ADS)
Walsh, Michael J.; Gerber Van Doren, Léda; Sills, Deborah L.; Archibald, Ian; Beal, Colin M.; Gen Lei, Xin; Huntley, Mark E.; Johnson, Zackary; Greene, Charles H.
2016-11-01
The goals of ensuring energy, water, food, and climate security can often conflict. Microalgae (algae) are being pursued as a feedstock for both food and fuels—primarily due to algae’s high areal yield and ability to grow on non-arable land, thus avoiding common bioenergy-food tradeoffs. However, algal cultivation requires significant energy inputs that may limit potential emission reductions. We examine the tradeoffs associated with producing fuel and food from algae at the energy-food-water-climate nexus. We use the GCAM integrated assessment model to demonstrate that algal food production can promote reductions in land-use change emissions through the offset of conventional agriculture. However, fuel production, either via co-production of algal food and fuel or complete biomass conversion to fuel, is necessary to ensure long-term emission reductions, due to the high energy costs of cultivation. Cultivation of salt-water algae for food products may lead to substantial freshwater savings; but, nutrients for algae cultivation will need to be sourced from waste streams to ensure sustainability. By reducing the land demand of food production, while simultaneously enhancing food and energy security, algae can further enable the development of terrestrial bioenergy technologies including those utilizing carbon capture and storage. Our results demonstrate that large-scale algae research and commercialization efforts should focus on developing both food and energy products to achieve environmental goals.
Food security: crops for people not for cars.
Kullander, Sven
2010-05-01
Humankind is currently faced with the huge challenge of securing a sustainable energy supply and biofuels constitute one of the major options. However, the commercially traded edible crops are barely sufficient to meet food demand of the present world population. Certain regions, for example EU-27, do not even have a sufficient indigenous crop production. Of this follows that motor biofuels based on edible crops should be avoided. To replace more than some percent of the fossil motor fuels, non-edible biomass-rest products and wastes-should instead be considered for conversion to biofuels. In this way, about 10% of the current fossil fuels can be replaced. Feeding a world population expected to grow by some 50% during the next 50 years will be a major challenge. For environmental reasons it seems that agricultural land cannot be expanded very much, maybe not at all. The solution to the increasing food demand seems therefore to be using the present crop production more efficiently and increasing output from present agricultural land, maintaining biodiversity and climate stability within reasonable limits. In the future, agriculture will need more energy and more water irrigation. Food production is, however, already very energy demanding, requiring several times more externally provided energy than the energy content of the food itself. A sufficient energy supply will be a key issue for the future farming!
Alternative Fuels DISI Engine Research ? Autoignition Metrics.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sjoberg, Carl Magnus Goran; Vuilleumier, David
Improved engine efficiency is required to comply with future fuel economy standards. Alternative fuels have the potential to enable more efficient engines while addressing concerns about energy security. This project contributes to the science base needed by industry to develop highly efficient direct injection spark igniton (DISI) engines that also beneficially exploit the different properties of alternative fuels. Here, the emphasis is on quantifying autoignition behavior for a range of spark-ignited engine conditions, including directly injected boosted conditions. The efficiency of stoichiometrically operated spark ignition engines is often limited by fuel-oxidizer end-gas autoignition, which can result in engine knock. Amore » fuel’s knock resistance is assessed empirically by the Research Octane Number (RON) and Motor Octane Number (MON) tests. By clarifying how these two tests relate to the autoignition behavior of conventional and alternative fuel formulations, fuel design guidelines for enhanced engine efficiency can be developed.« less
Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.
Guo, Lifeng; Yau, Wei-Chuen
2015-02-01
Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.
10 CFR 1016.11 - Cancellation of requests for security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Cancellation of requests for security facility approval. 1016.11 Section 1016.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.11 Cancellation of requests for security facility approval. When a...
10 CFR 1016.11 - Cancellation of requests for security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Cancellation of requests for security facility approval. 1016.11 Section 1016.11 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.11 Cancellation of requests for security facility approval. When a...
10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...
10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...
10 CFR 1016.10 - Grant, denial, or suspension of security facility approval.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 4 2012-01-01 2012-01-01 false Grant, denial, or suspension of security facility approval. 1016.10 Section 1016.10 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.10 Grant, denial, or suspension of security facility approval...
NASA Astrophysics Data System (ADS)
Khan, Md. Arif-Ul Islam; Das, Swapnil; Dey, Saikat
2017-12-01
: Economic growth and energy demand are intertwined. Therefore, one of the most important concerns of the government and in the world is the need for energy security. Currently, the world relies on coal, crude oil and natural gas for energy generati on. However, the energy crisis together with climate change and depletion of oil have become major concerns to all countries. Therefore, alternative energy resources such as wind energy attracted interest from both public and private sectors to invest in energy generation from this source extensively. Both Vertical and Horizontal axis wind turbine can be used for this purpose. But, Horizontal axis is the most promising between them due to its efficiency and low expense. Bangladesh being a tropical country does have a lot of wind flow at different seasons of the year. However, there are some windy locations in which wind energy projects could be feasible. In this project a detailed review of the current st ate-of-art for wind turbine blade design is presented including theoretical maximum efficiency, Horizontal Axis Wind Turbine (HAWT) blade design, simulation power and COP values for different blade material. By studying previously collected data on the wind resources available in B angladesh at present and by analyzing this data, this paper will discuss the scope of wind energy in Bangladesh.
Wireless Sensors and Networks for Advanced Energy Management
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hardy, J.E.
Numerous national studies and working groups have identified low-cost, very low-power wireless sensors and networks as a critical enabling technology for increasing energy efficiency, reducing waste, and optimizing processes. Research areas for developing such sensor and network platforms include microsensor arrays, ultra-low power electronics and signal conditioning, data/control transceivers, and robust wireless networks. A review of some of the research in the following areas will be discussed: (1) Low-cost, flexible multi-sensor array platforms (CO{sub 2}, NO{sub x}, CO, humidity, NH{sub 3}, O{sub 2}, occupancy, etc.) that enable energy and emission reductions in applications such as buildings and manufacturing; (2) Modelingmore » investments (energy usage and savings to drive capital investment decisions) and estimated uptime improvements through pervasive gathering of equipment and process health data and its effects on energy; (3) Robust, self-configuring wireless sensor networks for energy management; and (4) Quality-of-service for secure and reliable data transmission from widely distributed sensors. Wireless communications is poised to support technical innovations in the industrial community, with widespread use of wireless sensors forecasted to improve manufacturing production and energy efficiency and reduce emissions. Progress being made in wireless system components, as described in this paper, is helping bring these projected improvements to reality.« less
Conservation: Toward firmer ground
NASA Technical Reports Server (NTRS)
1975-01-01
The following aspects of energy conservation were discussed: conservation history and goals, conservation modes, conservation accounting-criteria, and a method to overcome obstacles. The conservation modes tested fall into one of the following categories: reduced energy consumption, increased efficiency of energy utilization, or substitution of one or more forms of energy for another which is in shorter supply or in some sense thought to be of more value. The conservation accounting criteria include net energy reduction, economic, and technical criteria. A method to overcome obstacles includes (approaches such as: direct personal impact (life style, income, security, aspiration), an element of crisis, large scale involvement of environmental, safety, and health issues, connections to big government, big business, big politics, involvement of known and speculative science and technology, appeal to moral and ethical standards, the transient nature of opportunities to correct the system.
Ultraviolet and near-infrared luminescence of LaBO3:Ce3+,Yb3+
NASA Astrophysics Data System (ADS)
Wei, Heng-Wei; Shao, Li-Ming; Jiao, Huan; Jing, Xi-Ping
2018-01-01
Ce3+ or Yb3+ singly doped LaBO3 and Ce3+-Yb3+ co-doped LaBO3 were prepared by conventional solid state reactions at 1100 °C and their photoluminescence (PL) properties were investigated. The emission spectrum of LaBO3:Ce3+,Yb3+ contains both the Ce3+ ultraviolet (UV) emissions (355 nm and 380 nm) and the Yb3+ near infrared (NIR) emission (975 nm) when excited by the UV light at 270 nm. By using the data of the Ce3+ decay curves and the PL intensities of both Ce3+ and Yb3+, the energy transfer efficiency (η) from Ce3+ to Yb3+, the actual energy transfer efficiency (AE) and the quantum efficiency (Q) of the Yb3+ emission were calculated. In the Ce3+-Yb3+ co-doped LaBO3, Ce3+ can transfer its absorbed energy to Yb3+ efficiently (η can be over 60%), and Yb3+ shows the Q value over 50% when it accepts the energy from Ce3+, which results in the low AE value ∼30%. The energy transfer process from Ce3+ to Yb3+ may be understood by the charge transfer mechanism: Ce3+ + Yb3+ ↔ Ce4+ + Yb2+. Particularly the Ce3+-Yb3+ co-doped LaBO3 phosphor gives the emissions mainly in the UV range and the NIR range with a portion of visible emissions in eye-insensitive range. This unique property may be suitable for applications in anti-counterfeiting techniques and public security affairs.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wilson, David G.; Cook, Marvin A.
This report summarizes collaborative efforts between Secure Scalable Microgrid and Korean Institute of Energy Research team members . The efforts aim to advance microgrid research and development towards the efficient utilization of networked microgrids . The collaboration resulted in the identification of experimental and real time simulation capabilities that may be leveraged for networked microgrids research, development, and demonstration . Additional research was performed to support the demonstration of control techniques within real time simulation and with hardware in the loop for DC microgrids .
High-Performance Secure Database Access Technologies for HEP Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Matthew Vranicar; John Weicher
2006-04-17
The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysismore » capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure authorization is pushed into the database engine will eliminate inefficient data transfer bottlenecks. Furthermore, traditionally separated database and security layers provide an extra vulnerability, leaving a weak clear-text password authorization as the only protection on the database core systems. Due to the legacy limitations of the systems’ security models, the allowed passwords often can not even comply with the DOE password guideline requirements. We see an opportunity for the tight integration of the secure authorization layer with the database server engine resulting in both improved performance and improved security. Phase I has focused on the development of a proof-of-concept prototype using Argonne National Laboratory’s (ANL) Argonne Tandem-Linac Accelerator System (ATLAS) project as a test scenario. By developing a grid-security enabled version of the ATLAS project’s current relation database solution, MySQL, PIOCON Technologies aims to offer a more efficient solution to secure database access.« less
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-21
... DEPARTMENT OF ENERGY National Nuclear Security Administration Extension of the Public Comment... Department of Energy/National Nuclear Security Administration Nevada National Security Site and Off-Site Locations in the State of Nevada AGENCY: National Nuclear Security Administration, U.S. Department of Energy...
10 CFR 1016.8 - Approval for processing access permittees for security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...
10 CFR 1016.8 - Approval for processing access permittees for security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016.8 Approval for processing access permittees for security facility...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...
Kim, Daehee; Kim, Dongwan; An, Sunshin
2016-07-09
Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption.
Kim, Daehee; Kim, Dongwan; An, Sunshin
2016-01-01
Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption. PMID:27409616
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Security facility approval and safeguarding of National Security Information and Restricted Data. 76.119 Section 76.119 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.119 Security facility...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Phadke, Amol; Shah, Nihar; Abhyankar, Nikit
Improving efficiency of air conditioners (ACs) typically involves improving the efficiency of various components such as compressors, heat exchangers, expansion valves, refrigerant,and fans. We estimate the incremental cost of improving the efficiency of room ACs based on the cost of improving the efficiency of its key components. Further, we estimate the retail price increase required to cover the cost of efficiency improvement, compare it with electricity bill savings, and calculate the payback period for consumers to recover the additional price of a more efficient AC. The finding that significant efficiency improvement is cost effective from a consumer perspective is robustmore » over a wide range of assumptions. If we assume a 50% higher incremental price compared to our baseline estimate, the payback period for the efficiency level of 3.5 ISEER is 1.1 years. Given the findings of this study, establishing more stringent minimum efficiency performance criteria (one-star level) should be evaluated rigorously considering significant benefits to consumers, energy security, and environment« less
Computer vision in roadway transportation systems: a survey
NASA Astrophysics Data System (ADS)
Loce, Robert P.; Bernal, Edgar A.; Wu, Wencheng; Bala, Raja
2013-10-01
There is a worldwide effort to apply 21st century intelligence to evolving our transportation networks. The goals of smart transportation networks are quite noble and manifold, including safety, efficiency, law enforcement, energy conservation, and emission reduction. Computer vision is playing a key role in this transportation evolution. Video imaging scientists are providing intelligent sensing and processing technologies for a wide variety of applications and services. There are many interesting technical challenges including imaging under a variety of environmental and illumination conditions, data overload, recognition and tracking of objects at high speed, distributed network sensing and processing, energy sources, as well as legal concerns. This paper presents a survey of computer vision techniques related to three key problems in the transportation domain: safety, efficiency, and security and law enforcement. A broad review of the literature is complemented by detailed treatment of a few selected algorithms and systems that the authors believe represent the state-of-the-art.
The Shifting Landscape of Ratepayer-Funded Energy Efficiency in the U.S.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barbose, Galen L; Goldman, Charles; Schlegel, Jeff
Over the last two decades, utility ratepayer funding for energy efficiency programs - and the associated energy savings - has seen both booms and busts. Currently, about 35 states implement ratepayer-funded energy efficiency programs, with a total U.S. budget of $3.1 billion in 2008, approximately 80% of which is concentrated in just ten states (CEE 2008).2 However, a proliferation of new state-level policies enacted over the past several years suggests that the next decade may see a dramatic and sustained increase in overall funding levels, and a fundamental re-drawing of the energy efficiency map. These new state energy efficiency policiesmore » reflect a variety of concerns, including the increasing cost and siting challenges of building new generation and transmission, fuel cost and supply risks, and the potential cost of future carbon regulations. Within the past three years, for example, eleven states have adopted energy efficiency portfolio (or resource) standards (EEPS or EERS) that establish specific long-term savings targets that utilities are obligated to meet, and at least three other states are currently considering the same. A growing number of states have recently established laws requiring utilities to acquire all available cost-effective energy efficiency. Regulators in several Western states have also recently revised integrated resource planning (IRP) and demand-side management (DSM) planning rules to require more robust analysis of the resource potential and benefits of energy efficiency, which has resulted in increased savings targets for their energy efficiency portfolios (Hopper et al. 2008). Finally, regulators and utilities in many states are beginning to look more closely at regulatory incentive mechanisms to better align utility financial interests with improvements in customer energy efficiency. We examined energy efficiency policies on the books or in the pipeline in all 50 states, along with recent IRPs and DSM plans, and developed low, medium and high projections of future energy efficiency spending and savings. Depending on how aggressively and effectively states implement these policies, we estimate that spending on ratepayer-funded energy efficiency could increase from $3.1 billion in 2008 to more than $12 billion (nominal dollars) per year by 2020 in our high case, a growth rate in spending of about 12% per year. Annual electricity savings nationally could triple from an estimated 0.3% of retail electricity sales in 2008 to 0.9% of retail electricity sales in 2020. In the low and medium scenarios, ratepayer funding for electric and gas energy efficiency in the U.S. would increase to $5.4 and $7.5 billion, respectively, by 2020. What are the implications of such a scale-up of ratepayer-funded energy efficiency activity for national energy policy, such as a national EEPS or future carbon regulations? Can a ramp-up of this scale be achieved, and what practical constraints might slow these efforts? This paper addresses these questions by first providing an overview of recent trends in state policies pertaining to ratepayer-funded energy efficiency programs in the U.S. The paper then presents our set of projections of future spending and savings from such programs, highlighting key themes. Projected energy savings are compared to what might be required under a future national EEPS (or broader clean energy standard that includes energy efficiency), in order to gauge the potential incremental impact of such policies. In addition, the carbon emission reductions associated with our projection of energy savings from ratepayer-funded programs is compared to the total emission reductions that might be required under the American Clean Energy and Security Act of 2009 (aka, the Waxman-Markey bill), which was passed by the U.S. House of Representatives in June 2009 and would establish a cap on total greenhouse gas emission for many sectors of the U.S. economy. Last, the paper discusses some of the major obstacles and challenges that states and program administrators may face over the coming decade, as they seek to dramatically ramp-up ratepayer-funded energy efficiency program activity, as projected.« less
Fighting detection using interaction energy force
NASA Astrophysics Data System (ADS)
Wateosot, Chonthisa; Suvonvorn, Nikom
2017-02-01
Fighting detection is an important issue in security aimed to prevent criminal or undesirable events in public places. Many researches on computer vision techniques have studied to detect the specific event in crowded scenes. In this paper we focus on fighting detection using social-based Interaction Energy Force (IEF). The method uses low level features without object extraction and tracking. The interaction force is modeled using the magnitude and direction of optical flows. A fighting factor is developed under this model to detect fighting events using thresholding method. An energy map of interaction force is also presented to identify the corresponding events. The evaluation is performed using NUSHGA and BEHAVE datasets. The results show the efficiency with high accuracy regardless of various conditions.
Secure Multiparty Quantum Computation for Summation and Multiplication.
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2016-01-21
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.
