Technology Layer

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 146544 Experts worldwide ranked by ideXlab platform

Taha Selim Ustun - One of the best experts on this subject based on the ideXlab platform.

  • a survey on behind the meter energy management systems in smart grid
    Renewable & Sustainable Energy Reviews, 2017
    Co-Authors: Islam Safak Bayram, Taha Selim Ustun
    Abstract:

    Abstract Over the last few years, the fast-growing energy needs across the world have intensified a central challenge: how to reduce the generation and operation costs in power systems and, in parallel, to minimize the hydrocarbon emissions. Moreover, one-quarter of world's population still lacks access to electricity, as the cost of building conventional power grids is not affordable by third world countries. On the other hand, behind-the-meter (BTM) energy systems offer cost-effective solutions to aforementioned challenges, as they enable end-users to satisfy their energy needs with distributed energy generation and storage technologies. To that end, this paper presents a detailed survey of BTM energy management systems. The paper starts with the classification of the electrical loads with respect to their physical properties, priority ranking, and sizes. Next, the literature on BTM energy management systems is systematically classified into three main categories: Technology Layer, economic Layer, and social Layer. The Technology Layer spans the studies related to power systems including distributed generation and storage technologies, whereas the economic Layer shows how economic incentives along with optimization and scheduling techniques are employed to shape the energy consumption. The social Layer, on the other hand, presents the recent studies on how to employ social sciences to reduce the energy consumption without requiring any technological upgrades. This paper also provides an overview of the enabling technologies and standards for communication, sensing, and monitoring purposes. In the final part, a case study is provided to illustrate an implementation of the system.

Islam Safak Bayram - One of the best experts on this subject based on the ideXlab platform.

  • demand side management for peak reduction and pv integration in qatar
    International Conference on Networking Sensing and Control, 2017
    Co-Authors: Islam Safak Bayram, Muammer Koc
    Abstract:

    The electricity demand in Qatar has grown more than twofold within merely a decade. Highly subsidized electricity tariffs combined with decreased government revenues has urged local authorities to reduce the energy consumption, improve the energy efficiency, and deploy environmentally friendly renewable energy alternatives. In this study, we present the role of demand-side management (DSM) techniques for energy savings and photovoltaic (PV) renewable energy integration. DSM techniques are classified into technological, economical, and social Layers. The Technology Layer has been supported by the government while incentive/pricing based economic Layer options are yet to be deployed. To pave the way for such studies, we present evidence from Bahrain's, a neighboring country with similar climate, government and social structures, new pricing policy to show the customer responsiveness on electricity prices. Moreover, we present a case study on how to use direct load control framework during summer months in Qatar. In the last section, we present the output of Qatar's first large-scale PV deployment in Education City. The results show that due to local weather conditions, large-scale PV adoption can easily affect the grid operations and a more responsive load is required to mitigate the potential impacts.

  • a survey on behind the meter energy management systems in smart grid
    Renewable & Sustainable Energy Reviews, 2017
    Co-Authors: Islam Safak Bayram, Taha Selim Ustun
    Abstract:

    Abstract Over the last few years, the fast-growing energy needs across the world have intensified a central challenge: how to reduce the generation and operation costs in power systems and, in parallel, to minimize the hydrocarbon emissions. Moreover, one-quarter of world's population still lacks access to electricity, as the cost of building conventional power grids is not affordable by third world countries. On the other hand, behind-the-meter (BTM) energy systems offer cost-effective solutions to aforementioned challenges, as they enable end-users to satisfy their energy needs with distributed energy generation and storage technologies. To that end, this paper presents a detailed survey of BTM energy management systems. The paper starts with the classification of the electrical loads with respect to their physical properties, priority ranking, and sizes. Next, the literature on BTM energy management systems is systematically classified into three main categories: Technology Layer, economic Layer, and social Layer. The Technology Layer spans the studies related to power systems including distributed generation and storage technologies, whereas the economic Layer shows how economic incentives along with optimization and scheduling techniques are employed to shape the energy consumption. The social Layer, on the other hand, presents the recent studies on how to employ social sciences to reduce the energy consumption without requiring any technological upgrades. This paper also provides an overview of the enabling technologies and standards for communication, sensing, and monitoring purposes. In the final part, a case study is provided to illustrate an implementation of the system.

Peihe Zhang - One of the best experts on this subject based on the ideXlab platform.

  • Application of CBM horizontal well development Technology in the roof strata close to broken-soft coal seams
    KeAi, 2019
    Co-Authors: Yushuang Zhu, Peihe Zhang
    Abstract:

