![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Energy technology & engineering > Electrical engineering > General
Contents - Preface - 1 Historical survey - 2 The thunderstorm - 2.1. Global distribution of thunderstorms - 2.2. The thundercloud - 2.3. Point-discharge currents - 3. The lightning discharge - 3.1. Temporal development of flash to ground - 3.2. Strokes to tall structures - 3.3. Lightning currents and related parameters - 3.4. Frequency of lightning discharges - 4. The lightning conductor - 4.1. Mechanism of strike - 4.2. Striking distance - 4.3. Protective zone - 4.4. Radio-active lightning conductors - 4.5. Frequency of strikes to a structure - 5 Principles of protection - 5.1 Need for protection - 5.2. Design considerations - 5.3. Thermal considerations - 5.4. Mechanical considerations - 5.5. Electrical considerations - 6. Materials and dimensions - 6.1. Conductors for use above ground - 6.2. Conductors for use below ground - 6.3. Corrosion - Lightning Protection - 7. Protective systems for domestic, industrial and public structures - 7.1. Air-termination network - 7.2. Down conductors - 7.3. Earth-termination network - 7.4. Earth electrodes - 7.5. Joints - 7.6. Metal components on and in buildings - 7.7. Sound and television aerials - 7.8. Electricity supply and telephone installations - 7.9. Structures with flammable roofs and farm buildings - 8. Protection of tall structures - 8.1. High-rise buildings - 8.2. Chimneys and cooling towers - 8.3. Churches and monuments - 8.4. Telecommunication structures - 9 Protection of danger structures - 9.1. General considerations - 9.2. Structures above ground - 9.3. Structures below ground - 9.4. Mining and blasting - 9.5. Aircraft - 9.6. Warning devices - 10. Protection of miscellaneous structures - 10.1. Temporary structures - 10.2. Mobile structures - 10.3. Agricultural objects - 10.4. Structures on rock - 10.5. Playing fields and public highways - 10.6. Trees - 10.7. Ships and boats - 11. Maintenance - 11.1. General considerations - 11.2. Test methods - 11.3. Inspection and records - 12. Protection of persons and animals - 12.1. Effects of lightning currents - 12.2. Protection in the open - 12.3. Protection indoors - 12.4. Lightning casualties and resuscitation - 13. Postscript - Appendix - National Codes considered in text - References - Author Index - Subject Index - Contents -
This book looks at how digital economy can help energy businesses to meet their sustainability goals. It will further generates a new debate among policymakers about encouraging green technologies to reduce global carbon emissions. Our modern society requires a long-term, sustainable, and secure energy supply that not only generates and preserves renewable energy. It is also creating universal intelligent machines for power systems, and vital infrastructure is considered in terms of digital economy requirements. The idea of sharing information is an essential principle of sustainable thinking. In such instances, open internet and data access are required to enable any human being to acquire knowledge. Furthermore, the energy industry is changing worldwide, necessitating the consideration of potential implications and modifications. Thus, its most distinguishing feature is moving from a centrally organized system to one with many market players. Consequently, information and communication technologies and human growth have significant main and interactive effects on environmental sustainability. Simultaneously, energy industry is a major player in resolving the digital economy’s development issues.
This book brings together leading researchers and developers in the field of wireless sensor networks to explain the special problems and challenges of the algorithmic aspects of sensor and ad-hoc networks. The book also fosters communication not only between the different sensor and ad-hoc communities, but also between those communities and the distributed systems and information systems communities. The topics addressed pertain to the sensors and mobile environment.
Written as a companion to the highly acclaimed Transformer and Inductor Design Handbook, Second Edition (Marcel Dekker, Inc.), this timely new edition of Magnetic Core Selection for Transformers and Inductors compiles the specifications of over 12,000 industrially available cores and brings them in line with standard units of measurements-simplifying the selection of core configurations for the design of magnetic components.
