scholarly journals October Is Energy Awareness Month: How Did You Celebrate? [Happenings]

2021 ◽  
Vol 8 (3) ◽  
pp. 18-21
Author(s):  
Brian Zahnstecher
Keyword(s):  
1970 ◽  
Vol 13 (2) ◽  
Author(s):  
Muhamad Iqbal

Tulisan ini menjelaskan konsep khalifah fil’ardi sebagai wakil Tuhan dalam melestarikan alam. Penelitian ini bertujuan untuk menanamkan kesadaran energi yang berasal dari sumber daya alam. Jenis penelitian ini adalah penelitian kepustakaan (Library Research) dan penelitian ini merupakan penelitian deskriptif kualitatif. Berdasarkan analisis dan data yang penulis teliti, penulis menyimpulkan bahwa pengetahuan yang komprehensif tentang kesadaran energi menjadi dasar mengenai khalifah fil’ardi. Mewujudkan kesadaran energi di tengah masyarakat menjadi konsep termutakhir dari “khalifah fil ‘ardi” This paper describes the concept of khalifah fil’ardi as representatives of God in conserving nature. This study aims to instill awareness of energy derived from natural resources. This type of research is the research library (Library Research) and this research is a qualitative descriptive study. Based on the analysis and the data that I researched, the author concludes that a comprehensive knowledge about energy awareness is the basis of the khalifah fil’ardi. Realizing energy awareness in society becomes the latest concept of khalifah fil’ardi.


2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Martin Pullinger ◽  
Jonathan Kilgour ◽  
Nigel Goddard ◽  
Niklas Berliner ◽  
Lynda Webb ◽  
...  

AbstractThe IDEAL household energy dataset described here comprises electricity, gas and contextual data from 255 UK homes over a 23-month period ending in June 2018, with a mean participation duration of 286 days. Sensors gathered 1-second electricity data, pulse-level gas data, 12-second temperature, humidity and light data for each room, and 12-second temperature data from boiler pipes for central heating and hot water. 39 homes also included plug-level monitoring of selected electrical appliances, real-power measurement of mains electricity and key sub-circuits, and more detailed temperature monitoring of gas- and heat-using equipment, including radiators and taps. Survey data included occupant demographics, values, attitudes and self-reported energy awareness, household income, energy tariffs, and building, room and appliance characteristics. Linked secondary data comprises weather and level of urbanisation. The data is provided in comma-separated format with a custom-built API to facilitate usage, and has been cleaned and documented. The data has a wide range of applications, including investigating energy demand patterns and drivers, modelling building performance, and undertaking Non-Intrusive Load Monitoring research.


Author(s):  
Yidan Zhang ◽  
Arnaud Prouzeau ◽  
Hourieh Khalajzadeh ◽  
Sarah Goodwin
Keyword(s):  

Electronics ◽  
2021 ◽  
Vol 10 (14) ◽  
pp. 1635
Author(s):  
Neeraj Chugh ◽  
Geetam Singh Tomar ◽  
Robin Singh Bhadoria ◽  
Neetesh Saxena

To sustain the security services in a Mobile Ad Hoc Networks (MANET), applications in terms of confidentially, authentication, integrity, authorization, key management, and abnormal behavior detection/anomaly detection are significant. The implementation of a sophisticated security mechanism requires a large number of network resources that degrade network performance. In addition, routing protocols designed for MANETs should be energy efficient in order to maximize network performance. In line with this view, this work proposes a new hybrid method called the data-driven zone-based routing protocol (DD-ZRP) for resource-constrained MANETs that incorporate anomaly detection schemes for security and energy awareness using Network Simulator 3. Most of the existing schemes use constant threshold values, which leads to false positive issues in the network. DD-ZRP uses a dynamic threshold to detect anomalies in MANETs. The simulation results show an improved detection ratio and performance for DD-ZRP over existing schemes; the method is substantially better than the prevailing protocols with respect to anomaly detection for security enhancement, energy efficiency, and optimization of available resources.


2009 ◽  
Vol 2 (4) ◽  
pp. 284-297 ◽  
Author(s):  
Mohamed G. Hassan ◽  
R. Hirst ◽  
C. Siemieniuch ◽  
A.F. Zobaa

2014 ◽  
Vol 62 (3) ◽  
pp. 307-318 ◽  
Author(s):  
Tamara Shapiro Ledley ◽  
Anne U. Gold ◽  
Frank Niepold ◽  
Mark McCaffrey

Sign in / Sign up

Export Citation Format

Share Document