Secure Multiparty Quantum Computation for Summation and Multiplication
Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun
2016-01-01
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics. PMID:26792197
A System of Systems (SoS) Approach to Sustainable Energy Planning in MENA
NASA Astrophysics Data System (ADS)
Mahlooji, Maral; Ristic, Bora; Price, Katherine; Madani, Kaveh
2016-04-01
The global issue of climate change has put pressure on governments to de-carbonise their energy portfolios by transitioning from the dominant use of fossil fuels energy to extensive use of renewable energies. The lack of renewable energy laws and credible targets and valid roadmaps for energy policies within the MENA region has let to ambitious and unrealistic renewable targets, where countries such as Djibouti and Morocco are aiming for 100% and 42% renewables respectively, by 2020, while Kuwait and Qatar are only aiming for 5% and 6% respectively. Nevertheless, this demonstrates the commitment and desirability of the members of the MENA region on increasing their share of renewables in their energy mix to reduce the greenhouse gas emissions of the region and minimise the unintended impacts of energy technologies on major natural resources through use of cost efficient technologies. The Relative Aggregate Footprint (RAF) of energy sources among the member states of the MENA region is assessed by applying the "System of Systems (SoS) Approach to Energy Sustainability Assessment" (Hadian and Madani, 2015). RAF demonstrates the efficiency of the overall resource-use of energy resources through creating a trade-off between carbon footprint, land footprint, water footprint, and economic cost. Using the resource availability of each member states, weights are assigned to the four criteria. This allows the evaluation of the desirability of energy sources with respect to regional resource availability and therefore, the efficiency of the overall resource-use of the energy portfolio of the MENA region is determined. This study has recognised the need for reform and radical changes within the MENA region's energy profile to make a significant contribution to the reduction of carbon emissions in order to use the resources in a sustainable way and increase the regional energy security of the member states across MENA. Reference: Hadian S, Madani K (2015) A System of Systems Approach to Energy Sustainability Assessment: Are All Renewables Really Green? Ecological Indicators, 52, 194-206.
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lower, Mark D; Christopher, Timothy W; Oland, C Barry
The Facilities and Operations (F&O) Directorate is sponsoring a continuous process improvement (CPI) program. Its purpose is to stimulate, promote, and sustain a culture of improvement throughout all levels of the organization. The CPI program ensures that a scientific and repeatable process exists for improving the delivery of F&O products and services in support of Oak Ridge National Laboratory (ORNL) Management Systems. Strategic objectives of the CPI program include achieving excellence in laboratory operations in the areas of safety, health, and the environment. Identifying and promoting opportunities for achieving the following critical outcomes are important business goals of the CPImore » program: improved safety performance; process focused on consumer needs; modern and secure campus; flexibility to respond to changing laboratory needs; bench strength for the future; and elimination of legacy issues. The Steam Pressure-Reducing Station (SPRS) Safety and Energy Efficiency Improvement Project, which is under the CPI program, focuses on maintaining and upgrading SPRSs that are part of the ORNL steam distribution network. This steam pipe network transports steam produced at the ORNL steam plant to many buildings in the main campus site. The SPRS Safety and Energy Efficiency Improvement Project promotes excellence in laboratory operations by (1) improving personnel safety, (2) decreasing fuel consumption through improved steam system energy efficiency, and (3) achieving compliance with applicable worker health and safety requirements. The SPRS Safety and Energy Efficiency Improvement Project being performed by F&O is helping ORNL improve both energy efficiency and worker safety by modifying, maintaining, and repairing SPRSs. Since work began in 2006, numerous energy-wasting steam leaks have been eliminated, heat losses from uninsulated steam pipe surfaces have been reduced, and deficient pressure retaining components have been replaced. These improvements helped ORNL reduce its overall utility costs by decreasing the amount of fuel used to generate steam. Reduced fuel consumption also decreased air emissions. These improvements also helped lower the risk of burn injuries to workers and helped prevent shrapnel injuries resulting from missiles produced by pressurized component failures. In most cases, the economic benefit and cost effectiveness of the SPRS Safety and Energy Efficiency Improvement Project is reflected in payback periods of 1 year or less.« less
Unbundling of electric power and energy services
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keith, D.M.; Lewis, B.R.
1996-12-31
The world-wide movement to restructure the electric and power and energy industry is now well underway in the United States. The most recent thrust came this year, with the Federal Energy Regulatory Commission`s (FERC`s) issuance on April 24th of new regulations designed to open the interconnected transmission grid to all qualified wholesale users. Other movements have been in the many forms of earlier statutes and regulations promulgated in 1978 to make more efficient use of fuels burned; utility diversification efforts; utility creation of affiliate and subsidiary organizations and operations; introduction into the market of private non-utility power developers; utilities obtainingmore » clearance from the Securities and Exchange Commission (SEC) to venture in international markets; massive mergers and acquisitions; bankruptcies; the entry into the market of nonutility power marketers and brokers, including entities from the gas and securities industries not previously involved in the electric power and energy industry; additional congressional consideration of outright repeal of Holding Company legislation dating back to 1935; some states entering into an era of abandoning the control past in favor of complete re-regulation of the industry on the basis of performance; the coming of Independent System Operators (ISO`s), Regional Transmission Groups (RTG`s), and the possible coming of Capacity Reservation Tariffs (CRT`s), to name a few.« less
Gur, Ilan
2018-01-16
An overview presentation about ARPA-E's AMPED program. AMPED projects seek to develop advanced sensing, control, and power management technologies that redefine the way we think about battery management. Energy storage can significantly improve U.S. energy independence, efficiency, and security by enabling a new generation of electric vehicles. While rapid progress is being made in new battery materials and storage technologies, few innovations have emerged in the management of advanced battery systems. AMPED aims to unlock enormous untapped potential in the performance, safety, and lifetime of today's commercial battery systems exclusively through system-level innovations, and is thus distinct from existing efforts to enhance underlying battery materials and architectures.
NASA Astrophysics Data System (ADS)
Zhou, Yuepeng; Ma, Xianlei; Shi, Xiaoping
2017-04-01
How to increase production efficiency, guarantee grain security, and increase farmers' income using the limited farmland is a great challenge that China is facing. Although theory predicts that secure property rights and moderate scale management of farmland can increase land productivity, reduce farm-related costs, and raise farmer's income, empirical studies on the size and magnitude of these effects are scarce. A number of studies have examined the impacts of land tenure or farm size on productivity or efficiency, respectively. There are also a few studies linking farm size, land tenure and efficiency together. However, to our best knowledge, there are no studies considering tenure security and farm efficiency together for different farm scales in China. In addition, there is little study analyzing the profit frontier. In this study, we particularly focus on the impacts of land tenure security and farm size on farm profit efficiency, using farm level data collected from 23 villages, 811 households in Liaoning in 2015. 7 different farm scales have been identified to further represent small farms, median farms, moderate-scale farms, and large farms. Technical efficiency is analyzed with stochastic frontier production function. The profit efficiency is regressed on a set of explanatory variables which includes farm size dummies, land tenure security indexes, and household characteristics. We found that: 1) The technical efficiency scores for production efficiency (average score = 0.998) indicate that it is already very close to the production frontier, and thus there is little room to improve production efficiency. However, there is larger space to raise profit efficiency (average score = 0.768) by investing more on farm size expansion, seed, hired labor, pesticide, and irrigation. 2) Farms between 50-80 mu are most efficient from the viewpoint of profit efficiency. The so-called moderate-scale farms (100-150 mu) according to the governmental guideline show no advantage in efficiency. 3) Formal land certificates and farmer's participation in land rental market are found to be important determinants of the profit efficiency across different scale of farms. 4) Fertilizer use has been excessive in Liaoning and could lead to the decline of crop profit.
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... providing security education and training. A licensee or other entity subject to part 95 may obtain...
10 CFR 95.49 - Security of automatic data processing (ADP) systems.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security of automatic data processing (ADP) systems. 95.49 Section 95.49 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.49 Security of...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cox, Sarah L; Hotchkiss, Elizabeth L; Bilello, Daniel E
Reliable, safe, and secure electricity is essential for economic and social development and a necessary input for many sectors of the economy. However, electricity generation and associated processes make up a significant portion of global greenhouse gas (GHG) emissions contributing to climate change. Furthermore, electricity systems are vulnerable to climate change impacts - both short-term events and changes over the longer term. This vulnerability presents both near-term and chronic challenges in providing reliable, affordable, equitable, and sustainable energy services. Within this context, developing countries face a number of challenges in the energy sector, including the need to reliably meet growingmore » electricity demand, lessen dependence on imported fuels, expand energy access, and improve stressed infrastructure for fuel supply and electricity transmission. Energy efficiency (EE) and renewable energy (RE) technical solutions described in this paper can bridge action across climate change mitigation and resilience through reducing GHG emissions and supporting electric power sector adaptation to increasing climate risk. Integrated planning approaches, also highlighted in this paper, play an integral role in bringing together mitigation and resilience action under broader frameworks. Through supporting EE and RE deployment and integrated planning approaches, unique to specific national and local circumstances, countries can design and implement policies, strategies, and sectoral plans that unite development priorities, climate change mitigation, and resilience.« less
Power grid operation risk management: V2G deployment for sustainable development
NASA Astrophysics Data System (ADS)
Haddadian, Ghazale J.
The production, transmission, and delivery of cost--efficient energy to supply ever-increasing peak loads along with a quest for developing a low-carbon economy require significant evolutions in the power grid operations. Lower prices of vast natural gas resources in the United States, Fukushima nuclear disaster, higher and more intense energy consumptions in China and India, issues related to energy security, and recent Middle East conflicts, have urged decisions makers throughout the world to look into other means of generating electricity locally. As the world look to combat climate changes, a shift from carbon-based fuels to non-carbon based fuels is inevitable. However, the variability of distributed generation assets in the electricity grid has introduced major reliability challenges for power grid operators. While spearheading sustainable and reliable power grid operations, this dissertation develops a multi-stakeholder approach to power grid operation design; aiming to address economic, security, and environmental challenges of the constrained electricity generation. It investigates the role of Electric Vehicle (EV) fleets integration, as distributed and mobile storage assets to support high penetrations of renewable energy sources, in the power grid. The vehicle-to-grid (V2G) concept is considered to demonstrate the bidirectional role of EV fleets both as a provider and consumer of energy in securing a sustainable power grid operation. The proposed optimization modeling is the application of Mixed-Integer Linear Programing (MILP) to large-scale systems to solve the hourly security-constrained unit commitment (SCUC) -- an optimal scheduling concept in the economic operation of electric power systems. The Monte Carlo scenario-based approach is utilized to evaluate different scenarios concerning the uncertainties in the operation of power grid system. Further, in order to expedite the real-time solution of the proposed approach for large-scale power systems, it considers a two-stage model using the Benders Decomposition (BD). The numerical simulation demonstrate that the utilization of smart EV fleets in power grid systems would ensure a sustainable grid operation with lower carbon footprints, smoother integration of renewable sources, higher security, and lower power grid operation costs. The results, additionally, illustrate the effectiveness of the proposed MILP approach and its potentials as an optimization tool for sustainable operation of large scale electric power systems.
NASA Astrophysics Data System (ADS)
Jacobson, M. Z.
2014-12-01
Global warming, air pollution, and energy insecurity are three of the most significant problems facing the world today. This talk discusses the development of technical and economic plans to convert the energy infrastructure of each of the 50 United States to those powered by 100% wind, water, and sunlight (WWS) for all purposes, namely electricity, transportation, industry, and heating/cooling, after energy efficiency measures have been accounted for. The plans call for all new energy to be WWS by 2020, ~80% conversion of existing energy by 2030, and 100% by 2050 through aggressive policy measures and natural transition. Resource availability, footprint and spacing areas required, jobs created versus lost, energy costs, avoided costs from air pollution mortality and morbidity and climate damage, and methods of ensuring reliability of the grid are discussed. Please see http://web.stanford.edu/group/efmh/jacobson/Articles/I/WWS-50-USState-plans.html
Implications of Postharvest Food Loss/Waste Prevention to Energy and Resources Conservation
NASA Astrophysics Data System (ADS)
Cai, X.; Shafiee-Jood, M.
2015-12-01
World's growing demand for food is driven by population and income growth, dietary changes, and the ever-increasing competition between food, feed and bioenergy challenges food security; meanwhile agricultural expansion and intensification threats the environment by the various detrimental impacts. Researchers have attempted to explore strategies to overcome this grand challenge. One of the promising solutions that have attracted considerable attention recently is to increase the efficiency of food supply chain by reducing food loss and waste (FLW). According to recent studies conducted by Food and Agriculture Organization (FAO), United Nation, almost one third of the food produced for human consumption globally is lost or wasted along the food supply chain. This amount of food discarded manifests a missing, yet potential, opportunity to sustainably enhance both food security and environmental sustainability. However, implementing the strategies and technologies for tackling FLW does not come up as an easy solution since it requires economic incentives, benefit and cost analysis, infrastructure development, and appropriate market mechanism. In this presentation I will provide a synthesis of knowledge on the implications of postharvest food loss/waste prevention to energy and resource conservation, environmental protection, as well as food security. I will also discuss how traditional civil and environmental engineering can contribute to the reduction of postharvest food loss, an important issue of sustainable agriculture.
DOE Office of Scientific and Technical Information (OSTI.GOV)
BLEJWAS,THOMAS E.; SANDERS,THOMAS L.; EAGAN,ROBERT J.
2000-01-01
Nuclear power is an important and, the authors believe, essential component of a secure nuclear future. Although nuclear fuel cycles create materials that have some potential for use in nuclear weapons, with appropriate fuel cycles, nuclear power could reduce rather than increase real proliferation risk worldwide. Future fuel cycles could be designed to avoid plutonium production, generate minimal amounts of plutonium in proliferation-resistant amounts or configurations, and/or transparently and efficiently consume plutonium already created. Furthermore, a strong and viable US nuclear infrastructure, of which nuclear power is a large element, is essential if the US is to maintain a leadershipmore » or even participatory role in defining the global nuclear infrastructure and controlling the proliferation of nuclear weapons. By focusing on new fuel cycles and new reactor technologies, it is possible to advantageously burn and reduce nuclear materials that could be used for nuclear weapons rather than increase and/or dispose of these materials. Thus, the authors suggest that planners for a secure nuclear future use technology to design an ideal future. In this future, nuclear power creates large amounts of virtually atmospherically clean energy while significantly lowering the threat of proliferation through the thoughtful use, physical security, and agreed-upon transparency of nuclear materials. The authors must develop options for policy makers that bring them as close as practical to this ideal. Just as Atoms for Peace became the ideal for the first nuclear century, they see a potential nuclear future that contributes significantly to power for peace and prosperity.« less
NASA Astrophysics Data System (ADS)
De Rango, Floriano; Lupia, Andrea
2016-05-01
MANETs allow mobile nodes communicating to each other using the wireless medium. A key aspect of these kind of networks is the security, because their setup is done without an infrastructure, so external nodes could interfere in the communication. Mobile nodes could be compromised, misbehaving during the multi-hop transmission of data, or they could have a selfish behavior to save energy, which is another important constraint in MANETs. The detection of these behaviors need a framework that takes into account the latest interactions among nodes, so malicious or selfish nodes could be detected also if their behavior is changed over time. The monitoring activity increases the energy consumption, so our proposal takes into account this issue reducing the energy required by the monitoring system, keeping the effectiveness of the intrusion detection system. The results show an improvement in the saved energy, improving the detection performance too.
HUD PowerSaver Pilot Loan Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zimring, Mark; Hoffman, Ian
2010-12-10
The U.S. Department of Housing and Urban Development (HUD) recently announced the creation of a pilot loan program for home energy improvements. The PowerSaver loan program is a new, energy-focused variant of the Title I Property Improvement Loan Insurance Program (Title I Program) and is planned for introduction in early 2011. The PowerSaver pilot will provide lender insurance for secured and unsecured loans up to $25,000 to single family homeowners. These loans will specifically target residential energy efficiency and renewable energy improvements. HUD estimates the two-year pilot will fund approximately 24,000 loans worth up to $300 million; the program ismore » not capped. The Federal Housing Administration (FHA), HUD's mortgage insurance unit, will provide up to $25 million in grants as incentives to participating lenders. FHA is seeking lenders in communities with existing programs for promoting residential energy upgrades.« less
Sandia National Laboratories: Hydrogen Risk Assessment Models toolkit now
Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Sandia National Laboratories: 100 Resilient Cities: Sandia Challenge:
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Airport security inspection process model and optimization based on GSPN
NASA Astrophysics Data System (ADS)
Mao, Shuainan
2018-04-01
Aiming at the efficiency of airport security inspection process, Generalized Stochastic Petri Net is used to establish the security inspection process model. The model is used to analyze the bottleneck problem of airport security inspection process. The solution to the bottleneck is given, which can significantly improve the efficiency and reduce the waiting time by adding the place for people to remove their clothes and the X-ray detector.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moawad, Ayman; Kim, Namdoo; Shidore, Neeraj
2016-01-01
The U.S. Department of Energy (DOE) Vehicle Technologies Office (VTO) has been developing more energy-efficient and environmentally friendly highway transportation technologies that will enable America to use less petroleum. The long-term aim is to develop "leapfrog" technologies that will provide Americans with greater freedom of mobility and energy security, while lowering costs and reducing impacts on the environment. This report reviews the results of the DOE VTO. It gives an assessment of the fuel and light-duty vehicle technologies that are most likely to be established, developed, and eventually commercialized during the next 30 years (up to 2045). Because of themore » rapid evolution of component technologies, this study is performed every two years to continuously update the results based on the latest state-of-the-art technologies.« less
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Security background checks for secure transfer of nuclear materials. 73.28 Section 73.28 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION OF PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security...