    Broken coal structure and low permeability are the main reasons for the difficult production of coalbed methane (CBM) in broken-soft coal seams. In this paper, No.8 coal seam in the Luling Mine of the Huaibei Coal Field was taken as an example to study the way to improve CBM production of broken-soft coal reservoirs. First, drilling, fracturing and production of horizontal wells were considered comprehensively. Then, based on the idea of exploiting CBM through horizontal wells in roof strata close to the broken-soft coal seams, the propagation laws of fractures created by Layer-penetrating fracturing of horizontal wells in roof strata were studied, and accordingly the location of horizontal well was optimized. Finally, the CBM horizontal well exploitation Technology for the roof strata close to coal seams was developed and tested on site. And the following research results were obtained. First, the vertical fractures created during Layer-penetrating fracturing of horizontal wells in roof strata can propagate from the roof strata with high stress values downward to the coal seam with low stress values. In addition, the location of horizontal well has an important influence on the effect of Layer-penetrating fracturing. The closer the horizontal well is to the coal seam, the better the fracture propagation effect of Layer-penetrating fracturing. Second, the horizontal well should be arranged in the roof strata 1.5 m away from the top of coal seam, so that fracturing stimulation requirements of horizontal wells in roof strata can be satisfied to the uttermost. Third, three key technologies are formed, including the “high-quality, fast and safe” drilling Technology, the deep-penetration oriented perforating Technology and the “large displacement, large scale, high pad ratio and moderate proppant concentration” active water fracturing Technology. Fourth, the gas production with this Technology in engineering practice is remarkable. In conclusion, the CBM development Technology of horizontal wells in roof strata close to broken-soft coal seams is feasible. The research results provide a new technical method for the development of CBM in broken-soft coal seams. Keywords: Broken-soft coal seams, Coalbed methane (CBM), Roof strata, Horizontal well, Development Technology, Layer-penetrating fracturing, Propagation laws of fractures, Physical simulation, Well location arrangemen

Steinke Michael - One of the best experts on this subject based on the ideXlab platform.

  • Information Security Risk Management in Higher Education Institutions: From Processes to Operationalization
    EUNIS, 2015
    Co-Authors: Hommel Wolfgang, Metzger Stefan, Steinke Michael
    Abstract:

    Information security has successfully gained high levels of management attention in European higher education institutions (HEIs) over the past decade, but is the data stored in HEI data centers, IT departments, or faculty server rooms really more secure as a consequence? In this article, we first review how information security policies and risk management processes were typically introduced in HEIs as an important first step, but then argue that many HEIs still need to complement these “people and processes” steps with efforts to make efficient use of them on the “TechnologyLayer. HEI servers that can be accessed from the public Internet have a long history of being lucrative targets for attacks by all kinds of miscreants because, e.g., the network bandwidth available at many HEIs can be misused for sending Spam emails or participating in high–volume denial–of–service attacks. More targeted attacks are performed, e.g., to spy on intellectual property related to research projects and HEI collaborations with industry partners. And in times of doxing, i.e., the black–hat hacker sport of making an organization’s internal documents and emails public, as in the 2014 Sony case, the demand for protecting certain data even against more determined attackers become obvious. Until about 10 years ago, most system administrators and service operators were sufficiently familiar with the information security implications of the hardware and software in their area of responsibility. But meanwhile, services such as private cloud hosting environments, groupware collaboration tools, and web–based learning management systems have grown to a complexity that practically cannot be mastered by individuals anymore. More often that not, complex software services are operated in production use without scrutiny regarding their security settings or thorough consideration of additional security measures that should be placed upstream. To cope with this increase in complexity in a structured manner, security management processes, e.g., based on the international ISO/IEC 27001 standard, have been introduced, along with the assignment of responsibilities to roles such as HEI Chief Information Security Officers (CISOs), the preparation of policies, e.g., regarding data classification and secure disposal of media, and check lists for handling security incidents and data breaches efficiently. According to the textbooks and for very valid practical reasons, risk management drives each of these activities. However, information security risk management is a process that requires a lot of information as input, and even more expertise. It can therefore quickly turn into a useless placebo paper tiger when it is not applied properly in practice. But when given only a high–level process description, many system administrators and service managers do not know how to do risk management in a meaningful way, i.e., with reasonable efforts and immediate benefits from the results. We therefore present our strategy for operationalizing information security risk management in a HEI data center with a focus on both HEI–internal IT services as well as HEI cooperation, e.g., in research projects, with the long–term goal of compiling the feedback we receive into a HEI best practice guide on information security risk management

Mariangela Rosano - One of the best experts on this subject based on the ideXlab platform.

  • Blockchain in Logistics and Supply Chain: A Lean Approach for Designing Real-World Use Cases
    IEEE Access, 2018
    Co-Authors: Guido Perboli, Stefano Musso, Mariangela Rosano
    Abstract:

    The Blockchain Technology can be defined as a distributed ledger database for recording transactions between parties verifiably and permanently. Blockchain emerged as a leading Technology Layer for financial applications. Nevertheless, in the past years, the attention of researchers and practitioners moved to the application of the Blockchain technologies to other domains. Recently, it represents the backbone of a new digital supply chain. Thanks to its capability of ensuring data immutability and public accessibility of data streams, Blockchain can increase the efficiency, reliability, and transparency of the overall supply chain, and optimize the inbound processes. The literature concerning Blockchain in non-financial applications mainly focused on the technological part and the Business Process Modeling, lacking in terms of standard methodology for designing a strategy to develop and validate the overall Blockchain solution and integrate it in the Business Strategy. Thus, this paper aims to overcome this lack. First, we integrate the current literature filling the lack concerning the digital strategy, creating a standard methodology to design Blockchain Technology use cases, which are not related to finance applications. Second, we present the results of a use case in the fresh food delivery, showing the critical aspects of implementing a Blockchain solution. Moreover, the paper discusses how the Blockchain will help in reducing the logistics costs and in optimizing the operations and the research challenges. OAPA