|
|
Books > Computing & IT
Electric power systems have become much more complex in the past
years, due to the integration of distributed generation including
renewable energy sources and the challenges caused by intermittency
of renewables. This complexity makes power systems potentially more
vulnerable. However, use of computer-based protection methods
(i.e., digital protection relays) supported by communication
technology have helped in protecting electrical networks from
faults to which they are subjected to. This second edition of the
book covers a comprehensive introduction to the protection of
electrical power systems using digital protective relays. The new
edition offers a thorough revision and update, and comprehensive
additional material. Chapters treat the mathematical background of
protection algorithms including, sinusoidal-wave-based algorithms,
Walsh function and S-Transform-based techniques, least squares and
differential equation-based techniques, travelling wave-based
protection, protection of transformers, digital line differential
protection, a comparison between digital protection algorithms, and
importantly, protection of networks with distributed generation
including renewable energy resources. The book is written for
researchers in electrical engineering and power engineering, in
industry, utilities and universities, and for advanced students.
The treatment is logically structured, covering mathematics and
principles for the development and implementation of the major
algorithms underlying different protection techniques. These
techniques can be applied to protection of generator transformers,
lines, switchgear and cable circuits: the main components of
transmission and distribution systems with and without integrated
distributed energy sources including renewables.
The unique compendium re-assesses the value of future and emergent
computing technologies via artistic and philosophical means. The
book encourages scientists to adopt inspiring thinking of artists
and philosophers to reuse scientific concepts in their works.The
useful reference text consists of non-typical topics, where
artistic and philosophical concepts encourage readers to adopt
unconventional approaches towards computing and immerse themselves
into discoveries of future emerging landscape.
Researchers have harnessed the flood of personal information and
opinions shared on social media platforms in a variety of ways.
People communicate not only what they imagine they are purposely
sharing but also unintentionally leak information, which allows
others to glimpse a sense of the subconscious and unconscious at a
macro level. Electronic Hive Minds on Social Media: Emerging
Research and Opportunities explores various research techniques to
profile the electronic hive mind around social topics as expressed
on various modalities of social media, from human, bot, and cyborg
social media accounts, and proposes new research methods for
harnessing public data from social media platforms. Highlighting
topics such as knowledge sharing, swarm intelligence, and social
psychology, this publication is designed for researchers, social
psychologists, practitioners, and students in marketing,
communications, mass media, and similar fields.
Including the latest Microsoft 365 features and enhanced support
for Mac users, Cengage's Illustrated Series (R) Collection,
Microsoft (R) Office 365 (R) & PowerPoint (R) 2021
Comprehensive, 2nd edition, helps you quickly master the nuances of
Microsoft (R) Office. Its concise, student-friendly approach uses a
proven two-page layout that allows you to work through an entire
task without turning the page. Each module begins with a brief
overview of the principles covered while large, full-color screen
images illustrate what you see on your computer. Module Learning
Objectives are mapped to Microsoft Office Specialist (MOS)
certification objectives, and module scenarios are based on Burning
Glass market insights data -- helping you sharpen the critical
skills you need for real-world success. In addition, MindTap and
SAM (Skills Assessment Manager) online resources help maximize your
study time -- and results.
Human computer interaction is constantly evolving in many areas and
facets of modern society. Analyzing these interactions can provide
a more balanced understanding of these technological advances as
they pertain to people's lives. Experience-Based Human-Computer
Interactions: Emerging Research and Opportunities is a pivotal
reference source that provides in-depth discussions on the
progression and contemporary applications of human computer
interaction. Highlighting relevant topic areas such as semantic
support, software intensive systems, ontology applications, and
conceptual objects, this publication is ideal for engineers,
academicians, students, and researchers that would like to attain
more information on recent advances being made to bridge the gap
between human and computer interactions.
Coding for Penetration Testers: Building Better Tools, Second
Edition provides readers with an understanding of the scripting
languages that are commonly used when developing tools for
penetration testing, also guiding users through specific examples
of custom tool development and the situations where such tools
might be used. While developing a better understanding of each
language, the book presents real-world scenarios and tool
development that can be incorporated into a tester's toolkit. This
completely updated edition focuses on an expanded discussion on the
use of Powershell, and includes practical updates to all tools and
coverage.
Cyber-Physical Systems: Foundations, Principles and Applications
explores the core system science perspective needed to design and
build complex cyber-physical systems. Using Systems Science's
underlying theories, such as probability theory, decision theory,
game theory, organizational sociology, behavioral economics, and
cognitive psychology, the book addresses foundational issues
central across CPS applications, including System Design -- How to
design CPS to be safe, secure, and resilient in rapidly evolving
environments, System Verification -- How to develop effective
metrics and methods to verify and certify large and complex CPS,
Real-time Control and Adaptation -- How to achieve real-time
dynamic control and behavior adaptation in a diverse environments,
such as clouds and in network-challenged spaces, Manufacturing --
How to harness communication, computation, and control for
developing new products, reducing product concepts to realizable
designs, and producing integrated software-hardware systems at a
pace far exceeding today's timeline. The book is part of the
Intelligent Data-Centric Systems: Sensor-Collected Intelligence
series edited by Fatos Xhafa, Technical University of Catalonia.