China’s Energy Security: The Grand Hedging Strategy
2010-05-01
spotlight. The key to sustaining this dynamic economic growth is access to petroleum resources. The central question of this monograph is as follows...Is China’s energy security strategy liberal-institutionalist or realist-mercantilist? Using a qualitative case study methodology that explores the...dependent variable -- energy security -- using three independent variables (cost of supply, reliability of supply, and security of supply), China’s
Sandia National Laboratories: National Security Missions: International
Transportation Energy Energy Research Global Security WMD Counterterrorism & Response Global Threat Reduction Homeland Defense & Force Protection Homeland Security Cyber & Infrastructure Security Global Business Procurement Technical Assistance Program (PTAP) Current Suppliers iSupplier Account Accounts
NASA Astrophysics Data System (ADS)
Qin, Ying; Allwood, Julian; Richards, Keith
2016-04-01
Population growth and economic development continue to put increasing pressures on China's limited resources which are further exacerbated by the country's substantial regional variations in both natural and socioeconomic conditions. China's pursuit of water, energy and food security faces trade-offs and tensions and the Haihe Basin exemplifies these issues. The river basin contains the capital region of Beijing, Hebei and Tianjin which are already experiencing stress and shortfalls of water resources as a result of intense competition for limited resources. To tackle water scarcity and promote more sustainable use of water, the government has implemented national and regional "3 Red Lines" water policies but they are not integrated with energy and food policies. The aim of this analysis is to assess the sustainability of the regional "3 Red Lines" water targets and their compatibility with energy and food security. This study uses a spatially-explicit, integrated resource model which integrates a hydrological model (GWAVA) with energy and food sub-models in order to analyse current and future resource availability and demand. To assess resource futures, different demand and supply scenarios were analysed up to 2030. Results are visualised as maps and connected Sankey diagrams and outputs are compared with the "3 Red Lines" water targets as well as against indicators related to land and energy policies. The results show that under a business-as-usual scenario, total water demands for Beijing, Tianjin and Hebei are unlikely to comply with future water targets. Reducing water use in the industry and agriculture sectors will be critical in this water-scarce region and whilst efficiency improvements are important, technology choices appear to make the most significant impact e.g. irrigation method for agriculture and cooling technology for power generation. However, both these water saving-measures have trade-offs in energy consumption. Proposed water saving plans of changing the cropping system to grow less wheat could also significantly reduce the demand for water but has trade-offs in maintaining national food security. Given the region's limited water availability, growing demands from competing sectors as well as groundwater use restrictions, future supply will become more reliant on other sources i.e. water transfer, desalination and recycled water which are all power intensive. The approach used in this study enables the identification of critical trade-offs between resource security measures and policies. This would allow decision makers to visualise and better understand the inter-dependencies between resources and not be blindsided by unintended consequences in the pursuit of energy, water and food security.
The security energy encryption in wireless power transfer
NASA Astrophysics Data System (ADS)
Sadzali, M. N.; Ali, A.; Azizan, M. M.; Albreem, M. A. M.
2017-09-01
This paper presents a concept of security in wireless power transfer (WPT) by applying chaos theory. Chaos theory is applied as a security system in order to safeguard the transfer of energy from a transmitter to the intended receiver. The energy encryption of the wireless power transfer utilizes chaos theory to generate the possibility of a logistic map for the chaotic security key. The simulation for energy encryption wireless power transfer system was conducted by using MATLAB and Simulink. By employing chaos theory, the chaotic key ensures the transmission of energy from transmitter to its intended receiver.
Efficient Use of Cogeneration and Fuel Diversification
NASA Astrophysics Data System (ADS)
Kunickis, M.; Balodis, M.; Sarma, U.; Cers, A.; Linkevics, O.
2015-12-01
Energy policy of the European Community is implemented by setting various goals in directives and developing support mechanisms to achieve them. However, very often these policies and legislation come into contradiction with each other, for example Directive 2009/28/EC on the promotion of the use of energy from renewable sources and Directive 2012/27/EU on energy efficiency, repealing Directive 2004/8/EC on the promotion of cogeneration based on a useful heat demand. In this paper, the authors attempt to assess the potential conflicts between policy political objectives to increase the share of high-efficiency co-generation and renewable energy sources (RES), based on the example of Riga district heating system (DHS). If a new heat source using biomass is built on the right bank of Riga DHS to increase the share of RES, the society could overpay for additional heat production capacities, such as a decrease in the loading of existing generating units, thereby contributing to an inefficient use of existing capacity. As a result, the following negative consequences may arise: 1) a decrease in primary energy savings (PES) from high-efficiency cogeneration in Riga DHS, 2) an increase in greenhouse gas (GHG) emissions in the Baltic region, 3) the worsening security situation of electricity supply in the Latvian power system, 4) an increase in the electricity market price in the Lithuanian and Latvian price areas of Nord Pool power exchange. Within the framework of the research, calculations of PES and GHG emission volumes have been performed for the existing situation and for the situation with heat source, using biomass. The effect of construction of biomass heat source on power capacity balances and Nord Pool electricity prices has been evaluated.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheffield, J.
Energy availability in a country is of great importance to its economy and to raising and maintaining its standard of living. In 1994, the United States consumed more than 88 quadrillion Btu (quads) of energy and spent about $500 billion on fuels and electricity. Fortunately, the United States is well endowed with energy sources, notably fossil fuels, and possesses a considerable nuclear power industry. The United States also has significant renewable energy resources and already exploits much of its hydropower resources, which represent 10% of electricity production. Nevertheless, in 1994, the United States imported about 45% of the petroleum productsmore » it consumed, equivalent to about 17 quads of energy. This dependence on imported oil puts the country at risk of energy supply disruptions and oil price shocks. Previous oil shocks may have cost the country as much as $4 billion (in 1993 dollars) between 1973 and 1990. Moreover, the production and use of energy from fossil fuels are major sources of environmental damage. The corresponding situation in many parts of the world is more challenging. Developing countries are experiencing rapid growth in population, energy demand, and the environmental degradation that often results from industrial development. The near-term depletion of energy resources in response to this rapid growth runs counter to the concept of ''sustainable development''--development that meets the needs of today without compromising the ability of future generations to meet their own needs. Energy research and development (R&D) to improve efficiency and to develop and deploy energy alternatives may be viewed, therefore, as an insurance policy to combat the dangers of oil shocks and environmental pollution and as a means of supporting sustainable development. These considerations guide the energy policy of the United States and of the U.S. Department of Energy (DOE). In its strategic plan, DOE identifies the fostering of ''a secure and reliable energy system that is environmentally and economically sustainable'' as the first component of its mission. The strategic goal established for energy resources, identified as one of DOE's four businesses, is for ''the Department of Energy and its partners [to] promote secure, competitive, and environmentally responsible energy systems that serve the needs of the public.'' DOE has also identified four strategic goals for its programs in energy resources: (1) strengthening the economy and raising living standards through improvements in the energy field; (2) protecting the environment by reducing the adverse environmental impacts associated with energy production, distribution, and use; (3) keeping America secure by reducing vulnerabilities to global energy market shocks; and (4) enhancing American competitiveness in a growing world energy market.« less
Energy Structure and Energy Security under Climate Mitigation Scenarios in China
Matsumoto, Ken’ichi
2015-01-01
This study investigates how energy structure and energy security in China will change in the future under climate mitigation policy scenarios using Representative Concentration Pathways in a computable general equilibrium model. The findings suggest that to reduce greenhouse gas emissions, China needs to shift its energy structure from fossil fuel dominance to renewables and nuclear. The lower the allowable emissions, the larger the shifts required. Among fossil fuels, coal use particularly must significantly decrease. Such structural shifts will improve energy self-sufficiency, thus enhancing energy security. Under the policy scenarios, energy-source diversity as measured by the Herfindahl Index improves until 2050, after which diversity declines because of high dependence on a specific energy source (nuclear and biomass). Overall, however, it is revealed that energy security improves along with progress in climate mitigation. These improvements will also contribute to the economy by reducing energy procurement risks. PMID:26660094
10 CFR 712.16 - DOE security review.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false DOE security review. 712.16 Section 712.16 Energy DEPARTMENT OF ENERGY HUMAN RELIABILITY PROGRAM Establishment of and Procedures for the Human Reliability... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...
Castedo, Luis
2017-01-01
Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to 50% and a data throughput that doubles RSA in most scenarios. These conclusions are then corroborated by a frame temporal analysis of Ethernet packets. In addition, current data compression algorithms are evaluated, concluding that, when dealing with the small payloads related to IoT applications, they do not pay off in terms of real data throughput and power consumption. PMID:28850104
Suárez-Albela, Manuel; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Castedo, Luis
2017-08-29
Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to 50% and a data throughput that doubles RSA in most scenarios. These conclusions are then corroborated by a frame temporal analysis of Ethernet packets. In addition, current data compression algorithms are evaluated, concluding that, when dealing with the small payloads related to IoT applications, they do not pay off in terms of real data throughput and power consumption.
Wastewater treatment high rate algal ponds (WWT HRAP) for low-cost biofuel production.
Mehrabadi, Abbas; Craggs, Rupert; Farid, Mohammed M
2015-05-01
Growing energy demand and water consumption have increased concerns about energy security and efficient wastewater treatment and reuse. Wastewater treatment high rate algal ponds (WWT HRAPs) are a promising technology that could help solve these challenges concurrently where climate is favorable. WWT HRAPs have great potential for biofuel production as a by-product of WWT, since the costs of algal cultivation and harvest for biofuel production are covered by the wastewater treatment function. Generally, 800-1400 GJ/ha/year energy (average biomass energy content: 20 GJ/ton; HRAP biomass productivity: 40-70 tons/ha/year) can be produced in the form of harvestable biomass from WWT HRAP which can be used to provide community-level energy supply. In this paper the benefits of WWT HRAPs are compared with conventional mass algal culture systems. Moreover, parameters to effectively increase algal energy content and overall energy production from WWT HRAP are discussed including selection of appropriate algal biomass biofuel conversion pathways. Copyright © 2014 Elsevier Ltd. All rights reserved.
World Energy Resources and New Technologies
NASA Astrophysics Data System (ADS)
Szmyd, Janusz S.
2016-01-01
The development of civilisation is linked inextricably with growing demand for electricity. Thus, the still-rapid increase in the level of utilisation of natural resources, including fossil fuels, leaves it more and more urgent that conventional energy technologies and the potential of the renewable energy sources be made subject to re-evaluation. It is estimated that last 200 years have seen use made of more than 50% of the available natural resources. Equally, if economic forecasts prove accurate, for at least several more decades, oil, natural gas and coal will go on being the basic primary energy sources. The alternative solution represented by nuclear energy remains a cause of considerable public concern, while the potential for use to be made of renewable energy sources is seen to be very much dependent on local environmental conditions. For this reason, it is necessary to emphasise the impact of research that focuses on the further sharpening-up of energy efficiency, as well as actions aimed at increasing society's awareness of the relevant issues. The history of recent centuries has shown that rapid economic and social transformation followed on from the industrial and technological revolutions, which is to say revolutions made possible by the development of power-supply technologies. While the 19th century was "the age of steam" or of coal, and the 20th century the era of oil and gas, the question now concerns the name that will at some point come to be associated with the 21st century. In this paper, the subjects of discussion are primary energy consumption and energy resources, though three international projects on the global scale are also presented, i.e. ITER, Hydrates and DESERTEC. These projects demonstrate new scientific and technical possibilities, though it is unlikely that commercialisation would prove feasible before 2050. Research should thus be focused on raising energy efficiency. The development of high-efficiency technologies that reinforce energy security is presented, with it being assumed that these new high-efficiency technologies are capable of being applied globally in the near future.
Das, Ashok Kumar
2015-03-01
An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bourgeois, Tom
From October 1, 2009 through September 30, 2013 (“contract period”), the Northeast Clean Energy Application Center (“NE-CEAC”) worked in New York and New England (Connecticut, Rhode Island, Vermont, Massachusetts, New Hampshire, and Maine) to create a more robust market for the deployment of clean energy technologies (CETs) including combined heat and power (CHP), district energy systems (DES), and waste heat recovery (WHR) systems through the provision of technical assistance, education and outreach, and strategic market analysis and support for decision-makers. CHP, DES, and WHR can help reduce greenhouse gas emissions, reduce electrical and thermal energy costs, and provide more reliablemore » energy for users throughout the United States. The NE-CEAC’s efforts in the provision of technical assistance, education and outreach, and strategic market analysis and support for decision-makers helped advance the market for CETs in the Northeast thereby helping the region move towards the following outcomes: Reduction of greenhouse gas emissions and criteria pollutants; Improvements in energy efficiency resulting in lower costs of doing business; Productivity gains in industry and efficiency gains in buildings; Lower regional energy costs; Strengthened energy security; Enhanced consumer choice; Reduced price risks for end-users; and Economic development effects keeping more jobs and more income in our regional economy Over the contract period, NE-CEAC provided technical assistance to approximately 56 different potential end-users that were interested in CHP and other CETs for their facility or facilities. Of these 56 potential end-users, five new CHP projects totaling over 60 MW of install capacity became operational during the contract period. The NE-CEAC helped host numerous target market workshops, trainings, and webinars; and NE-CEAC staff delivered presentations at many other workshops and conferences. In total, over 60 different workshops, conferences, webinars, and presentation were hosted or delivered during the contract period. The NE-CEAC also produced publically available educational materials such as CHP project profiles. Finally, the NE-CEAC worked closely with the relevant state agencies involved with CHP development. In New York, the NE-CEAC played an important role in securing and maintaining funding for CHP incentive programs administered by the New York State Energy Research Development Authority. NE-CEAC was also involved in the NYC Mayor's Office DG Collaborative. The NECEAC was also named a strategic resource for the Connecticut Department of Energy and Environmental Protection’s innovative Microgrid Pilot Program.« less
Quantum Biometrics with Retinal Photon Counting
NASA Astrophysics Data System (ADS)
Loulakis, M.; Blatsios, G.; Vrettou, C. S.; Kominis, I. K.
2017-10-01
It is known that the eye's scotopic photodetectors, rhodopsin molecules, and their associated phototransduction mechanism leading to light perception, are efficient single-photon counters. We here use the photon-counting principles of human rod vision to propose a secure quantum biometric identification based on the quantum-statistical properties of retinal photon detection. The photon path along the human eye until its detection by rod cells is modeled as a filter having a specific transmission coefficient. Precisely determining its value from the photodetection statistics registered by the conscious observer is a quantum parameter estimation problem that leads to a quantum secure identification method. The probabilities for false-positive and false-negative identification of this biometric technique can readily approach 10-10 and 10-4, respectively. The security of the biometric method can be further quantified by the physics of quantum measurements. An impostor must be able to perform quantum thermometry and quantum magnetometry with energy resolution better than 10-9ℏ , in order to foil the device by noninvasively monitoring the biometric activity of a user.
ECG-cryptography and authentication in body area networks.
Zhang, Zhaoyang; Wang, Honggang; Vasilakos, Athanasios V; Fang, Hua
2012-11-01
Wireless body area networks (BANs) have drawn much attention from research community and industry in recent years. Multimedia healthcare services provided by BANs can be available to anyone, anywhere, and anytime seamlessly. A critical issue in BANs is how to preserve the integrity and privacy of a person's medical data over wireless environments in a resource efficient manner. This paper presents a novel key agreement scheme that allows neighboring nodes in BANs to share a common key generated by electrocardiogram (ECG) signals. The improved Jules Sudan (IJS) algorithm is proposed to set up the key agreement for the message authentication. The proposed ECG-IJS key agreement can secure data communications over BANs in a plug-n-play manner without any key distribution overheads. Both the simulation and experimental results are presented, which demonstrate that the proposed ECG-IJS scheme can achieve better security performance in terms of serval performance metrics such as false acceptance rate (FAR) and false rejection rate (FRR) than other existing approaches. In addition, the power consumption analysis also shows that the proposed ECG-IJS scheme can achieve energy efficiency for BANs.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
10 CFR 605.18 - National security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false National security. 605.18 Section 605.18 Energy DEPARTMENT... PROGRAM § 605.18 National security. Activities under ER's Financial Assistance Program shall not involve classified information (i.e., Restricted Data, formerly Restricted Data, National Security Information...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...
Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman
2018-01-01
Background Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Objective Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Methods Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Results Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. Conclusions To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. PMID:29506966
Sadat, Md Nazmus; Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman
2018-03-05
Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. ©Md Nazmus Sadat, Xiaoqian Jiang, Md Momin Al Aziz, Shuang Wang, Noman Mohammed. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 05.03.2018.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shah, Nihar; Abhyankar, Nikit; Park, Won Young
Improving efficiency of air conditioners (ACs) typically involves improving the efficiency of various components such as compressors, heat exchangers, expansion valves, refrigerant and fans. We estimate the incremental cost of improving the efficiency of room ACs based on the cost of improving the efficiency of its key components. Further, we estimate the retail price increase required to cover the cost of efficiency improvement, compare it with electricity bill savings, and calculate the payback period for consumers to recover the additional price of a more efficient AC. We assess several efficiency levels, two of which are summarized below in the report.more » The finding that significant efficiency improvement is cost effective from a consumer perspective is robust over a wide range of assumptions. If we assume a 50% higher incremental price compared to our baseline estimate, the payback period for the efficiency level of 3.5 ISEER is 1.1 years. Given the findings of this study, establishing more stringent minimum efficiency performance criteria (one star level) should be evaluated rigorously considering significant benefits to consumers, energy security and environment.« less
NASA Astrophysics Data System (ADS)
Zhou, W.; Qiu, G. Y.; Oodo, S. O.; He, H.
