Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Smart Home Energy Management: An Analysis Of A Novel Dynamic Pricing And Demand Response Aware Control Algorithm For Households With Distributed Renewable Energy Generation And Storage, Jamal Abushnaf Jan 2017

Smart Home Energy Management: An Analysis Of A Novel Dynamic Pricing And Demand Response Aware Control Algorithm For Households With Distributed Renewable Energy Generation And Storage, Jamal Abushnaf

Theses: Doctorates and Masters

Home energy management systems (HEMS) technology can provide a smart and efficient way of optimising energy usage in residential buildings. One of the main goals of the Smart Grid is to achieve Demand Response (DR) by increasing end users’ participation in decision making and increasing the level of awareness that will lead them to manage their energy consumption in an efficient way. This research presents an intelligent HEMS algorithm that manages and controls a range of household appliances with different demand response (DR) limits in an automated way without requiring consumer intervention. In addition, a novel Multiple Users and Load …


Proactive Biometric-Enabled Forensic Imprinting, Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven M. Furnell Jan 2016

Proactive Biometric-Enabled Forensic Imprinting, Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven M. Furnell

Research outputs 2014 to 2021

Threats to enterprises have become widespread in the last decade. A major source of such threats originates from insiders who have legitimate access to the organization's internal systems and databases. Therefore, preventing or responding to such incidents has become a challenging task. Digital forensics has grown into a de-facto standard in the examination of electronic evidence; however, a key barrier is often being able to associate an individual to the stolen data. Stolen credentials and the Trojan defense are two commonly cited arguments used. This paper proposes a model that can more inextricably links the use of information (e.g. images, …


Energy Security: An Australian Nuclear Power Industry, Geoff I. Swan Jan 2009

Energy Security: An Australian Nuclear Power Industry, Geoff I. Swan

Australian Security and Intelligence Conference

Climate change and energy security are driving a worldwide renaissance in nuclear power. An Australian nuclear power industry has also been seriously investigated by the Australian government and its agencies. This paper provides a broad overview of the nuclear fuel cycle and the nuclear power industry. It identifies aspects that are sensitive to nuclear terrorism and nuclear weapons proliferation to help security professionals identify threats and prepare for a possible Australian nuclear power industry.