Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 16 of 16 matches in All Departments
Power systems are evolving towards the Smart Grid paradigm, featured by large-scale integration of renewable energy resources, e.g. wind and solar power, deeper participation of demand side, and enhanced interaction with electric vehicles. While these emerging elements are inherently stochastic in nature, they are creating a challenge to the system's stability and its control. In this context, conventional analysis tools are becoming less effective, and necessitate the use alternative tools that are able to deal with the high uncertainty and variability in the smart grid. Smart Grid initiatives have facilitated wide-spread deployment of advanced sensing and communication infrastructure, e.g. phasor measurement units at grid level and smart meters at household level, which collect tremendous amount of data in various time and space scales. How to fully utilize the data and extract useful knowledge from them, is of great importance and value to support the advanced stability assessment and control of the smart grid. The intelligent system strategy has been identified as an effective approach to meet the above needs. This book presents the cutting-edge intelligent system techniques and their applications for stability assessment and control of power systems. The major topics covered in this book are: Intelligent system design and algorithms for on-line stability assessment, which aims to use steady-state operating variables to achieve fast stability assessment for credible contingencies. Intelligent system design and algorithms for preventive stability control, which aims at transparent and interpretable decision-making on preventive control actions to manipulate system operating condition against possible contingencies. Intelligent system design and algorithms for real-time stability prediction, which aims to use synchronized measurements to foresee the stability status under an ongoing disturbance. Intelligent system design and algorithms for emergency stability control, which aims at fast decision-making on stability control actions at emergency stage where instability is propagating. Methodologies and algorithms for improving the robustness of intelligent systems against missing-data issues. This book is a reference and guide for researchers, students, and engineers who seek to study and design intelligent systems to resolve stability assessment and control problems in the smart grid age.
The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.
The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.
This book constitutes the refereed proceedings of the 15th Asia-Pacific Conference APWeb 2013 held in Sydney, Australia, in April 2013. The 80 papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on distributed processing; graphs; Web search and Web mining; XML, RDF data and query processing; social networks; probabilistic queries; multimedia and visualization; spatial-temporal databases; data mining and knowledge discovery; privacy and security; performance, query processing and optimization. There are also sections summarizing the tutorials and containing the papers from the following workshops: second international workshop on data management for emerging network infrastructure, international workshop on soical media analytics and recommendation technologies, and international workshop on management of spatial temporal data.
The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full papers and 53 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1124 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; multimedia forensics; Part III: encryption and cybersecurity; information hiding; IoT security.
The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full papers and 53 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1124 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; multimedia forensics; Part III: encryption and cybersecurity; information hiding; IoT security.
This three-volume set LNCS 13338-13340 constitutes the thoroughly refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 166 papers included in the 3 volumes were carefully reviewed and selected from 1124 submissions. The papers present research, development, and applications in the fields of artificial intelligence and information security
This three-volume set LNCS 13338-13340 constitutes the thoroughly refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 166 papers included in the 3 volumes were carefully reviewed and selected from 1124 submissions. The papers present research, development, and applications in the fields of artificial intelligence and information security
This three-volume set LNCS 13338-13340 constitutes the thoroughly refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 166 papers included in the 3 volumes were carefully reviewed and selected from 1124 submissions. The papers present research, development, and applications in the fields of artificial intelligence and information security
The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 115 full papers and 53 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1124 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; multimedia forensics; Part III: encryption and cybersecurity; information hiding; IoT security.
This two-volume set of LNCS 12736-12737 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 93 full papers and 29 short papers presented in this two-volume proceedings was carefully reviewed and selected from 1013 submissions. Overall, a total of 224 full and 81 short papers were accepted for ICAIS 2021; the other accepted papers are presented in CCIS 1422-1424. The papers were organized in topical sections as follows: Part I: Artificial intelligence; and big data Part II: Big data; cloud computing and security; encryption and cybersecurity; information hiding; IoT security; and multimedia forensics
This two-volume set of LNCS 12736-12737 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.The total of 93 full papers and 29 short papers presented in this two-volume proceedings was carefully reviewed and selected from 1013 submissions. Overall, a total of 224 full and 81 short papers were accepted for ICAIS 2021; the other accepted papers are presented in CCIS 1422-1424. The papers were organized in topical sections as follows: Part I: Artificial intelligence; and big data Part II: Big data; cloud computing and security; encryption and cybersecurity; information hiding; IoT security; and multimedia forensics
The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security internet; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.
This two-volume set, LNCS 11317 and 12318, constitutes the thoroughly refereed proceedings of the 4th International Joint Conference, APWeb-WAIM 2020, held in Tianjin, China, in September 2020. Due to the COVID-19 pandemic the conference was organizedas a fully online conference. The 42 full papers presented together with 17 short papers, and 6 demonstration papers were carefully reviewed and selected from 180 submissions. The papers are organized around the following topics: Big Data Analytics; Graph Data and Social Networks; Knowledge Graph; Recommender Systems; Information Extraction and Retrieval; Machine Learning; Blockchain; Data Mining; Text Analysis and Mining; Spatial, Temporal and Multimedia Databases; Database Systems; and Demo.
This two-volume set, LNCS 11317 and 12318, constitutes the thoroughly refereed proceedings of the 4th International Joint Conference, APWeb-WAIM 2020, held in Tianjin, China, in September 2020. Due to the COVID-19 pandemic the conference was organizedas a fully online conference. The 42 full papers presented together with 17 short papers, and 6 demonstration papers were carefully reviewed and selected from 180 submissions. The papers are organized around the following topics: Big Data Analytics; Graph Data and Social Networks; Knowledge Graph; Recommender Systems; Information Extraction and Retrieval; Machine Learning; Blockchain; Data Mining; Text Analysis and Mining; Spatial, Temporal and Multimedia Databases; Database Systems; and Demo.
This dissertation looks at the problem of dynamic resource allocation (DRA) in both single-user and multi-user wireless fading channels. This dissertation investigates various key issues on implementation of DRA in wireless systems, such as delay constraint, algorithm complexity, feedback overhead, transceiver structure, and fairness between users, among others. This dissertation demonstrates the usefulness of convex optimization techniques for solving DRA problems in wireless fading channels. First, this dissertation studies the capacity limits and power-control policies for the single-user fading channel. Second, for the MIMO-OFDM channel, this dissertation presents a closed-loop extension of the well-known vertical Bell Labs layered space-time (V-BLAST) architecture whereby the receiver jointly optimizes the power and rate assignments for transmit antennas and then returns them to the transmitter. Third, this dissertation investigates the information-theoretic limits of multiuser, fading, multiple-access channel (MAe. This dissertation draws an interesting dual relationship between power and capacity regions of Gaussian MAC.
|
You may like...
|