2013-03-01
An increasing interest in wind energy and the advance of related technologies have increased the connection of wind power generation into electrical grids. This paper proposes an optimization model for determining the maximum capacity of wind farms in a power system. In this model, generator power output limits, voltage limits and thermal limits of branches in the grid system were considered in order to limit the steady-state security influence of wind generators on the power system. The optimization model was solved by a nonlinear primal-dual interior-point method. An IEEE-30 bus system with two wind farms was tested through simulation studies, plus an analysis conducted to verify the effectiveness of the proposed model. The results indicated that the model is efficient and reasonable.
10 CFR 1016.23 - Establishment of security areas.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Establishment of security areas. 1016.23 Section 1016.23 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016... safeguard documents and material containing Restricted Data in accordance with the provisions of §§ 1016.21...
10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.39 Termination, suspension, or revocation of security facility...
10 CFR 1016.39 - Termination, suspension, or revocation of security facility approval.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Termination, suspension, or revocation of security facility approval. 1016.39 Section 1016.39 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Control of Information § 1016.39 Termination, suspension, or revocation of security facility...
10 CFR 1016.23 - Establishment of security areas.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 4 2011-01-01 2011-01-01 false Establishment of security areas. 1016.23 Section 1016.23 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF RESTRICTED DATA Physical Security § 1016... safeguard documents and material containing Restricted Data in accordance with the provisions of §§ 1016.21...
75 FR 39273 - Energy Independence and Security Act (Pub. L. 110-140)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-08
... DEPARTMENT OF THE INTERIOR U.S. Geological Survey Energy Independence and Security Act (Pub. L... Resource Assessment Methodology. SUMMARY: In 2007, the Energy Independence and Security Act (Pub. L. 110... provide important information to evaluate the potential for CO 2 storage as a mitigation option for global...
Efficient proof of ownership for cloud storage systems
NASA Astrophysics Data System (ADS)
Zhong, Weiwei; Liu, Zhusong
2017-08-01
Cloud storage system through the deduplication technology to save disk space and bandwidth, but the use of this technology has appeared targeted security attacks: the attacker can deceive the server to obtain ownership of the file by get the hash value of original file. In order to solve the above security problems and the different security requirements of the files in the cloud storage system, an efficient and information-theoretical secure proof of ownership sceme is proposed to support the file rating. Through the K-means algorithm to implement file rating, and use random seed technology and pre-calculation method to achieve safe and efficient proof of ownership scheme. Finally, the scheme is information-theoretical secure, and achieve better performance in the most sensitive areas of client-side I/O and computation.
Nanocarbon composites and hybrids in sustainability: a review.
Vilatela, Juan J; Eder, Dominik
2012-03-12
There is an ever-growing need to protect our environment by increasing energy efficiency and developing "clean" energy sources. These are global challenges, and their resolution is vital to our energy security. Although many conventional materials, such as metals, ceramics, and plastics, cannot fulfil all requirements for these new technologies, many material combinations can offer synergistic effects that create improved and even new properties. The implementation of nanocarbons, such as graphene and carbon nanotubes, into nanocomposites and, more recently, into the new class of hybrids, are very promising examples. In contrast to classical nanocomposites, where a low volume fraction of the carbon component is mixed into a polymer or ceramic matrix, hybrids are materials in which nanocarbon is coated with a thin layer of the functional compound, which introduces the interface as a powerful new parameter. Based on interfacial charge and energy transfer processes, nanocarbon hybrids have shown increased sensitivities in gas sensors, improved efficiencies in photovoltaics, superior activities in photocatalysts, and enhanced capacities in supercapacitors. This review compares the characteristics and potentials of both nanocarbon composites and hybrids, highlights recent developments in their synthesis and discusses key challenges for their use in various energy applications. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
A Look Inside Argonne's Center for Nanoscale Materials
Divan, Ralu; Rosenthal, Dan; Rose, Volker; Wai Hla
2018-05-23
At a very small, or "nano" scale, materials behave differently. The study of nanomaterials is much more than miniaturization - scientists are discovering how changes in size change a material's properties. From sunscreen to computer memory, the applications of nanoscale materials research are all around us. Researchers at Argonne's Center for Nanoscale Materials are creating new materials, methods and technologies to address some of the world's greatest challenges in energy security, lightweight but durable materials, high-efficiency lighting, information storage, environmental stewardship and advanced medical devices.
Sscience & technology review; Science Technology Review
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1996-07-01
This review is published ten times a year to communicate, to a broad audience, Lawrence Livermore National Laboratory`s scientific and technological accomplishments, particularly in the Laboratory`s core mission areas - global security, energy and the environment, and bioscience and biotechnology. This review for the month of July 1996 discusses: Frontiers of research in advanced computations, The multibeam Fabry-Perot velocimeter: Efficient measurement of high velocities, High-tech tools for the American textile industry, and Rock mechanics: can the Tuff take the stress.
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Physical security standards. 110.44 Section 110.44 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) EXPORT AND IMPORT OF NUCLEAR EQUIPMENT AND MATERIAL Review of License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient...
10 CFR 602.16 - National security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...
10 CFR 602.16 - National security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 4 2013-01-01 2013-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...
10 CFR 602.16 - National security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 4 2014-01-01 2014-01-01 false National security. 602.16 Section 602.16 Energy DEPARTMENT... ASSISTANCE PROGRAM § 602.16 National security. Activities under the Epidemiology and Other Health Studies..., Formerly Restricted Data, National Security Information). However, if in the opinion of the recipient or...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
10 CFR 20.1801 - Security of stored material.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Security of stored material. 20.1801 Section 20.1801 Energy NUCLEAR REGULATORY COMMISSION STANDARDS FOR PROTECTION AGAINST RADIATION Storage and Control of Licensed Material § 20.1801 Security of stored material. The licensee shall secure from unauthorized...
Status and prospect of NDT technology for nuclear energy industry in Korea
NASA Astrophysics Data System (ADS)
Lee, Joon Hyun
2016-02-01
Innovative energy technology is considered to be one of the key solutions for meeting the challenges of climate change and energy security, which is why global leaders are focusing on enhancing energy technology R&D. In accordance with the global movements to accelerate energy R&D, the Korean government has made significant investments in a broad spectrum of energy R&D programs, including energy efficiency, resources, CCS, new and renewable energy, power generation and electricity delivery, nuclear power and nuclear waste management. In order to manage government sponsored energy R&D programs in an efficient and effective way, the government established the Korea Institute of Energy technology Evaluation and Planning (KETEP) in 2009. Main activities of KETEP include developing energy technology roadmaps, planning, evaluating, and managing R&D programs, fostering experts in the field of energy, promoting international cooperation programs, gathering and analyzing energy statistics, and supporting infrastructure and commercialization. KETEP assists the Ministry of Trade, Industry and Energy in developing national R&D strategies while also working with researchers, universities, national institutes and the private sector for their successful energy technology and deployment. This presentation consists of three parts. First, I will introduce the characteristics of energy trends and mix in Korea. Then, I'll speak about the related national R&D strategies of energy technology. Finally, I'll finish up with the status and prospect of NDT technology for nuclear energy industry in Korea. The development of the on-line structural integrity monitoring systems and the related techniques in Korean nuclear power plant for the purpose of condition based maintenance is introduced. The needs of NDT techniques for inspection and condition monitoring for GEN IV including SFR, small module reactor etc., are also discussed.
NASA Astrophysics Data System (ADS)
Omotoso, T.
2015-12-01
By 2050, the world will need to feed 9 billion people. This will require a 60% increase in agricultural production and subsequently a 6% increase in water use by the agricultural sector alone. By 2030, global water demand is expected to increase by 40%, mostly in developing countries like Nigeria (Addams, Boccaletti, Kerlin, & Stuchtey, 2009) and global energy demand is expected to increase by 33% in 2035, also, mostly in emerging economies (IEA, 2013). These resources have to be managed efficiently in preparation for these future demands. Population growth leads to increased demand for water, energy and food. More food production will lead to more water-for-food and energy-for-food usage; and more demand for energy will lead to more water-for-energy needs. This nexus between water, energy and food is poorly understood and furthermore, complicated by external drivers such as climate change. Niger State Nigeria, which is blessed with abundant water and arable land resources, houses the three hydropower dams in Nigeria and one of the governments' proposed Staple Crops Processing Zones (SCPZ) for rice production. Both of these capital intensive investments depend heavily on water resources and are all highly vulnerable to changes in climate. Thus, it is essential to know how the local climate in this state will likely change and its impacts on water, energy and food security, so that policy makers can make informed mitigation/adaptation plans; operational and investment decisions. The objective of this project is to provide information, using an integrated resources management approach, on the effects of future climate changes on water, energy (hydropower) and food resources in Niger State, Nigeria and improve knowledge on the interlinkages between water, energy and food at a local scale.
Fossil Energy: Drivers and Challenges.
NASA Astrophysics Data System (ADS)
Friedmann, Julio
2007-04-01
Concerns about rapid economic growth, energy security, and global climate change have created a new landscape for fossil energy exploration, production, and utilization. Since 85% of primary energy supply comes from fossil fuels, and 85% of greenhouse gas emissions come from fossil fuel consumption, new and difficult technical and political challenges confront commercial, governmental, and public stakeholders. As such, concerns over climate change are explicitly weighed against security of international and domestic energy supplies, with economic premiums paid for either or both. Efficiency improvements, fuel conservation, and deployment of nuclear and renewable supplies will help both concerns, but are unlikely to offset growth in the coming decades. As such, new technologies and undertakings must both provide high quality fossil energy with minimal environmental impacts. The largest and most difficult of these undertakings is carbon management, wherein CO2 emissions are sequestered indefinitely at substantial incremental cost. Geological formations provide both high confidence and high capacity for CO2 storage, but present scientific and technical challenges. Oil and gas supply can be partially sustained and replaced through exploitation of unconventional fossil fuels such as tar-sands, methane hydrates, coal-to-liquids, and oil shales. These fuels provide enormous reserves that can be exploited at current costs, but generally require substantial energy to process. In most cases, the energy return on investment (EROI) is dropping, and unconventional fuels are generally more carbon intensive than conventional, presenting additional carbon management challenges. Ultimately, a large and sustained science and technology program akin to the Apollo project will be needed to address these concerns. Unfortunately, real funding in energy research has dropped dramatically (75%) in the past three decades, and novel designs in fission and fusion are not likely to provide any substantial offset in the next 30 years when they are most needed internationally.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Freund, M.T.; Wise, J.A.; Ulibarri, C.A.
This paper addresses US energy security in the post-Cold War era for a conference on energy security jointly sponsored by the Department of Energy and the National Defense University. It examines the evolving nature of energy security based on analysis of past crisis-inducing events and-discusses potentially important geopolitical, environmental, regulatory, and economic developments during the next twenty-five years. The paper steps beyond the traditional economic focus of energy security issues to examine the interplay between fundamental economic and technical drivers on the one hand, and political, environmental, and perceptual phenomena, on the other hand, that can combine to create crisesmore » where none were expected. The paper expands on the premise that the recent demise of the Soviet Union and other changing world conditions have created a new set of energy dynamics, and that it is imperative that the United States revise its energy security perspective accordingly. It proceeds by reviewing key factors that comprise the concepts of ``energy security`` and ``energy crisis`` and how they may fit into the new world energy security equation. The study also presents a series of crisis scenarios that could develop during the next twenty-five years, paying particular attention to mechanisms and linked crisis causes and responses. It concludes with a discussion of factors that may serve to warn analysts and decision makers of impending future crises conditions. The crisis scenarios contained in this report should be viewed only as a representative sample of the types of situations that could occur. They serve to illustrate the variety of factors that can coalesce to produce a ``crisis.``« less
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
10 CFR 110.44 - Physical security standards.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Physical security standards. 110.44 Section 110.44 Energy... License Applications § 110.44 Physical security standards. (a) Physical security measures in recipient... publication INFCIRC/225/Rev. 4 (corrected), June 1999, “The Physical Protection of Nuclear Material and...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
Smart sensing surveillance system
NASA Astrophysics Data System (ADS)
Hsu, Charles; Chu, Kai-Dee; O'Looney, James; Blake, Michael; Rutar, Colleen
2010-04-01
An effective public safety sensor system for heavily-populated applications requires sophisticated and geographically-distributed infrastructures, centralized supervision, and deployment of large-scale security and surveillance networks. Artificial intelligence in sensor systems is a critical design to raise awareness levels, improve the performance of the system and adapt to a changing scenario and environment. In this paper, a highly-distributed, fault-tolerant, and energy-efficient Smart Sensing Surveillance System (S4) is presented to efficiently provide a 24/7 and all weather security operation in crowded environments or restricted areas. Technically, the S4 consists of a number of distributed sensor nodes integrated with specific passive sensors to rapidly collect, process, and disseminate heterogeneous sensor data from near omni-directions. These distributed sensor nodes can cooperatively work to send immediate security information when new objects appear. When the new objects are detected, the S4 will smartly select the available node with a Pan- Tilt- Zoom- (PTZ) Electro-Optics EO/IR camera to track the objects and capture associated imagery. The S4 provides applicable advanced on-board digital image processing capabilities to detect and track the specific objects. The imaging detection operations include unattended object detection, human feature and behavior detection, and configurable alert triggers, etc. Other imaging processes can be updated to meet specific requirements and operations. In the S4, all the sensor nodes are connected with a robust, reconfigurable, LPI/LPD (Low Probability of Intercept/ Low Probability of Detect) wireless mesh network using Ultra-wide band (UWB) RF technology. This UWB RF technology can provide an ad-hoc, secure mesh network and capability to relay network information, communicate and pass situational awareness and messages. The Service Oriented Architecture of S4 enables remote applications to interact with the S4 network and use the specific presentation methods. In addition, the S4 is compliant with Open Geospatial Consortium - Sensor Web Enablement (OGC-SWE) standards to efficiently discover, access, use, and control heterogeneous sensors and their metadata. These S4 capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded environments. The S4 system is directly applicable to solutions for emergency response personnel, law enforcement, and other homeland security missions, as well as in applications requiring the interoperation of sensor networks with handheld or body-worn interface devices.
3 CFR - The Energy Independence and Security Act of 2007
Code of Federal Regulations, 2010 CFR
2010-01-01
... 3 The President 1 2010-01-01 2010-01-01 false The Energy Independence and Security Act of 2007 Presidential Documents Other Presidential Documents Memorandum of January 26, 2009 The Energy Independence and Security Act of 2007 Memorandum for the Secretary of Transportation [and] the Administrator of the National Highway Traffic Safety...
The pivotal and paradoxical role of phosphorus in a resilient water-energy-food security nexus
USDA-ARS?s Scientific Manuscript database
We make the case that phosphorus (P) is inextricably linked to an increasingly fragile, interconnected and interdependent ‘nexus’ of water, energy, and food security. While there are many other drivers that influence water, energy, and food security, P plays a unique and under-recognized role within...
NASA Astrophysics Data System (ADS)
Lee, Jae Sung
2016-10-01
About 400 semiconductor solids are known to have photocatalytic activity for water splitting. Yet there is no single material that could satisfy all the requirements for desired photocatalysts: i) suitable band gap energy (1.7 eV< Eg < 2.3 eV) for high efficiency, ii) proper band position for reduction and/or oxidation of water, iii) long-term stability in aqueous solutions, iv) low cost, v) high crystallinity, and vi) high conductivity. Hence, in the selection of photocatalytic materials, we better start from intrinsically stable materials made of earth-abundant elements. The band bap energy is also the primary consideration to absorb ample amount of solar energy of wide wavelength spectrum. It sets the limit of theoretically maximum efficiency and it could also be extended by band engineering techniques. Upon selection of the candidate materials, we can also modify the materials for full utilization their potentials. The main path of efficiency loss in PEC water splitting process is recombination of photoelectrons and holes. We discuss the material designs including i) p-n heterojunction photoanodes for effective electron-hole separation, ii) electron highway to facilitate interparticle electron transfer, iii) metal or anion doping to improve conductivity of the semiconductor and to extend the range of light absorption, iv) one-dimensional nanomaterials to secure a short hole diffusion distance and vectoral electron transfer, and v) loading co-catalysts for facile charge separation. High efficiency has been demonstrated for all these examples due to efficient electron-hole separation. Finally, total systems for unassisted solar fuel production are demonstrated.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aliprantis, Dionysios; El-Sharkawi, Mohamed; Muljadi, Eduard
The main objective of this special issue is to collect and disseminate publications that highlight recent advances and breakthroughs in the area of renewable energy resources. The use of these resources for production of electricity is increasing rapidly worldwide. As of 2015, a majority of countries have set renewable electricity targets in the 10%-40% range to be achieved by 2020-2030, with a few notable exceptions aiming for 100% generation by renewables. We are experiencing a truly unprecedented transition away from fossil fuels, driven by environmental, energy security, and socio-economic factors.Electric machines can be found in a wide range of renewablemore » energy applications, such as wind turbines, hydropower and hydrokinetic systems, flywheel energy storage devices, and low-power energy harvesting systems. Hence, the design of reliable, efficient, cost-effective, and controllable electric machines is crucial in enabling even higher penetrations of renewable energy systems in the smart grid of the future. In addition, power electronic converter design and control is critical, as they provide essential controllability, flexibility, grid interface, and integration functions.« less
Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar
NASA Astrophysics Data System (ADS)
Botel, Gabriel
This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive literature in human security rarely applied in this context. This includes a brief review of human security and Sino-Myanmar relations, and is grounded in an empirical analysis of Chinese investment in Myanmar's hydropower and oil and gas sectors. Ultimately, this thesis argues that, while insightful, many traditional interpretations of Sino-Myanmar energy cooperation overlook the security interests of those worst affected. Furthermore, that the worst excesses of Chinese companies in Myanmar are not unique to China, but common across all investors in the regime, Western or otherwise.