The first successful finished Smart Grid Prototype Projects deliver new requirements and best practices to meet them. These solutions will be the base for the upcoming norms and standards in the near future. This domain is not only part of one Standard developing Organization (SDO), but also of many different organizations like ITU, ISO, IEC and additionally for the electro mobility part the SAE. This results in many standards which are based on different aspects. Furthermore the European mirror organizations (ETSI, CEN, CENELEC) as well as the German mirror groups of these groups are involved, which are delivering further rules and adaption for the local market. Because of this diversity of organizations involved, it is difficult for the local companies (which includes energy utility, manufacturer and software producer specialized on integration) to identify the relevant trends, standardization groups and technologies necessary. With the EU Mandate M490 to CEN/CNELEC and TESI and the Commission being a driving force (e.g. ftp: //ftp.cencenelec.eu/CENELEC/Smartgrid/SmartGridFinalReport.pdf and http: //www.cenelec.eu/aboutcenelec/whatwedo/technologysectors/smartgrids.html) standardization becomes more and more important but it s complex and not easy to be understood. Here at OFFIS, we provide training but we are always asked for textbooks on our tranings. Based on our modules for the SG tranings, we would estimate the following chapters to be relevant to SG stakeholders in standardization (roughly 16-20 pages per chapter)."
This book outlines the fundamental physics of radiowave interaction in the earth's atmosphere at microwave and millimetre wavelengths and describes the latest techniques for predicting the performance of radio systems operating in these bands.
It is with great pleasure that I present this fourth vol ume in the series "Advanced Applications in Pattern Recognition." It would be difficult to find two authors better versed in the design and application of parallel image processing systems, due to both their own many years of pioneering in the field and their encyclopedic knowledge of what is going on in uni versity and industrial laboratories around the world. The monograph is unique in its parallel presentation of orthogonal and hexagonal dissections, and the wealth of graphic illustration of algorithmic procedures for processing and analyz ing images in the various known implementations of parallel im age-processing architectures. This volume should find a place on the bookshelf of every practitioner of pattern recognition, image processing, and compu ter graphics. Morton Nadler General Editor vii PREFACE This book endeavors to introduce the reader to the subject of cellular logic and cellular automata and is devoted particu larly to those parts dealing with the manipulation of pictorial data. The study of cellular automata owes much to the pioneer ing work of John von Neumann during the 1950s. Von Neumann was interested in general problems in the behavior of computing structures and was immensely impressed by the complexity and performance of the human brain, which he felt must point to wards successful designs for automatic computing machines."
The task of the system architect is to take the correct early decisions despite the uncertainties. Power-Aware Architecting provides a systematic way to support the system architect in this job. Therefore, an iterative system-level design approach is defined where iterations are based on fast and accurate estimations or predictions of area, performance and energy consumption. This method is illustrated with a concrete real life example of multi-carrier communication. This book is the result of a Ph.D. thesis, which is part of the UbiCom project at Delft University of Technology. I strongly recommend it to any engineer, expert or specialist, who is interested in designing embedded systems-on-a-chip. Jef van Meerbergen
Error detecting codes are very popular for error control in practical systems for two reasons. First, such codes can be used to provide any desired reliability of communication over any noisy channel. Second, implementation is usually much simpler than for a system using error correcting codes. To consider a particular code for use in such a system, it is very important to be able to calculate or estimate the probability of undetected error. For the binary symmetric channel, the probability of undetected error can be expressed in terms of the weight distribution of the code. The first part of the book gives a detailed description of all known methods to calculate or estimate the probability of undetected error, for the binary symmetric channel in particular, but a number of other channel models are also considered. The second part of the book describes a number of protocols for feedback communication systems (ARQ systems), with methods for optimal choice of error detecting codes for the protocols. Results have been collected from many sources and given a unified presentation. The results are presented in a form which make them accessible to the telecommunication system designer as well as the coding theory researcher and student. The system designer may find the presentation of CRC codes as well as the system performance analysis techniques particularly useful. The coding theorist will find a detailed account of a part of coding theory which is usually just mentioned in most text books and which contains a number of interesting and useful results as well as many challenging open problems. Audience: Essential for students, practitioners and researchers working in communications and coding theory. An excellent text for an advanced course on the subject.
- Written by world-leading subject specialist in both sport management and artificial intelligence - Includes interviews with elite sports managers and coaches - Examines the competitive advantages offered by AI to a wide-range of areas including Recruitment, Performance & Tactics, Health & Fitness, Pedagogy, Broadcasting, eSports, Gambling, and Stadium Design
Healthcare has become an extremely important and relevant topic in day to day discussions ever since the COVID-19 pandemic has been encountered by the global population. This has led to a renewed focus and attention that researchers from every discipline have put in to realize better strategies for healthcare management in general. This book is an attempt to put to use recent advancements in the field of the Internet of Medical Things often called IoMT, which is an extension of IoT for real-time, data analytics-driven prompt and quality healthcare to global citizens. Security has been always a challenge with pervasive technologies like IoMT and IoT, and thus usage of disruptive technology like blockchain to offset the security concerns that surround the data and network management. Therefore, this book is an honest attempt to provide directions to applied areas of research in IoMT for healthcare with the aid and help of Blockchain Technologies.
