recommended reading

China Pursues the Holy Grail of Ocean Energy, in a Massive Way

Beneda Miroslav/

China is the latest country to take on the decades-old challenge of generating electricity from the world’s oceans. Beijing has invested an estimated $160 million in tidal and wave energy projects since 2010, the Wall Street Journal reported, embarking on joint ventures with Lockheed Martin, Israel’s Eco Wave Power, the Netherlands’ Arcadis, and Singapore’s Atlantis Resources to build varied projects along the country’s 11,000 mile coastline.

Harnessing the power of tides and waves and transforming it into kilowatt hours or stored electricity has been the life-long holy grail for a small and dedicated group of investors, engineers, and entrepreneurs, many in the US and Europe—so far with limited success.

Their quest has been to create a machine that’s tough enough to withstand the constant pressure of surging water, yet sensitive enough to harness that power for electricity, all while being unobtrusive enough not to disturb marine life, commercial fishing, or recreational water sports. The result—some unwieldy-looking mechanical beasts, like the “SeaGen” installed off the coast of Ireland, one of the few commercial scale marine energy plants:


China’s ocean energy plans are ambitious, and more disruptive.They include massive T-shaped underwater “dynamic tidal walls” 30 kilometers long along the coast, particularly in the Yellow Sea between North Korea, South Korea, and China, which the Journal says could generate as much energy as two nuclear power plants and cost $30 billion. They’re not unobtrusive—an early research paper on these walls notes they rely on “actively interfering in specific regional dynamic tidal systems.” China is working with Dutch companies like Arcadis who have previously developed tidal walls to keep water out of the Netherlands sea-level settlements. Here’s how it works:

Ambitious plans for ocean energy plants have rarely run smoothly—China installed dozens of tidal plants in the 1960s and 1970s, most of which are defunct now. More recently, the “Pelamis wave energy machine,” named after a species of sea snake, dates back to 1998, though the first prototype didn’t appear until 2004. Three Pelamis machines were deployed off of Portugal in September of 2008, but the project was iced two months later, because of mechanical problems and after the project’s owner, investment bank Babcock & Brown, went into liquidation.

Now the Pelamis is testing a “second generation” machine for energy giant E.ON off the coast of Scotland.

A tidal project in Eastport, Maine, which has advocates dating back to US president Franklin D. Roosevelt, finally became a reality in August 2012, when a turbine “eggbeater turned sideways” was lowered into the water.


While surging water loosened bolts and caused other mechanical problems and delays, the turbine did generate enough energy to power 25 homes and an additional turbine will be added this year.

Despite the delays and setbacks, the money keeps flowing in to ocean energy research, and not just from China. Private investment in European ocean and wave technology energy ventures was about $825 million over the past seven years, the Wall Street Journal reported. In August of last year, the US Department of Energysaid it would invest about $16 million in projects on US coasts and waterways.

(Image via Beneda Miroslav/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.