Efficient live face detection to counter spoof attack in face recognition systems
NASA Astrophysics Data System (ADS)
Biswas, Bikram Kumar; Alam, Mohammad S.
2015-03-01
Face recognition is a critical tool used in almost all major biometrics based security systems. But recognition, authentication and liveness detection of the face of an actual user is a major challenge because an imposter or a non-live face of the actual user can be used to spoof the security system. In this research, a robust technique is proposed which detects liveness of faces in order to counter spoof attacks. The proposed technique uses a three-dimensional (3D) fast Fourier transform to compare spectral energies of a live face and a fake face in a mathematically selective manner. The mathematical model involves evaluation of energies of selective high frequency bands of average power spectra of both live and non-live faces. It also carries out proper recognition and authentication of the face of the actual user using the fringe-adjusted joint transform correlation technique, which has been found to yield the highest correlation output for a match. Experimental tests show that the proposed technique yields excellent results for identifying live faces.
Laboratory Directed Research and Development Annual Report for 2009
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, Pamela J.
This report documents progress made on all LDRD-funded projects during fiscal year 2009. As a US Department of Energy (DOE) Office of Science (SC) national laboratory, Pacific Northwest National Laboratory (PNNL) has an enduring mission to bring molecular and environmental sciences and engineering strengths to bear on DOE missions and national needs. Their vision is to be recognized worldwide and valued nationally for leadership in accelerating the discovery and deployment of solutions to challenges in energy, national security, and the environment. To achieve this mission and vision, they provide distinctive, world-leading science and technology in: (1) the design and scalablemore » synthesis of materials and chemicals; (2) climate change science and emissions management; (3) efficient and secure electricity management from generation to end use; and (4) signature discovery and exploitation for threat detection and reduction. PNNL leadership also extends to operating EMSL: the Environmental Molecular Sciences Laboratory, a national scientific user facility dedicated to providing itnegrated experimental and computational resources for discovery and technological innovation in the environmental molecular sciences.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Herron, Kerry Gale; Jenkins-Smith, Hank C.
2008-01-01
We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support formore » domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bracho, Riccardo; Linvill, Carl; Sedano, Richard
With the vision to transform the power sector, Mexico included in the new laws and regulations deployment of smart grid technologies and provided various attributes to the Ministry of Energy and the Energy Regulatory Commission to enact public policies and regulation. The use of smart grid technologies can have a significant impact on the integration of variable renewable energy resources while maintaining reliability and stability of the system, significantly reducing technical and non-technical electricity losses in the grid, improving cyber security, and allowing consumers to make distributed generation and demand response decisions. This report describes for Mexico's Ministry of Energymore » (SENER) an overall approach (Optimal Feasible Pathway) for moving forward with smart grid policy development in Mexico to enable increasing electric generation from renewable energy in a way that optimizes system stability and reliability in an efficient and cost-effective manner.« less
IMPACTS Results Summary for CY 2010
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weakley, Steven A.
Working in partnership with industry, the U.S. Department of Energy’s (DOE’s) Advanced Manufacturing Office (AMO) is helping reduce industrial energy use, carbon emissions, and waste while boosting productivity and economic competitiveness. Operating within the Office of Energy Efficiency and Renewable Energy (EERE), ITP conducts research, development, and demonstration (RD&D) projects and technology transfer activities that are producing substantial benefits to industry and helping the nation to address some of its biggest challenges in the areas of energy security and environmental performance. This document summarizes some of the impacts of ITP’s programs through 2010. The selection of 2010 as the timeframemore » for this report recognizes the fact that it takes at least two years to gain a full perspective on program performance and to assess the results of commercialization efforts for the technologies and practices at issue.« less
Improving Spectroscopic Performance of a Coplanar-Anode High-Pressure Xenon Gamma-Ray Spectrometer
NASA Astrophysics Data System (ADS)
Kiff, Scott Douglas; He, Zhong; Tepper, Gary C.
2007-08-01
High-pressure xenon (HPXe) gas is a desirable radiation detection medium for homeland security applications because of its good inherent room-temperature energy resolution, potential for large, efficient devices, and stability over a broad temperature range. Past work in HPXe has produced large-diameter gridded ionization chambers with energy resolution at 662 keV between 3.5 and 4% FWHM. However, one major limitation of these detectors is resolution degradation due to Frisch grid microphonics. A coplanar-anode HPXe detector has been developed as an alternative to gridded chambers. An investigation of this detector's energy resolution is reported in this submission. A simulation package is used to investigate the contributions of important physical processes to the measured photopeak broadening. Experimental data is presented for pure Xe and Xe + 0.2%H2 mixtures, including an analysis of interaction location effects on the energy spectrum.
Threats to US energy security: the challenge of Arab oil
DOE Office of Scientific and Technical Information (OSTI.GOV)
Phillips, J.
1979-08-13
Assured access to foreign oil supplies is a vital national interest of the United States which has been repeatedly jeopardized in the 1970s and one that will face additional critical challenges in the 1980s. This paper identifies and analyzes various threats to US energy security both in terms of their past use and future usability. Since the most ominous threat to US energy security is posed in connection with the Arab-Israeli conflict, the paper focuses on the Arab oil weapon, although the energy-security implications of the Iranian revolution are also assessed.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2015-08-01
Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.
A dynamic model to assess tradeoffs in power production and riverine ecosystem protection.
Miara, Ariel; Vörösmarty, Charles J
2013-06-01
Major strategic planning decisions loom as society aims to balance energy security, economic development and environmental protection. To achieve such balance, decisions involving the so-called water-energy nexus must necessarily embrace a regional multi-power plant perspective. We present here the Thermoelectric Power & Thermal Pollution Model (TP2M), a simulation model that simultaneously quantifies thermal pollution of rivers and estimates efficiency losses in electricity generation as a result of fluctuating intake temperatures and river flows typically encountered across the temperate zone. We demonstrate the model's theoretical framework by carrying out sensitivity tests based on energy, physical and environmental settings. We simulate a series of five thermoelectric plants aligned along a hypothetical river, where we find that warm ambient temperatures, acting both as a physical constraint and as a trigger for regulatory limits on plant operations directly reduce electricity generation. As expected, environmental regulation aimed at reducing thermal loads at a single plant reduces power production at that plant, but ironically can improve the net electricity output from multiple plants when they are optimally co-managed. On the technology management side, high efficiency can be achieved through the use of natural gas combined cycle plants, which can raise the overall efficiency of the aging population of plants, including that of coal. Tradeoff analysis clearly shows the benefit of attaining such high efficiencies, in terms of both limiting thermal loads that preserve ecosystem services and increasing electricity production that benefits economic development.
2012-11-01
that mobile application developers should reconsider implementing garbled circuits due to their extreme resource usage, and instead rely upon our equivalently secure and significantly more efficient alternative.
Secure Cluster Head Sensor Elections Using Signal Strength Estimation and Ordered Transmissions
Wang, Gicheol; Cho, Gihwan
2009-01-01
In clustered sensor networks, electing CHs (Cluster Heads) in a secure manner is very important because they collect data from sensors and send the aggregated data to the sink. If a compromised node is elected as a CH, it can illegally acquire data from all the members and even send forged data to the sink. Nevertheless, most of the existing CH election schemes have not treated the problem of the secure CH election. Recently, random value based protocols have been proposed to resolve the secure CH election problem. However, these schemes cannot prevent an attacker from suppressing its contribution for the change of CH election result and from selectively forwarding its contribution for the disagreement of CH election result. In this paper, we propose a modified random value scheme to prevent these disturbances. Our scheme dynamically adjusts the forwarding order of contributions and discards a received contribution when its signal strength is lower than the specified level to prevent these malicious actions. The simulation results have shown that our scheme effectively prevents attackers from changing and splitting an agreement of CH election result. Also, they have shown that our scheme is relatively energy-efficient than other schemes. PMID:22408550
NASA Astrophysics Data System (ADS)
Pettit, Sandra L.
Designing and constructing safe, secure and cost-effective buildings has always been the goal of architects, engineers, developers and community officials. However, in light of recent tragic events, urban security design has become a major concern for both public and private building owners as the threat of terrorism attacks becomes more evident. Modern research and technology have provided a means to counter some of these threats, but there is little doubt that the need for physical security design will continue to increase as long as there are conflicting social, religious, and political agendas in the world. Parallel to this trend, the desire for aesthetically pleasing structures and architecture which pushes the envelope of typical building design make designing a secure, blast and fire resistant building a challenge, as many protective measures clash with the desires of architects. As a result, development of construction materials and technologies with respect to security is on the rise and there is a need for comprehensive solutions. Research into the behavior of stainless steel may prove it to be an elegant and efficient solution to a secure structural design which does not compromise a building's architecture. As a material that is often chosen for its aesthetic appeal, it also exhibits excellent ductility and high stress-strain rates, allowing it to absorb large amounts of energy from blasts before fracturing, compared to carbon steel. Stainless steel also exhibits superior fire-resisting qualities and can perform similarly to carbon steels without unsightly added fire protection. Using stainless steel for elements which have been identified as vulnerable to attack, such as a major column or transfer girder, or elements which can protect the rest of structure from a blast, such as a blast wall, can be an efficient component of a comprehensive urban security design. The challenges associated with the use of stainless steel, which has kept its use in structural design to a minimum, such as higher costs, availability, or special welding procedures, are minimal and will be easily overcome as the use of stainless steel in structure increases and designers and fabricators become more familiar with the material.
10 CFR 2.911 - Admissibility of restricted data or other national security information.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security...
10 CFR 2.911 - Admissibility of restricted data or other national security information.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Admissibility of restricted data or other national security information. 2.911 Section 2.911 Energy NUCLEAR REGULATORY COMMISSION AGENCY RULES OF PRACTICE AND... National Security Information § 2.911 Admissibility of restricted data or other national security...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 2 2014-01-01 2014-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...
NREL: News - New Energy Systems Enhance National Security
resources, bioenergy and bio-based products, zero energy buildings, wind energy, geothermal energy, solar Energy Systems Enhance National Security Washington D.C., March 14, 2002 Experts from the U.S . Department of Energy's National Renewable Energy Laboratory (NREL) have identified key renewable energy
Urbanization, Extreme Climate Hazards and Food, Energy Water Security
NASA Astrophysics Data System (ADS)
Romero-Lankao, P.; Davidson, D.; McPhearson, T.
2016-12-01
Research is urgently needed that incorporates the interconnected nature of three critical resources supporting our cities: food, energy and water. Cities are increasing demands for food, water and energy resources that in turn stress resource supplies, creating risks of negative impacts to human and ecological wellbeing. Simultaneously, shifts in climatic conditions, including extremes such as floods, heat, and droughts, threaten the sustainable availability of adequate quantities and qualities of food, energy and water (FEW) resources needed for resilient cities and ecosystems. These resource flows cannot be treated in isolation simply because they are interconnected: shifts in food, energy or water dynamics in turn affect the others, affecting the security of the whole - i.e., FEW nexus security. We present a framework to examine the dynamic interactions of urbanization, FEW nexus security and extreme hazard risks, with two overarching research questions: Do existing and emerging actions intended to enhance a population's food, water and energy security have the capacity to ensure FEW nexus security in the face of changing climate and urban development conditions? Can we identify a common set of social, ecological and technological conditions across a diversity of urban-regions that support the emergence of innovations that can lead to structural transformations for FEW nexus security?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schiller Consulting, Inc.; Schiller, Steven R.; Goldman, Charles A.
2011-02-04
This report is a scoping study that identifies issues associated with developing a national evaluation, measurement and verification (EM&V) standard for end-use, non-transportation, energy efficiency activities. The objectives of this study are to identify the scope of such a standard and define EM&V requirements and issues that will need to be addressed in a standard. To explore these issues, we provide and discuss: (1) a set of definitions applicable to an EM&V standard; (2) a literature review of existing guidelines, standards, and 'initiatives' relating to EM&V standards as well as a review of 'bottom-up' versus 'top-down' evaluation approaches; (3) amore » summary of EM&V related provisions of two recent federal legislative proposals (Congressman Waxman's and Markey's American Clean Energy and Security Act of 2009 and Senator Bingaman's American Clean Energy Leadership Act of 2009) that include national efficiency resource requirements; (4) an annotated list of issues that that are likely to be central to, and need to be considered when, developing a national EM&V standard; and (5) a discussion of the implications of such issues. There are three primary reasons for developing a national efficiency EM&V standard. First, some policy makers, regulators and practitioners believe that a national standard would streamline EM&V implementation, reduce costs and complexity, and improve comparability of results across jurisdictions; although there are benefits associated with each jurisdiction setting its own EM&V requirements based on their specific portfolio and evaluation budgets and objectives. Secondly, if energy efficiency is determined by the US Environmental Protection Agency to be a Best Available Control Technology (BACT) for avoiding criteria pollutant and/or greenhouse gas emissions, then a standard can be required for documenting the emission reductions resulting from efficiency actions. The third reason for a national EM&V standard is that such a standard is likely to be required as a result of future federal energy legislation that includes end-use energy efficiency, either as a stand-alone energy-efficiency resource standard (EERS) or as part of a clean energy or renewable energy standard. This study is focused primarily on this third reason and thus explores issues associated with a national EM&V standard if energy efficiency is a qualifying resource in federal clean energy legislation. Developing a national EM&V standard is likely to be a lengthy process; this study focuses on the critical first step of identifying the issues that must be addressed in a future standard. Perhaps the most fundamental of these issues is 'how good is good enough?' This has always been the fundamental issue of EM&V for energy efficiency and is a result of the counter-factual nature of efficiency. Counter-factual in that savings are not measured, but estimated to varying degrees of accuracy by comparing energy consumption after a project (program) is implemented with what is assumed to have been the consumption of energy in the absence of the project (program). Therefore, the how good is good enough question is a short version of asking how certain does one have to be of the energy savings estimate that results from EM&V activities and is that level of certainty properly balanced against the amount of effort (resources, time, money) that is utilized to obtain that level of certainty. The implication is that not only should energy efficiency investments be cost-effective, but EM&V investments should consider risk management principles and thus also balance the costs and value of information derived from EM&V (EM&V should also be cost-effective).« less
Selimis, Georgios; Huang, Li; Massé, Fabien; Tsekoura, Ioanna; Ashouei, Maryam; Catthoor, Francky; Huisken, Jos; Stuyt, Jan; Dolmans, Guido; Penders, Julien; De Groot, Harmke
2011-10-01
In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating security functionality to a wireless sensor node increases the size of the stored software program in program memory, the required time that the sensor's microprocessor needs to process the data and the wireless network traffic which is exchanged among sensors. This security overhead has dominant impact on the energy dissipation which is strongly related to the lifetime of the sensor, a critical aspect in wireless sensor network (WSN) technology. Strict definition of the security functionality, complete hardware model (microprocessor and radio), WBAN topology and the structure of the medium access control (MAC) frame are required for an accurate estimation of the energy that security introduces into the WBAN. In this work, we define a lightweight security scheme for WBAN, we estimate the additional energy consumption that the security scheme introduces to WBAN based on commercial available off-the-shelf hardware components (microprocessor and radio), the network topology and the MAC frame. Furthermore, we propose a new microcontroller design in order to reduce the energy consumption of the system. Experimental results and comparisons with other works are given.
Das, Ashok Kumar; Bruhadeshwar, Bezawada
2013-10-01
Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.
Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho
2017-01-01
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572
Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho
2017-03-21
At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.
A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy
Goryczka, Slawomir; Xiong, Li
2016-01-01
This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition protocols using well known security schemes: Shamir’s secret sharing, perturbation-based, and various encryptions. We supplement our study with our new enhanced encryption scheme EFT, which is efficient and fault tolerant. Differential privacy of the final result is achieved by either distributed Laplace or Geometric mechanism (respectively DLPA or DGPA), while approximated differential privacy is achieved by diluted mechanisms. Distributed random noise is generated collectively by all participants, which draw random variables from one of several distributions: Gamma, Gauss, Geometric, or their diluted versions. We introduce a new distributed privacy mechanism with noise drawn from the Laplace distribution, which achieves smaller redundant noise with efficiency. We compare complexity and security characteristics of the protocols with different differential privacy mechanisms and security schemes. More importantly, we implemented all protocols and present an experimental comparison on their performance and scalability in a real distributed environment. Based on the evaluations, we identify our security scheme and Laplace DLPA as the most efficient for secure distributed data aggregation with privacy. PMID:28919841
A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy.