Coding Approaches to Fault Tolerance in Combinational and Dynamic Systems describes coding approaches for designing fault-tolerant systems, i.e., systems that exhibit structured redundancy that enables them to distinguish between correct and incorrect results or between valid and invalid states. Since redundancy is expensive and counter-intuitive to the traditional notion of system design, the book focuses on resource-efficient methodologies that avoid excessive use of redundancy by exploiting the algorithmic/dynamic structure of a particular combinational or dynamic system. The first part of Coding Approaches to Fault Tolerance in Combinational and Dynamic Systems focuses on fault-tolerant combinational systems providing a review of von Neumann's classical work on Probabilistic Logics (including some more recent work on noisy gates) and describing the use of arithmetic coding and algorithm-based fault-tolerant schemes in algebraic settings. The second part of the book focuses on fault tolerance in dynamic systems. Coding Approaches to Fault Tolerance in Combinational and Dynamic Systems also discusses how, in a dynamic system setting, one can relax the traditional assumption that the error-correcting mechanism is fault-free by using distributed error correcting mechanisms. The final chapter presents a methodology for fault diagnosis in discrete event systems that are described by Petri net models; coding techniques are used to quickly detect and identify failures. From the Foreword "Hadjicostis has significantly expanded the setting to processes occurring in more general algebraic and dynamic systems... The book responds to the growing need to handle faults in complex digital chips and complex networked systems, and to consider the effects of faults at the design stage rather than afterwards." George Verghese, Massachusetts Institute of Technology Coding Approaches to Fault Tolerance in Combinational and Dynamic Systems will be of interest to both researchers and practitioners in the area of fault tolerance, systems design and control.
Modern power systems have undergone tremendous progress due to the implementation of new technologies. With these advancements, the standards for insulation materials must be enhanced and revitalized. Accelerating the Discovery of New Dielectric Properties in Polymer Insulation is a pivotal source of academic research on emerging trends in the properties, applications, and developments of polymer dielectrics. Highlighting a range of relevant perspectives on topics such as high thermal conductivity, power storage, and wind energy, this book is ideally designed for students, professionals, academics, and practitioners interested in the optimization of power system infrastructures.
This book provides an in-depth introduction to all major control and stability issues related to microgrids. It is the first book to offer a comprehensive look into the methodologies and philosophies behind system modeling, coordinated control, and protection for developing reliable, robust, and efficient operation of modular uninterruptible power supply systems. For each topic, a theoretical introduction and overview are backed by concrete programming examples that enable the reader to thoroughly understand the topic and develop and conduct simulation models.
'Microprocessor Technology' provides a complete introduction to the subject of microprocessor technology using the Z80 and 6502 processors. An emphasis on fault-finding and repair makes this an ideal text for servicing courses including City & Guilds 2240 in the UK, microelectronics units on BTEC National/Advanced GNVQ and City & Guilds 7261 Microprocessor Technology. It will also provide a refresher course for those on 'bridging' and micro appreciation courses where a measure of comparative studies is required. Clear and concise explanations are supported by worked examples, tutorials, long answer questions and assignments giving students the opportunity to test their knowledge as they progress through the course as well as providing an essential revision tool in the run-up to exams.
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the cipher text. Despite this advantage, there are only a few real-world implementations of perfect secrecy due to some well-known limitations. Any simple, straightforward modeling can pave the way for further advancements in the implementation, especially in environments with time and resource constraints such as IoT. This book takes one step towards this goal via presenting a hybrid combinatorial-Boolean model for perfectly-secure cryptography in IoT. In this book, we first present an introduction to information-theoretic cryptography as well as perfect secrecy and its real-world implementations. Then we take a systematic approach to highlight information-theoretic cryptography as a convergence point for existing trends in research on cryptography in IoT. Then we investigate combinatorial and Boolean cryptography and show how they are seen almost everywhere in the ecosystem and the life cycle of information-theoretic IoT cryptography. We finally model perfect secrecy in IoT using Boolean functions, and map the Boolean functions to simple, well-studied combinatorial designs like Latin squares. This book is organized in two parts. The first part studie s information-theoretic cryptography and the promise it holds for cryptography in IoT. The second part separately discusses combinatorial and Boolean cryptography, and then presents the hybrid combinatorial-Boolean model for perfect secrecy in IoT.