Indexing: The books of this series are submitted to EI-Compendex
and SCOPUS
Trusted Platform Modules (TPMs) are small, inexpensive chips which
provide a limited set of security functions. They are most commonly
found as a motherboard component on laptops and desktops aimed at
the corporate or government markets, but can also be found on many
consumer-grade machines and servers, or purchased as independent
components. Their role is to serve as a Root of Trust - a highly
trusted component from which we can bootstrap trust in other parts
of a system. TPMs are most useful for three kinds of tasks:
remotely identifying a machine, or machine authentication;
providing hardware protection of secrets, or data protection; and
providing verifiable evidence about a machine's state, or
attestation. This book describes the primary uses for TPMs, and
practical considerations such as when TPMs can and should be used,
when they shouldn't be, what advantages they provide, and how to
actually make use of them, with use cases and worked examples of
how to implement these use cases on a real system. Topics covered
include when to use a TPM; TPM concepts and functionality;
programming introduction; provisioning: getting the TPM ready to
use; first steps: TPM keys; machine authentication; data
protection; attestation; other TPM features; software and
specifications; and troubleshooting. Appendices contain basic
cryptographic concepts; command equivalence and requirements
charts; and complete code samples.
The second volume will deal with a presentation of the main matrix
and tensor decompositions and their properties of uniqueness, as
well as very useful tensor networks for the analysis of massive
data. Parametric estimation algorithms will be presented for the
identification of the main tensor decompositions. After a brief
historical review of the compressed sampling methods, an overview
of the main methods of retrieving matrices and tensors with missing
data will be performed under the low rank hypothesis. Illustrative
examples will be provided.
The comprehensive compendium furnishes a quick and efficient entry
point to many multiresolution techniques and facilitates the
transition from an idea into a real project. It focuses on methods
combining several soft computing techniques (fuzzy logic, neural
networks, genetic algorithms) in a multiresolution
framework.Illustrated with numerous vivid examples, this useful
volume gives the reader the necessary theoretical background to
decide which methods suit his/her needs.New materials and
applications for multiresolution analysis are added, including
notable research topics such as deep learning, graphs, and network
analysis.
Knowledge is a valuable resource that must be managed well for any
organization to thrive. Proper knowledge management can improve
business processes by creating value, yet the available tools meant
to aid in the creation, collection, and storage of information have
drastically changed since the emergence of social media. By using
this collaborative online application for engaging with
information, organizations are able to precisely decimate knowledge
to the correct audience. Harnessing Social Media as a Knowledge
Management Tool addresses the challenges and rewards of the proper
use of social media, as well as the key enablers and barriers of
its application. This publication endeavors to provide thorough
insight into the role of social media in knowledge management from
both an organizational and individual perspective. This book
elucidates emerging strategies perfect for policy makers, managers,
advertisers, academics, students, and organizations who wish to
optimize performance.
Would You Like to Learn the SQL Programming Language In A Day? What
is SQL? How can it benefit you? What will it take for you to learn
this language? When you purchase SQL Programming: Programing
Language for Beginners - Learn in a Day!, you can quickly learn the
basics of this essential skill! These fun and easy tips transform
the dreaded chore of learning a new programming language into a fun
hobby. You'll be proud to show off your new abilities to your
friends, coworkers, and family! How do you get started with SQL?
What will you learn? SQL Programming: Programing Language for
Beginners - Learn in a Day! helps you understand: Table Basics The
SELECT Statement Using Clauses Combining Conditions and Boolean
Operators The Importance of Table Joins Lots more! Purchase SQL
Programming: Programing Language for Beginners - Learn in a Day!
now, and change your computer programming life forever!
Modern society has become dependent on technology, allowing
personal information to be input and used across a variety of
personal and professional systems. From banking to medical records
to e-commerce, sensitive data has never before been at such a high
risk of misuse. As such, organizations now have a greater
responsibility than ever to ensure that their stakeholder data is
secured, leading to the increased need for cybersecurity
specialists and the development of more secure software and
systems. To avoid issues such as hacking and create a safer online
space, cybersecurity education is vital and not only for those
seeking to make a career out of cybersecurity, but also for the
general public who must become more aware of the information they
are sharing and how they are using it. It is crucial people learn
about cybersecurity in a comprehensive and accessible way in order
to use the skills to better protect all data. The Research
Anthology on Advancements in Cybersecurity Education discusses
innovative concepts, theories, and developments for not only
teaching cybersecurity, but also for driving awareness of efforts
that can be achieved to further secure sensitive data. Providing
information on a range of topics from cybersecurity education
requirements, cyberspace security talents training systems, and
insider threats, it is ideal for educators, IT developers,
education professionals, education administrators, researchers,
security analysts, systems engineers, software security engineers,
security professionals, policymakers, and students.
Annual Reports in Computational Chemistry provides timely and
critical reviews of important topics in computational chemistry as
applied to all chemical disciplines. Topics covered include quantum
chemistry, molecular mechanics, force fields, chemical education,
and applications in academic and industrial settings. Focusing on
the most recent literature and advances in the field, each article
covers a specific topic of importance to computational chemists.
|
|