Goryczka, Slawomir; Xiong, Li
2017-01-01
This paper considers the problem of secure data aggregation (mainly summation) in a distributed setting, while ensuring differential privacy of the result. We study secure multiparty addition protocols using well known security schemes: Shamir's secret sharing, perturbation-based, and various encryptions. We supplement our study with our new enhanced encryption scheme EFT, which is efficient and fault tolerant. Differential privacy of the final result is achieved by either distributed Laplace or Geometric mechanism (respectively DLPA or DGPA), while approximated differential privacy is achieved by diluted mechanisms. Distributed random noise is generated collectively by all participants, which draw random variables from one of several distributions: Gamma, Gauss, Geometric, or their diluted versions. We introduce a new distributed privacy mechanism with noise drawn from the Laplace distribution, which achieves smaller redundant noise with efficiency. We compare complexity and security characteristics of the protocols with different differential privacy mechanisms and security schemes. More importantly, we implemented all protocols and present an experimental comparison on their performance and scalability in a real distributed environment. Based on the evaluations, we identify our security scheme and Laplace DLPA as the most efficient for secure distributed data aggregation with privacy.
An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States
NASA Astrophysics Data System (ADS)
Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin
2018-01-01
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.
Powering America’s Economy: Energy Innovation at the Crossroads of National Security Challenges
2010-07-01
the United States? • How can DOD contribute to America’s eco - nomic and national security while addressing its own energy challenges? Our findings and...recommendations follow. Findings Finding 1: America’s energy choices are inextricably linked to national and eco - nomic security. America’s...tegic environment. By taking bold leadership actions now, the nation can turn the growing energy and eco - nomic challenges into great opportunity
An integrated water-energy-food-livelihoods approach for assessing environmental livelihood security
NASA Astrophysics Data System (ADS)
Biggs, E. M.; Duncan, J.; Boruff, B.; Bruce, E.; Neef, A.; McNeill, K.; van Ogtrop, F. F.; Haworth, B.; Duce, S.; Horsley, J.; Pauli, N.; Curnow, J.; Imanari, Y.
2015-12-01
Environmental livelihood security refers to the challenges of maintaining global food security and universal access to freshwater and energy to sustain livelihoods and promote inclusive economic growth, whilst sustaining key environmental systems' functionality, particularly under variable climatic regimes. Environmental security is a concept complementary to sustainable development, and considers the increased vulnerability people have to certain environmental stresses, such as climatic change. Bridging links between the core component concepts of environmental security is integral to future human security, and in an attempt to create this bridge, the nexus approach to human protection has been created, where water resource availability underpins food, water and energy security. The water-energy-food nexus has an influential role in attaining human security, yet little research has made the link between the nexus and livelihoods. In this research we provide a critical appraisal of the synergies between water-energy-food nexus framings and sustainable livelihoods approaches, both of which aim to promote sustainable development. In regions where livelihoods are dependent on environmental conditions, the concept of sustainable development is critical for ensuring future environmental and human security. Given our appraisal we go on to develop an integrated framework for assessing environmental livelihood security of multiscale and multi-level systems. This framework provides a tangible approach for assessing changes in the water-energy-food-livelihood indicators of a system. Examples of where system applications may occur are discussed for the Southeast Asia and Oceania region. Our approach will be particularly useful for policy-makers to inform evidence-based decision-making, especially in localities where climate change increases the vulnerability of impoverished communities and extenuates environmental livelihood insecurity.
Material efficiency: providing material services with less material production
Allwood, Julian M.; Ashby, Michael F.; Gutowski, Timothy G.; Worrell, Ernst
2013-01-01
Material efficiency, as discussed in this Meeting Issue, entails the pursuit of the technical strategies, business models, consumer preferences and policy instruments that would lead to a substantial reduction in the production of high-volume energy-intensive materials required to deliver human well-being. This paper, which introduces a Discussion Meeting Issue on the topic of material efficiency, aims to give an overview of current thinking on the topic, spanning environmental, engineering, economics, sociology and policy issues. The motivations for material efficiency include reducing energy demand, reducing the emissions and other environmental impacts of industry, and increasing national resource security. There are many technical strategies that might bring it about, and these could mainly be implemented today if preferred by customers or producers. However, current economic structures favour the substitution of material for labour, and consumer preferences for material consumption appear to continue even beyond the point at which increased consumption provides any increase in well-being. Therefore, policy will be required to stimulate material efficiency. A theoretically ideal policy measure, such as a carbon price, would internalize the externality of emissions associated with material production, and thus motivate change directly. However, implementation of such a measure has proved elusive, and instead the adjustment of existing government purchasing policies or existing regulations— for instance to do with building design, planning or vehicle standards—is likely to have a more immediate effect. PMID:23359746
Material efficiency: providing material services with less material production.
Allwood, Julian M; Ashby, Michael F; Gutowski, Timothy G; Worrell, Ernst
2013-03-13
Material efficiency, as discussed in this Meeting Issue, entails the pursuit of the technical strategies, business models, consumer preferences and policy instruments that would lead to a substantial reduction in the production of high-volume energy-intensive materials required to deliver human well-being. This paper, which introduces a Discussion Meeting Issue on the topic of material efficiency, aims to give an overview of current thinking on the topic, spanning environmental, engineering, economics, sociology and policy issues. The motivations for material efficiency include reducing energy demand, reducing the emissions and other environmental impacts of industry, and increasing national resource security. There are many technical strategies that might bring it about, and these could mainly be implemented today if preferred by customers or producers. However, current economic structures favour the substitution of material for labour, and consumer preferences for material consumption appear to continue even beyond the point at which increased consumption provides any increase in well-being. Therefore, policy will be required to stimulate material efficiency. A theoretically ideal policy measure, such as a carbon price, would internalize the externality of emissions associated with material production, and thus motivate change directly. However, implementation of such a measure has proved elusive, and instead the adjustment of existing government purchasing policies or existing regulations-- for instance to do with building design, planning or vehicle standards--is likely to have a more immediate effect.
NASA Astrophysics Data System (ADS)
Badea, G.; Felseghi, R. A.; Aşchilean, I.; Rǎboacǎ, S. M.; Şoimoşan, T.
2017-12-01
The concept of sustainable development aims to meet the needs of the present without compromising the needs of future generations. In achieving the desideratum "low-carbon energy system", in the domain of energy production, the use of innovative low-carbon technologies providing maximum efficiency and minimum pollution is required. Such technology is the fuel cell; as these will be developed, it will become a reality to obtain the energy based on hydrogen. Thus, hydrogen produced by electrolysis of water using different forms of renewable resources becomes a secure and sustainable energy alternative. In this context, in the present paper, a comparative study of two different hybrid power generation systems for residential building placed in Cluj-Napoca was made. In these energy systems have been integrated renewable energies (photovoltaic panels and wind turbine), backup and storage system based on hydrogen (fuel cell, electrolyser and hydrogen storage tank), and, respectively, backup and storage system based on traditional technologies (diesel generator and battery). The software iHOGA was used to simulate the operating performance of the two hybrid systems. The aim of this study was to compare energy, environmental and economic performances of these two systems and to define possible future scenarios of competitiveness between traditional and new innovative technologies. After analyzing and comparing the results of simulations, it can be concluded that the fuel cells technology along with hydrogen, integrated in a hybrid system, may be the key to energy production systems with high energy efficiency, making possible an increased capitalization of renewable energy which have a low environmental impact.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Basu, Chandrayee; Ghatikar, Girish
The United States and India have among the largest economies in the world, and they continue to work together to address current and future challenges in reliable electricity supply. The acceleration to efficient, grid-responsive, resilient buildings represents a key energy security objective for federal and state agencies in both countries. The weaknesses in the Indian grid system were manifest in 2012, in the country’s worst blackout, which jeopardized the lives of half of India’s 1.2 billion people. While both countries are investing significantly in power sector reform, India, by virtue of its colossal growth rate in commercial energy intensity andmore » commercial floor space, is better placed than the United States to integrate and test state-of-art Smart Grid technologies in its future grid-responsive commercial buildings. This paper presents a roadmap of technical collaboration between the research organizations, and public-private stakeholders in both countries to accelerate the building-to-grid integration through pilot studies in India.« less
Sleep Deprivation Attack Detection in Wireless Sensor Network
NASA Astrophysics Data System (ADS)
Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata
2012-02-01
Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.
NASA Astrophysics Data System (ADS)
Travesset-Baro, Oriol; Jover, Eric; Rosas-Casals, Marti
2016-04-01
This paper analyses the long-term energy security in a national scale using Long-range Energy Alternatives Planning System (LEAP) modelling tool. It builds the LEAP Andorra model, which forecasts energy demand and supply for the Principality of Andorra by 2050. It has a general bottom-up structure, where energy demand is driven by the technological composition of the sectors of the economy. The technological model is combined with a top-down econometric model to take into account macroeconomic trends. The model presented in this paper provides an initial estimate of energy demand in Andorra segregated into all sectors (residential, transport, secondary, tertiary and public administration) and charts a baseline scenario based on historical trends. Additional scenarios representing different policy strategies are built to explore the country's potential energy savings and the feasibility to achieve the Intended Nationally Determined Contribution (INDC) submitted in April 2015 to UN. In this climatic agreement Andorra intends to reduce net greenhouse gas emissions (GHG) by 37% as compared to a business-as-usual scenario by 2030. In addition, current and future energy security is analysed in this paper under baseline and de-carbonization scenarios. Energy security issues are assessed in LEAP with an integrated vision, going beyond the classic perspective of security of supply, and being closer to the sustainability's integrative vision. Results of scenarios show the benefits of climate policies in terms of national energy security and the difficulties for Andorra to achieving the de-carbonization target by 2030.
Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng
2013-06-01
The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-18
... procedures, physical security plan, guard training and qualification plan, or cyber security plan for the... Power Plant Unit 1, Exemption From Certain Security Requirements 1.0 Background DTE Energy (DTE) is the... atmospheric pressure. In November 1972, the Power Reactor Development Company (PRDC), the licensee at that...
75 FR 36128 - Green Energy Resources, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-24
... Suspension of Trading June 22, 2010. It appears to the Securities and Exchange Commission that there is a... a suspension of trading in the securities of Green Energy. Therefore, it is ordered, pursuant to Section 12(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed...
Secure detection in quantum key distribution by real-time calibration of receiver
NASA Astrophysics Data System (ADS)
Marøy, Øystein; Makarov, Vadim; Skaar, Johannes
2017-12-01
The single-photon detectionefficiency of the detector unit is crucial for the security of common quantum key distribution protocols like Bennett-Brassard 1984 (BB84). A low value for the efficiency indicates a possible eavesdropping attack that exploits the photon receiver’s imperfections. We present a method for estimating the detection efficiency, and calculate the corresponding secure key generation rate. The estimation is done by testing gated detectors using a randomly activated photon source inside the receiver unit. This estimate gives a secure rate for any detector with non-unity single-photon detection efficiency, both inherit or due to blinding. By adding extra optical components to the receiver, we make sure that the key is extracted from photon states for which our estimate is valid. The result is a quantum key distribution scheme that is secure against any attack that exploits detector imperfections.
ERIC Educational Resources Information Center
Abelson, Philip H.
1973-01-01
Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)
76 FR 37343 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-27
... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... arrangement under the Agreement for Cooperation Concerning Civil Uses of Nuclear Energy Between the Government... Peaceful Uses of Nuclear Energy Between the United States of America and the European Atomic Energy...
NASA Astrophysics Data System (ADS)
Sagonas, Kostas; Pafilis, Panayiotis; Valakos, Efstratios D.
2015-10-01
Living on islands entails numerous challenges for animals, among which resource scarcity stands out. In order to survive, animals have to optimize energy acquisition. We examined the impact of insularity on digestion comparing a series of physiological and morphological traits of adult males between insular and mainland populations of the Balkan green lizard. Island lizards had longer gastrointestinal tracts and gut passage times and higher digestive efficiencies. The dissection of the hindgut revealed an unexpected finding, the presence of cecal valves that were more frequent in island lizards. Thanks to all above islanders retain food for longer periods and thus maximize energy income and increase the amount of the extracted nutrients. That way, they secure energy income from the limited, in time and quantity, food resources of the islands.
A smart grid simulation testbed using Matlab/Simulink
NASA Astrophysics Data System (ADS)
Mallapuram, Sriharsha; Moulema, Paul; Yu, Wei
2014-06-01
The smart grid is the integration of computing and communication technologies into a power grid with a goal of enabling real time control, and a reliable, secure, and efficient energy system [1]. With the increased interest of the research community and stakeholders towards the smart grid, a number of solutions and algorithms have been developed and proposed to address issues related to smart grid operations and functions. Those technologies and solutions need to be tested and validated before implementation using software simulators. In this paper, we developed a general smart grid simulation model in the MATLAB/Simulink environment, which integrates renewable energy resources, energy storage technology, load monitoring and control capability. To demonstrate and validate the effectiveness of our simulation model, we created simulation scenarios and performed simulations using a real-world data set provided by the Pecan Street Research Institute.
Proof of cipher text ownership based on convergence encryption
NASA Astrophysics Data System (ADS)
Zhong, Weiwei; Liu, Zhusong
2017-08-01
Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements of cloud storage system files, an efficient information theory security proof of ownership scheme is proposed. This scheme protects the data through the convergence encryption method, and uses the improved block-level proof of ownership scheme, and can carry out block-level client deduplication to achieve efficient and secure cloud storage deduplication scheme.
DOE Office of Scientific and Technical Information (OSTI.GOV)
David Brien
The Forest County Potawatomi Community (FCPC or Tribe) owns a six-story parking facility adjacent to its Potawatomi Bingo Casino (the Casino) in Milwaukee, Wisconsin, as well as a valet parking facility under the Casino (collectively, the Parking Facility). The Parking Facility contained 205-watt metal halide-type lights that, for security reasons, operated 24 hours per day, 7 days per week. Starting on August 30, 2010, the Tribe replaced these fixtures with 1,760 state-of-the-art, energy efficient 55-Watt LED lights. This project resulted in an immediate average reduction in monthly peak demand of 238 kW over the fourth quarter of 2010. The averagemore » reduction in monthly peak demand from October 1 through December 31, 2010 translates into a forecast annual electrical energy reduction of approximately 1,995,000 kWh or 47.3% of the pre-project demand. This project was technically effective, economically feasible, and beneficial to the public not only in terms of long term energy efficiency and associated emissions reductions, but also in the short-term jobs provided for the S.E. Wisconsin region. The project was implemented, from approval by U.S. Department of Energy (DOE) to completion, in less than 6 months. The project utilized off-the-shelf proven technologies that were fabricated locally and installed by local trade contractors.« less
NASA Astrophysics Data System (ADS)
Alif, S. M.; Nugroho, A. P.; Leksono, B. E.
2018-03-01
Energy security has one of its dimensions: Short-term energy security which focuses on the ability of the energy system to react promptly to sudden changes within the supply-demand balance. Non-energy components (such as land parcel) that comprise an energy system are analysed comprehensively with other component to measure energy security related to energy supply. Multipurpose cadastre which is an integrated land information system containing legal, physical, and cultural is used to evaluate energy (electrical energy) security of land parcel. The fundamental component of multipurpose cadastre used to evaluate energy security is attribute data which is the value of land parcel facilities. Other fundamental components (geographic control data, base map data, cadastral data) are used as position information and provide weight in room (part of land parcel) valuation. High value-room means the room is comfortable and/or used productively by its occupant. The method of valuation is by comparing one facility to other facilities. Facilities included in room valuation are relatively static items (such as chair, desk, and cabinet) except lamps and other electronic devices. The room value and number of electronic devices which consume electrical energy are correlated with each other. Consumption of electrical energy of electronic devices in the room with average value remains constant while consumption in other room needs to be evaluated to save the energy. The result of this research shows that room value correlate weakly with number of electronic device in corresponding room. It shows excess energy consumed in low-value room. Although numbers of electronic devices do not always mean the consumption of electrical energy and there are plenty electronic devices, it is recommended for occupant to be careful in utilizing electronic devices in low-value room to minimize energy consumption.
An Entitlement Approach to Address the Water-Energy-Food Nexus in Rural India
NASA Astrophysics Data System (ADS)
Siegfried, T. U.; Fishman, R.; Modi, V.; Lall, U.
2008-12-01
Groundwater mining in India is one of the biggest water related present and future challenges of South Asia. In the agricultural sector, the negative impact from groundwater depletion is complex and affects farmers directly and indirectly in different ways according to their existing dependence on access to groundwater for irrigation. It stems from a) a reduction in buffer capacity of groundwater as a source of backup supply in critical times of drought, b) the deprivation of access to groundwater of those farmers that cannot raise the capital to continuously drill deeper so as to chase the declining groundwater table and c) the constant reduction of per pump well yield due to the declining water tables given more or less constant pumping energy supply. As a result, rural incomes have become less reliable and household as well as national level food security are increasingly compromised. It is feared that the current deterioration of the national food security situation in India might not easily be reversed due to the unsustainable nature of consumptive groundwater use over the past decades. Access to electricity and subsidized power so as to pump groundwater for irrigation have played a critical role in increasing food production thus linking the energy and agricultural sector. The current rural public finance mechanism is highly ineffective, however, and trapped in an inefficient equilibrium. The deficiencies are that low cost and low quality electricity for agriculture likely translate into wasteful groundwater as well as inefficient energy use and thus lead to resource depletion and contribute to an erosion of the rural electricity distribution system. It is estimated that the current commercial losses to the State Electricity Boards (SEBs) amount to about 23 percent of the gross fiscal deficit of the states. The original intent of the rural subsidy program is thus lost and the current system in urgent need of repair. The uncertain future development of energy prices and rainfall patterns due to climate change only enhance these concerns. Given these deficiencies, any corrective strategy should at least target the following long-term policy goals: a) increase the efficiency of rural electricity consumption in terms of grain production and rural income, b) providing the farmers greater flexibility with timely, high quality energy and more efficient means of production, c) enable proper energy accounting on the use side so as to recover costs at sufficient levels for the SEBs and thus enable long-term investments in energy infrastructure and d) secure and eventually increase agricultural production without depleting groundwater resources over the long run. We will present an entitlement approach with which the above issues can be addressed in the future. A case study example from the semi-arid Telangana Region in Andhra Pradesh will be discussed in depth and preliminary results shown.