This book gives an overview of existing models that cover the whole lifecycle of an IoT application, ranging from its design, implementation, deployment, operation, and monitoring to its final termination and retirement. Models provide abstraction and can help IoT application developers into creating more robust, secure, and reliable applications. Furthermore, adaptation of applications can be eased by using these models, leading to an increased dynamic of the developed IoT applications. In the book, research of the last years in the area of model based approaches to the Internet of Things is described and these approaches are incorporated into the lifecycle of IoT applications. Finally, use cases from different domains are introduced that show how these models could be applied in real-world applications.
This book gathers the latest research findings on emerging trends in 5G and beyond wireless systems. The authors present and assess different enabling technologies, capabilities, and anticipated communications and computing solutions for 5G and beyond. Topics discussed include new frequency bands, new multiple antenna systems, massive D2D connectivity, new network deployment, and more. These discussions help the readers to understand more advanced research materials for developing new ideas to make a contribution in this field for themselves. This book aims to serve as a virtual and effective bridge between academic research in theory and engineering development in practice. Students, professional, and practitioners who seek to learn the latest development in wireless technologies should find interest in this book.
This book presents Proceedings of the International Conference on Intelligent Systems and Networks (ICISN 2022), held at Hanoi in Vietnam. It includes peer reviewed high quality articles on Intelligent System and Networks. It brings together professionals and researchers in the area and presents a platform for exchange of ideas and to foster future collaboration. The topics covered in this book include- Foundations of Computer Science; Computational Intelligence Language and speech processing; Software Engineering Software development methods; Wireless Communications Signal Processing for Communications; Electronics track IoT and Sensor Systems Embedded Systems; etc.
This book presents part of the proceedings of the Manufacturing and Materials track of the iM3F 2021 conference held in Malaysia. This collection of articles deliberates on the key challenges and trends related to manufacturing as well as materials engineering and technology in setting the stage for the world in embracing the Fourth Industrial Revolution. It presents recent findings with regard to manufacturing and materials that are pertinent toward the realizations and ultimately the embodiment of Industry 4.0, with contributions from both industry and academia.
This book is the first systematic exposition on the emerging domain of wireless power transfer in ad hoc communication networks. It selectively spans a coherent, large spectrum of fundamental aspects of wireless power transfer, such as mobility management in the network, combined wireless power and information transfer, energy flow among network devices, joint activities with wireless power transfer (routing, data gathering and solar energy harvesting), and safety provisioning through electromagnetic radiation control, as well as fundamental and novel circuits and technologies enabling the wide application of wireless powering. Comprising a total of 27 chapters, contributed by leading experts, the content is organized into six thematic sections: technologies, communication, mobility, energy flow, joint operations, and electromagnetic radiation awareness. It will be valuable for researchers, engineers, educators, and students, and it may also be used as a supplement to academic courses on algorithmic applications, wireless protocols, distributed computing, and networking.
The Finite-Difference Time-domain (FDTD) method allows you to
compute electromagnetic interaction for complex problem geometries
with ease. The simplicity of the approach coupled with its
far-reaching usefulness, create the powerful, popular method
presented in The Finite Difference Time Domain Method for
Electromagnetics. This volume offers timeless applications and
formulations you can use to treat virtually any material type and
geometry.
Power System Operation and Planning under Uncertainty provides the mathematical models and tools needed to plan and operate future power systems. It discusses the challenging task of the integration of a high penetration of renewable energies and electric vehicles within existing power systems. This book explores the uncertainty faced by power systems that is associated with the evolution of capital costs, technical developments of immature renewable technologies and energy storage systems, the number of electrical vehicles, and the participation of electricity end users in demand response programs. It helps provide solutions, and points to areas of further research that will help resolve. The models, tools and techniques described in this book are of interest for researches of energy systems, professionals working as power system planners or operators, and for graduate students in power engineering and operations research. |
You may like...
Power System Analysis and Design, SI…
J. Duncan Glover, Mulukutla Sarma, …
Paperback
Practical Grounding, Bonding, Shielding…
G. Vijayaraghavan, Mark Brown, …
Paperback
R1,427
Discovery Miles 14 270
Building Services Engineering for…
Peter Tanner, Stephen Jones, …
Paperback
|