Energy Security Strategies: An Analysis of Tanzania and Mozambique
2016-06-01
prioritizes domestic consumption or export of energy resources. The strategy a government chooses affects the overall energy security of that country...This thesis seeks to explain why countries pursue energy strategies that focus on domestic consumption of indigenous energy resources instead of...energy strategy that either prioritizes domestic consumption or export of energy resources. The strategy a government chooses affects the overall
Degradation in the efficiency of glass Resistive Plate Chambers operated without external gas supply
NASA Astrophysics Data System (ADS)
Baesso, P.; Cussans, D.; Thomay, C.; Velthuis, J.; Burns, J.; Quillin, S.; Stapleton, M.; Steer, C.
2015-06-01
Resistive plate chambers (RPC) are particle detectors commonly used by the high energy physics community. Their normal operation requires a constant flow of gas mixture to prevent self-poisoning which reduces the chamber's capability to detect particles. We studied how quickly the efficiency of two RPCs drops when operated in sealed mode, i.e. without refreshing the gas mixture. The test aim is to determine how RPCs could be used as particle detectors in non-laboratory applications, such as those exploiting muon tomography for geological imaging or homeland security. The two sealed RPCs were operated in proportional mode for a period of more than three months, and their efficiencies were recorded continuously and analysed in 8-hours intervals. The results show that the efficiency drops on average by 0.79 ± 0.01 % every 24 hours of operation and returns close to the initial value after purging the old gas mixture and flushing the chambers with fresh gas.
A Secure and Efficient Handover Authentication Protocol for Wireless Networks
Wang, Weijia; Hu, Lei
2014-01-01
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471
Secure anonymous mutual authentication for star two-tier wireless body area networks.
Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga
2016-10-01
Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is also low. Our proposed protocol is a lightweight anonymous mutually authentication protocol to mutually authenticate the sensor nodes with the controller node (hub) in a star two-tier WBAN topology. Results show that our protocol proves efficiency over previously proposed protocols and at the same time, achieves the necessary security requirements for a secure anonymous mutual authentication scheme. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Water-Energy-Food Nexus in Asia-Pacific Ring of Fire
NASA Astrophysics Data System (ADS)
Taniguchi, M.; Endo, A.; Gurdak, J. J.; Allen, D. M.; Siringan, F.; Delinom, R.; Shoji, J.; Fujii, M.; Baba, K.
2013-12-01
Climate change and economic development are causing increased pressure on water, energy and food resources, presenting communities with increased levels of tradeoffs and potential conflicts among these resources. Therefore, the water-energy-food nexus is one of the most important and fundamental global environmental issues facing the world. For the purposes of this research project, we define human-environmental security as the joint optimization between human and environmental security as well as the water-energy-food nexus. To optimize the governance and management within these inter-connected needs, it is desirable to increase human-environmental security by improving social managements for the water-energy-food nexus. In this research project, we intend to establish a method to manage and optimize the human-environmental security of the water-energy-food nexus by using integrated models, indices, and maps as well as social and natural investigations with stakeholder analyses. We base our approach on the viewpoint that it is important for a sustainable society to increase human-environmental security with decreasing risk and increasing resilience by optimizing the connections within the critical water-energy and water-food clusters. We will take a regional perspective to address these global environmental problems. The geological and geomorphological conditions in our proposed study area are heavily influenced by the so-called 'Ring of Fire,' around the Pacific Ocean. Within these areas including Japan and Southeast Asia, the hydro-meteorological conditions are dominated by the Asia monsoon. The populations that live under these natural conditions face elevated risk and potential disaster as negative impacts, while also benefitting from positive ecological goods and services. There are therefore tradeoffs and conflicts within the water-energy-food nexus, as well as among various stakeholders in the region. The objective of this project is to maximize human-environmental security (minimize the risk) by choosing management structures and policies that optimize both the water-food-energy nexus in Asia-Pacific coastal regions. We define joint security approach as optimized policy. Optimal policies will develop joint security approaches for human-environmental security in the coastal region of the Ring of Fire, including stakeholders and decision-makers.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hightower, Marion Michael; Baca, Michael J.; VanderMey, Carissa
In June 2016, the Department of Energy's (DOE's) Office of Energy Efficiency and Renewable Energy (EERE) in collaboration with the Renewable Energy Branch for the Hawaii State Energy Office (HSEO), the Hawaii Community Development Authority (HCDA), the United States Navy (Navy), and Sandia National Laboratories (Sandia) established a project to 1) assess the current functionality of the energy infrastructure at the Kalaeloa Community Development District, and 2) evaluate options to use both existing and new distributed and renewable energy generation and storage resources within advanced microgrid frameworks to cost-effectively enhance energy security and reliability for critical stakeholder needs during bothmore » short-term and extended electric power outages. This report discusses the results of a stakeholder workshop and associated site visits conducted by Sandia in October 2016 to identify major Kalaeloa stakeholder and tenant energy issues, concerns, and priorities. The report also documents information on the performance and cost benefits of a range of possible energy system improvement options including traditional electric grid upgrade approaches, advanced microgrid upgrades, and combined grid/microgrid improvements. The costs and benefits of the different improvement options are presented, comparing options to see how well they address the energy system reliability, sustainability, and resiliency priorities identified by the Kalaeloa stakeholders.« less
Sustainable Development and Energy Geotechnology Potential Roles for Geotechnical Engineering
DOE Office of Scientific and Technical Information (OSTI.GOV)
FragaszyProgram Dire, Dr. R. J.; Santamarina, Carlos; Espinoza, N.
2011-01-01
The world is facing unprecedented challenges related to energy resources, global climate change, material use, and waste generation. Failure to address these challenges will inhibit the growth of the developing world and will negatively impact the standard of living and security of future generations in all nations. The solutions to these challenges will require multidisciplinary research across the social and physical sciences and engineering. Although perhaps not always recognized, geotechnical engineering expertise is critical to the solution of many energy and sustainability-related problems. Hence, geotechnical engineers and academicians have opportunity and responsibility to contribute to the solution of these worldwidemore » problems. Research will need to be extended to non-standard issues such as thermal properties of soils; sediment and rock response to extreme conditions and at very long time scales; coupled hydro-chemo-thermo-bio-mechanical processes; positive feedback systems; the development of discontinuities; biological modification of soil properties; spatial variability; and emergent phenomena. Clearly, the challenges facing geotechnical engineering in the future will require a much broader knowledge base than our traditional educational programs provide. The geotechnical engineering curricula, from undergraduate education through continuing professional education, must address the changing needs of a profession that will increasingly be engaged in alternative/renewable energy production; energy efficiency; sustainable design, enhanced and more efficient use of natural resources, waste management, and underground utilization.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Energy Production, Inc., Best Energy Services, Inc., Community Central Bank Corporation, Explortex Energy, Inc., HemoBioTech, Inc., Larrea... securities of HemoBioTech, Inc. because it has not filed any periodic reports since the period ended December...
Science and Technology Review April/May 2011
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nikolic, R J
2011-03-03
At Lawrence Livermore National Laboratory, the focus is on science and technology research to ensure the nation's security. That expertise is also applied to solve other important national problems in energy, bioscience, and the environment. Science & Technology Review is published eight time a year to communicate, to a broad audience, the Laboratory's scientific and technological accomplishments in fulfilling its primary missions. The publication's goal is to help readers understand these accomplishments and appreciate their value to the individual citizen, the nation, and the world. In this issue for April/May 2011, the features are 'Dealing with the Nonlinear Battlefield' andmore » 'From Video to Knowledge.' Research highlights are 'Kinetic Models Predict Biofuel Efficiency,' Going Deep with MEGa-Rays' and 'Energy on Demand.'« less
Enabling fast charging - Introduction and overview
NASA Astrophysics Data System (ADS)
Michelbacher, Christopher; Ahmed, Shabbir; Bloom, Ira; Burnham, Andrew; Carlson, Barney; Dias, Fernando; Dufek, Eric J.; Jansen, Andrew N.; Keyser, Matthew; Markel, Anthony; Meintz, Andrew; Mohanpurkar, Manish; Pesaran, Ahmad; Scoffield, Don; Shirk, Matthew; Stephens, Thomas; Tanim, Tanvir; Vijayagopal, Ram; Zhang, Jiucai
2017-11-01
The pursuit of U.S. energy security and independence has taken many different forms throughout the many production and consumption sectors. For consumer transportation, a greater reliance on power train electrification has gained traction due to the inherent efficiencies of these platforms, particularly through the use of electric motors and batteries. Vehicle electrification can be generalized into three primary categories-hybrid electric vehicles (HEVs), plug-in hybrid electric vehicles (PHEVs), and battery electric vehicles (BEVs); the latter two, PHEVs and BEVs, are often referred to as plug-in electric vehicles (PEVs).
Climent, Salvador; Sanchez, Antonio; Capella, Juan Vicente; Meratnia, Nirvana; Serrano, Juan Jose
2014-01-06
This survey aims to provide a comprehensive overview of the current research on underwater wireless sensor networks, focusing on the lower layers of the communication stack, and envisions future trends and challenges. It analyzes the current state-of-the-art on the physical, medium access control and routing layers. It summarizes their security threads and surveys the currently proposed studies. Current envisioned niches for further advances in underwater networks research range from efficient, low-power algorithms and modulations to intelligent, energy-aware routing and medium access control protocols.
NASA Technical Reports Server (NTRS)
Frederick, Martin
2006-01-01
This presentation highlights the NASA Applied Sciences Program. The goal of the program is to extend the results of scientific research and knowledge beyond the science community to contribute to NASA's partners' applications of national priority, such as agricultural efficiency, energy management and Homeland Security. Another purpose of the program's scientific research is to increase knowledge of the Earth-Sun system to enable improved predictions of climate, weather, and natural hazards. The program primarily optimizes benefits for citizens by contributing to partnering on applications that are used by state, local and tribal governments.
Hybrid Particle-Continuum Methods for Nonequilibrium Gas and Plasma Flows
2010-07-01
numerical efficiency using such hybrid approaches. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 . NUMBER OF...2.9x1017 Temperature 750 K 1 eV 1 eV 6 eV Velocity 280 m/s 18 km/s 25 km/s -6 km/s An example of use of the hybrid method to analyze a Hall thruster...energy relaxation, chemistry – gas-surface interactions { u’, v’, w’ x, y, z m, erot , evib 7 Hypersonic Vehicles: Ma > 5 Ballistic Missiles
2013-10-07
Interaction Modes Using an Airborne Doppler Wind Lidar: Analyses of the HRDL data taken using DYNAMO 5a. CONTRACT NUMBER N0001411C0464 5b. GRANT...efficiency of energy, mass and momentum exchange at the bottom and top of the ABL. 15. SUBJECT TERMS DYNAMO , ABL 16. SECURITY CLASSIFICATION OF: 17...Investigation of the Air-Wave-Sea Interaction Modes Using an Airborne Doppler Wind Lidar: Analyses of the HRDL data taken during DYNAMO George
Das, Ashok Kumar; Goswami, Adrijit
2014-06-01
Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.
Sandia National Laboratories: National Security Programs
policy. Topics About Nuclear Weapons Safety & Security Science & Technology Defense Systems & science and technology to help defend and protect the United States. Topics About Defense Systems & . Topics Stationary Power Earth Science Transportation Energy Energy Research Global Security Birc We
10 CFR 1015.210 - Liquidation of collateral.
Code of Federal Regulations, 2010 CFR
2010-01-01
... States. Collection from other sources, including liquidation of security or collateral, is not a... Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) COLLECTION OF CLAIMS OWED THE UNITED STATES Standards... liquidate security or collateral through the exercise of a power of sale in the security instrument or a...
ERIC Educational Resources Information Center
Edwards, Gregory
2011-01-01
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo
2017-12-03
The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.
Communication and computing technology in biocontainment laboratories using the NEIDL as a model.
McCall, John; Hardcastle, Kath
2014-07-01
The National Emerging Infectious Diseases Laboratories (NEIDL), Boston University, is a globally unique biocontainment research facility housing biosafety level 2 (BSL-2), BSL-3, and BSL-4 laboratories. Located in the BioSquare area at the University's Medical Campus, it is part of a national network of secure facilities constructed to study infectious diseases of major public health concern. The NEIDL allows for basic, translational, and clinical phases of research to be carried out in a single facility with the overall goal of accelerating understanding, treatment, and prevention of infectious diseases. The NEIDL will also act as a center of excellence providing training and education in all aspects of biocontainment research. Within every detail of NEIDL operations is a primary emphasis on safety and security. The ultramodern NEIDL has required a new approach to communications technology solutions in order to ensure safety and security and meet the needs of investigators working in this complex building. This article discusses the implementation of secure wireless networks and private cloud computing to promote operational efficiency, biosecurity, and biosafety with additional energy-saving advantages. The utilization of a dedicated data center, virtualized servers, virtualized desktop integration, multichannel secure wireless networks, and a NEIDL-dedicated Voice over Internet Protocol (VoIP) network are all discussed. © 2014 Federation of European Microbiological Societies. Published by John Wiley & Sons Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Radousky, H B
This months issue has the following articles: (1) Innovative Solutions Reap Rewards--Commentary by George H. Miller; (2) Surveillance on the Fly--An airborne surveillance system can track up to 8,000 moving objects in an area the size of a small city; (3) A Detector Radioactive Particles Can't Evade--An ultrahigh-resolution spectrometer can detect the minute thermal energy deposited by a single gamma ray or neutron; (4) Babel Speeds Communication among Programming Languages--The Babel program allows software applications in different programming languages to communicate quickly; (5) A Gem of a Software Tool--The data-mining software Sapphire allows scientists to analyze enormous data sets generatedmore » by diverse applications; (6) Interferometer Improves the Search for Planets--With externally dispersed interferometry, astronomers can use an inexpensive, compact instrument to search for distant planets; (7) Efficiently Changing the Color of Laser Light--Yttrium-calcium-oxyborate crystals provide an efficient, compact approach to wavelength conversion for high-average-power lasers; (8) Pocket-Sized Test Detects Trace Explosives--A detection kit sensitive to more than 30 explosives provides an inexpensive, easy-to-use tool for security forces everywhere; (9) Tailor-Made Microdevices Serve Big Needs--The Center for Micro- and Nanotechnology develops tiny devices for national security.« less
Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin
2015-01-01
Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300
Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin
2015-09-03
Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.
3 CFR - Blue Ribbon Commission on America's Nuclear Future
Code of Federal Regulations, 2011 CFR
2011-01-01
... America's Nuclear Future Memorandum for the Secretary of Energy Expanding our Nation's capacity to generate clean nuclear energy is crucial to our ability to combat climate change, enhance energy security... safe, secure, and responsible use of nuclear energy. These efforts are critical to accomplishing many...
An enhanced mobile-healthcare emergency system based on extended chaotic maps.
Lee, Cheng-Chi; Hsu, Che-Wei; Lai, Yan-Ming; Vasilakos, Athanasios
2013-10-01
Mobile Healthcare (m-Healthcare) systems, namely smartphone applications of pervasive computing that utilize wireless body sensor networks (BSNs), have recently been proposed to provide smartphone users with health monitoring services and received great attentions. An m-Healthcare system with flaws, however, may leak out the smartphone user's personal information and cause security, privacy preservation, or user anonymity problems. In 2012, Lu et al. proposed a secure and privacy-preserving opportunistic computing (SPOC) framework for mobile-Healthcare emergency. The brilliant SPOC framework can opportunistically gather resources on the smartphone such as computing power and energy to process the computing-intensive personal health information (PHI) in case of an m-Healthcare emergency with minimal privacy disclosure. To balance between the hazard of PHI privacy disclosure and the necessity of PHI processing and transmission in m-Healthcare emergency, in their SPOC framework, Lu et al. introduced an efficient user-centric privacy access control system which they built on the basis of an attribute-based access control mechanism and a new privacy-preserving scalar product computation (PPSPC) technique. However, we found out that Lu et al.'s protocol still has some secure flaws such as user anonymity and mutual authentication. To fix those problems and further enhance the computation efficiency of Lu et al.'s protocol, in this article, the authors will present an improved mobile-Healthcare emergency system based on extended chaotic maps. The new system is capable of not only providing flawless user anonymity and mutual authentication but also reducing the computation cost.
Evaluation of the Efficiency of Liquid Cooling Garments using a Thermal Manikin
2005-05-01
temperatures. The software also calculates thermal resistances and evaporative resistances. TM tests were run dry (i.e. no sweating ) and wet (i.e...REPORT DOCUMENTATION PAGE Form ApprovedOMB No . 0704-0188 SECURITY CLASSIFICATION OF REPORT SECURITY CLASSIFICATION OF THIS PAGE SECURITY CLASSIFICATION...OF ABSTRACT 8. M05-17 1. AGENCY USE ONLY (Leave blank) 4. TITLE AND SUBTITLE EVALUATION OF THE EFFICIENCY OF LIQUID COOLING GARMENTS USING A THERMAL
Energy Security is National Security
2011-03-11
made to resur~ect Cantrell in early 2000 with some success. A newer technique using nitrogen injection was used on the mammoth field. For four years...related to economic survival. Addiction to fossil f-uels enslaves foreign policy, ensures trade deficits and destroys the · enviro ~ent. Energy security
10 CFR 39.31 - Labels, security, and transportation precautions.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...
10 CFR 39.31 - Labels, security, and transportation precautions.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...
10 CFR 39.31 - Labels, security, and transportation precautions.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Labels, security, and transportation precautions. 39.31 Section 39.31 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL... explosion or fire. (2) The licensee shall lock and physically secure the transport package containing...
NASA Astrophysics Data System (ADS)
Ren, Xiaoqiang; Yan, Jiaqi; Mo, Yilin
2018-03-01
This paper studies binary hypothesis testing based on measurements from a set of sensors, a subset of which can be compromised by an attacker. The measurements from a compromised sensor can be manipulated arbitrarily by the adversary. The asymptotic exponential rate, with which the probability of error goes to zero, is adopted to indicate the detection performance of a detector. In practice, we expect the attack on sensors to be sporadic, and therefore the system may operate with all the sensors being benign for extended period of time. This motivates us to consider the trade-off between the detection performance of a detector, i.e., the probability of error, when the attacker is absent (defined as efficiency) and the worst-case detection performance when the attacker is present (defined as security). We first provide the fundamental limits of this trade-off, and then propose a detection strategy that achieves these limits. We then consider a special case, where there is no trade-off between security and efficiency. In other words, our detection strategy can achieve the maximal efficiency and the maximal security simultaneously. Two extensions of the secure hypothesis testing problem are also studied and fundamental limits and achievability results are provided: 1) a subset of sensors, namely "secure" sensors, are assumed to be equipped with better security countermeasures and hence are guaranteed to be benign, 2) detection performance with unknown number of compromised sensors. Numerical examples are given to illustrate the main results.
FY2015 Annual Report for Alternative Fuels DISI Engine Research.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sjöberg, Carl-Magnus G.
2016-01-01
Climate change and the need to secure energy supplies are two reasons for a growing interest in engine efficiency and alternative fuels. This project contributes to the science-base needed by industry to develop highly efficient DISI engines that also beneficially exploit the different properties of alternative fuels. Our emphasis is on lean operation, which can provide higher efficiencies than traditional non-dilute stoichiometric operation. Since lean operation can lead to issues with ignition stability, slow flame propagation and low combustion efficiency, we focus on techniques that can overcome these challenges. Specifically, fuel stratification is used to ensure ignition and completeness ofmore » combustion but has soot- and NOx- emissions challenges. For ultralean well-mixed operation, turbulent deflagration can be combined with controlled end-gas auto-ignition to render mixed-mode combustion that facilitates high combustion efficiency. However, the response of both combustion and exhaust emissions to these techniques depends on the fuel properties. Therefore, to achieve optimal fuel-economy gains, the engine combustion-control strategies must be adapted to the fuel being utilized.« less
Strategic Energy Management Plan for the Santa Ynez Band of Chumash Indians
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davenport, Lars; Smythe, Louisa; Sarquilla, Lindsey
2015-03-27
This plan outlines the Santa Ynez Band of Chumash Indians’ comprehensive energy management strategy including an assessment of current practices, a commitment to improving energy performance and reducing overall energy use, and recommended actions to achieve these goals. Vision Statement The primary objective of the Strategic Energy Management Plan is to implement energy efficiency, energy security, conservation, education, and renewable energy projects that align with the economic goals and cultural values of the community to improve the health and welfare of the tribe. The intended outcomes of implementing the energy plan include job creation, capacity building, and reduced energy costsmore » for tribal community members, and tribal operations. By encouraging energy independence and local power production the plan will promote self-sufficiency. Mission & Objectives The Strategic Energy Plan will provide information and suggestions to guide tribal decision-making and provide a foundation for effective management of energy resources within the Santa Ynez Band of Chumash Indians (SYBCI) community. The objectives of developing this plan include; Assess current energy demand and costs of all tribal enterprises, offices, and facilities; Provide a baseline assessment of the SYBCI’s energy resources so that future progress can be clearly and consistently measured, and current usage better understood; Project future energy demand; Establish a system for centralized, ongoing tracking and analysis of tribal energy data that is applicable across sectors, facilities, and activities; Develop a unifying vision that is consistent with the tribe’s long-term cultural, social, environmental, and economic goals; Identify and evaluate the potential of opportunities for development of long-term, cost effective energy sources, such as renewable energy, energy efficiency and conservation, and other feasible supply- and demand-side options; and Build the SYBCI’s capacity for understanding, managing, and developing energy resources by identifying training, distribution of information materials, and community meeting needs and opportunities« less
DOT National Transportation Integrated Search
2006-08-01
The overall purpose of this research project is to conduct a feasibility study and development of a general methodology to determine the impacts on multi-modal and system efficiency of alternative freight security measures. The methodology to be exam...
Energy Transmission and Infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mathison, Jane
2012-12-31
The objective of Energy Transmission and Infrastructure Northern Ohio (OH) was to lay the conceptual and analytical foundation for an energy economy in northern Ohio that will: • improve the efficiency with which energy is used in the residential, commercial, industrial, agricultural, and transportation sectors for Oberlin, Ohio as a district-wide model for Congressional District OH-09; • identify the potential to deploy wind and solar technologies and the most effective configuration for the regional energy system (i.e., the ratio of distributed or centralized power generation); • analyze the potential within the district to utilize farm wastes to produce biofuels; •more » enhance long-term energy security by identifying ways to deploy local resources and building Ohio-based enterprises; • identify the policy, regulatory, and financial barriers impeding development of a new energy system; and • improve energy infrastructure within Congressional District OH-09. This objective of laying the foundation for a renewable energy system in Ohio was achieved through four primary areas of activity: 1. district-wide energy infrastructure assessments and alternative-energy transmission studies; 2. energy infrastructure improvement projects undertaken by American Municipal Power (AMP) affiliates in the northern Ohio communities of Elmore, Oak Harbor, and Wellington; 3. Oberlin, OH-area energy assessment initiatives; and 4. a district-wide conference held in September 2011 to disseminate year-one findings. The grant supported 17 research studies by leading energy, policy, and financial specialists, including studies on: current energy use in the district and the Oberlin area; regional potential for energy generation from renewable sources such as solar power, wind, and farm-waste; energy and transportation strategies for transitioning the City of Oberlin entirely to renewable resources and considering pedestrians, bicyclists, and public transportation as well as drivers in developing transportation policies; energy audits and efficiency studies for Oberlin-area businesses and Oberlin College; identification of barriers to residential energy efficiency and development of programming to remove these barriers; mapping of the solar-photovoltaic and wind-energy supply chains in northwest Ohio; and opportunities for vehicle sharing and collaboration among the ten organizations in Lorain County from the private, government, non-profit, and educational sectors. With non-grant funds, organizations have begun or completed projects that drew on the findings of the studies, including: creation of a residential energy-efficiency program for the Oberlin community; installation of energy-efficient lighting in Oberlin College facilities; and development by the City of Oberlin and Oberlin College of a 2.27 megawatt solar photovoltaic facility that is expected to produce 3,000 megawatt-hours of renewable energy annually, 12% of the College’s yearly power needs. Implementation of these and other projects is evidence of the economic feasibility and technical effectiveness of grant-supported studies, and additional projects are expected to advance to implementation in the coming years. The public has benefited through improved energydelivery systems and reduced energy use for street lighting in Elmore, Oak Harbor, and Wellington; new opportunities for assistance and incentives for residential energy efficiency in the Oberlin community; new opportunities for financial and energy savings through vehicle collaboration within Lorain County; and decreased reliance on fossil fuels and expanded production of renewable energy in the region. The dissemination conference and the summary report developed for the conference also benefited the public, but making the findings and recommendations of the regional studies broadly available to elected officials, city managers, educators, representatives of the private sector, and the general public.« less
NASA Astrophysics Data System (ADS)
Tarroja, B.; Aghakouchak, A.; Samuelsen, S.
2015-12-01
The onset of drought conditions in regions such as California due to shortfalls in precipitation has brought refreshed attention to the vulnerability of our water supply paradigm to changes in climate patterns. In the face of a changing climate which can exacerbate drought conditions in already dry areas, building resiliency into our water supply infrastructure requires some decoupling of water supply availability from climate behavior through conservation, efficiency, and alternative water supply measures such as desalination and water reuse. The installation of these measures requires varying degrees of direct energy inputs and/or impacts the energy usage of the water supply infrastructure (conveyance, treatment, distribution, wastewater treatment). These impacts have implications for greenhouse gas emissions from direct fuel usage or impacts on the emissions from the electric grid. At the scale that these measures may need to be deployed to secure water supply availability, especially under climate change impacted hydrology, they can potentially pose obstacles for meeting greenhouse gas emissions reduction and renewable utilization goals. Therefore, the portfolio of these measures must be such that detrimental impacts on greenhouse gas emissions are minimized. This study combines climate data with a water reservoir network model and an electric grid dispatch model for the water-energy system of California to evaluate 1) the different pathways and scale of alternative water resource measures needed to secure water supply availability and 2) the impacts of following these pathways on the ability to meet greenhouse gas and renewable utilization goals. It was discovered that depending on the water supply measure portfolio implemented, impacts on greenhouse gas emissions and renewable utilization can either be beneficial or detrimental, and optimizing the portfolio is more important under climate change conditions due to the scale of measures required.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Greatmat Technology Corp., Kentucky USA Energy, Inc., Solar Energy Ltd., and Visiphor Corp., Order of Suspension of Trading May 23, 2013. It appears... concerning the securities of Solar Energy Ltd. because it has not filed any periodic reports since the period...
76 FR 30326 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... United States of America and the Government of Japan Concerning Peaceful Uses of Nuclear Energy. DATES... Energy. Anne M. Harrington, Deputy Administrator, Defense Nuclear Nonproliferation. [FR Doc. 2011-12919...
Bulaqi, Haddad Arabi; Mousavi Mashhadi, Mahmoud; Geramipanah, Farideh; Safari, Hamed; Paknejad, Mojgan
2015-05-01
To prevent screw loosening, a clear understanding of the factors influencing secure preload is necessary. The purpose of this study was to investigate the effect of coefficient of friction and tightening speed on screw tightening based on energy distribution method with exact geometric modeling and finite element analysis. To simulate the proper boundary conditions of the screw tightening process, the supporting bone of an implant was considered. The exact geometry of the implant complex, including the Straumann dental implant, direct crown attachment, and abutment screw were modeled with Solidworks software. Abutment screw/implant and implant/bone interfaces were designed as spiral thread helixes. The screw-tightening process was simulated with Abaqus software, and to achieve the target torque, an angular displacement was applied to the abutment screw head at different coefficients of friction and tightening speeds. The values of torque, preload, energy distribution, elastic energy, and efficiency were obtained at the target torque of 35 Ncm. Additionally, the torque distribution ratio and preload simulated values were compared to theoretically predicted values. Upon reducing the coefficient of friction and enhancing the tightening speed, the angle of turn increased at the target torque. As the angle of turn increased, the elastic energy and preload also increased. Additionally, by increasing the coefficient of friction, the frictional dissipation energy increased but the efficiency decreased, whereas the increase in tightening speed insignificantly affected efficiency. The results of this study indicate that the coefficient of friction is the most influential factor on efficiency. Increasing the tightening speed lowered the response rate to the frictional resistance, thus diminishing the coefficient of friction and slightly increasing the preload. Increasing the tightening speed has the same result as reducing the coefficient of friction. Copyright © 2015 Editorial Council for the Journal of Prosthetic Dentistry. Published by Elsevier Inc. All rights reserved.
An environmental assessment of food supply chains: a case study on dessert apples.
Jones, Andy
2002-10-01
The contemporary food system provides consumers with convenience, extensive choice, and the year-round availability of fresh produce. In this paper these achievements are recognized within the context of the associated environmental impacts. While many analyses have considered the energy and material efficiency of various options for food production and packaging, very few studies have investigated the environmental impacts of the transport components of food supply chains. This is surprising, given that the global sourcing of food produce, centralized distribution systems, and shopping by car have become prevalent in recent decades and have contributed to an increase in the distance between producer and consumer or "food miles." In a case study the transport energy consumption is calculated for all possible ways in which dessert apples can be supplied to the UK consumer. The aim is to assess the environmental performance of the predominant fresh produce supply chains and to investigate claims that localized systems are more environmentally efficient. The main criteria used to compare the environmental efficiency in alternative food supply chains are the transport-related fossil-fuel energy consumption and associated carbon dioxide emissions. Analysis of the empirical data shows that transportation is now responsible for a considerable fraction of the total energy consumption in the life cycle of fresh apples, and in most cases exceeds the energy consumed in commercial apple cultivation. By developing local production and marketing systems for fresh products, transport demand can be reduced and many of the environmental impacts associated with existing supply chains can be avoided. The results of the study are then discussed in relation to the wider issues of transport policy, international trade, food security, and product-related environmental information for consumers.
Fraga, Eric S; Ng, Melvin
2015-01-01
Recent developments in catalysts have enhanced the potential for the utilisation of carbon dioxide as a chemical feedstock. Using the appropriate energy efficient catalyst enables a range of chemical pathways leading to desirable products. In doing so, CO2 provides an economically and environmentally beneficial source of C1 feedstock, while improving the issues relating to security of supply that are associated with fossil-based feedstocks. However, the dependence on catalysts brings other supply chains into consideration, supply chains that may also have security of supply issues. The choice of chemical pathways for specific products will therefore entail an assessment not only of economic factors but also the security of supply issues for the catalysts. This is a multi-criteria decision making problem. In this paper, we present a modified 4A framework based on the framework suggested by the Asian Pacific Energy Research centre for macro-economic applications. The 4A methodology is named after the criteria used to compare alternatives: availability, acceptability, applicability and affordability. We have adapted this framework for the consideration of alternative chemical reaction processes using a micro-economic outlook. Data from a number of sources were collected and used to quantify each of the 4A criteria. A graphical representation of the assessments is used to support the decision maker in comparing alternatives. The framework not only allows for the comparison of processes but also highlights current limitations in the CCU processes. The framework presented can be used by a variety of stakeholders, including regulators, investors, and process industries, with the aim of identifying promising routes within a broader multi-criteria decision making process.
10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 1 2013-01-01 2013-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...
10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 10 Energy 1 2014-01-01 2014-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...
10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 1 2012-01-01 2012-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...
10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 1 2011-01-01 2011-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...
10 CFR 26.129 - Assuring specimen security, chain of custody, and preservation.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 1 2010-01-01 2010-01-01 false Assuring specimen security, chain of custody, and preservation. 26.129 Section 26.129 Energy NUCLEAR REGULATORY COMMISSION FITNESS FOR DUTY PROGRAMS Licensee Testing Facilities § 26.129 Assuring specimen security, chain of custody, and preservation. (a) Each...
Code of Federal Regulations, 2010 CFR
2010-01-01
... significance (Category III), and for protection of Restricted Data, National Security Information, Safeguards... 10 Energy 2 2010-01-01 2010-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED...
20 CFR 416.701 - Scope of subpart.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... Security Administration, to achieve efficient administration of the Supplemental Security Income (SSI... events to us. It is important for us to know about these events because they may affect your continued...
Cyber Security Audit and Attack Detection Toolkit
DOE Office of Scientific and Technical Information (OSTI.GOV)
Peterson, Dale
2012-05-31
This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.
Strategic Response to Energy-Related Security Threats in the US Department of Defense
2014-10-15
generation in the United States are fossil fuels . These include coal, natural gas, and oil . In some cases solar, wind, geothermal, and hydroelectric...and findings. The research addressed engagement on climate change and energy security issues by DoD across various tiers and sectors of the...on climate change and energy security issues by DoD across various tiers and sectors of the organization. Specifically, a tripartite analysis
CONSOL`s perspective on CCT deployment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burke, F.P.; Statnick, R.M.
1997-12-31
The principal focus of government investment in Clean Coal Technology must be to serve the interests of the US energy consumer. Because of its security of supply and low cost, coal will continue to be the fuel of choice in the existing domestic electricity generating market. The ability of coal to compete for new generating capacity will depend largely on natural gas prices and the efficiency of coal and gas-fired generating options. Furthermore, potential environmental regulations, coupled with utility deregulation, create a climate of economic uncertainty that may limit future investment decisions favorable to coal. Therefore, the federal government, throughmore » programs such as CCT, should promote the development of greenfield and retrofit coal use technology that improves generating efficiency and meets environmental requirements for the domestic electric market.« less
Modular multiplication in GF(p) for public-key cryptography
NASA Astrophysics Data System (ADS)
Olszyna, Jakub
Modular multiplication forms the basis of modular exponentiation which is the core operation of the RSA cryptosystem. It is also present in many other cryptographic algorithms including those based on ECC and HECC. Hence, an efficient implementation of PKC relies on efficient implementation of modular multiplication. The paper presents a survey of most common algorithms for modular multiplication along with hardware architectures especially suitable for cryptographic applications in energy constrained environments. The motivation for studying low-power and areaefficient modular multiplication algorithms comes from enabling public-key security for ultra-low power devices that can perform under constrained environments like wireless sensor networks. Serial architectures for GF(p) are analyzed and presented. Finally proposed architectures are verified and compared according to the amount of power dissipated throughout the operation.
A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage
2014-01-01
With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. PMID:24959630