The wide deployment of wireless networks and mobile technologies, along with the significant increase in the number of mobile device users, have created a very strong demand on various wireless-based, mobile-based software application systems and enabling technologies. This not only provides many new business opportunities and challenges to wireless and networking service providers, mobile technology ven- dors, and software industry and solution integrators, butalso changes and enhances people’s lives in many areas, including communications, INformation sharing and exchange, commerce, home environment, education, and entertainment. Business organizations and government agencies face new pressure fortechnology updatesto upgrade their networking infrastructures with wireless connectivity to enhance enterprise-oriented systems and solutions.
标签: Wireless-Based Software Systems
上传时间: 2020-06-01
上传用户:shancjb
In a world where consumers,businesses and organizations are demanding faster,amerter and more seamlessly converged INformation technology and communization services,concepts such as Driverless Cars,combining advanced automatic controls,artficial intelligences and automotive transport technologies are soon expected to become a commercial realty.At the same time,new blueprints such as industrial internet and industry 4.0 are driving the increased digitization of entire industries and economic sectors,boosting efficiencies and productivity.
标签: ZTE-M-ICT
上传时间: 2020-06-01
上传用户:shancjb
In this research, we have designed, developed implemented a wireless sensor networks based smart home for safe, sound and secured living environment for any inhabitant especially elderly living alone. We have explored a methodology for the development of efficient electronic real time data processing system to recognize the behaviour of an elderly person. The ability to determine the wellness of an elderly person living alone in their own home using a robust, flexible and data driven artificially intelligent system has been investigated. A framework integrating temporal and spatial contextual INformation for determining the wellness of an elderly person has been modelled. A novel behaviour detection process based on the observed sensor data in performing essential daily activities has been designed and developed.
上传时间: 2020-06-06
上传用户:shancjb
HIS IS THE THIRD —and most likely the last—book in the series on INformation technology for energy managers and web based energy infor- mation and control systems. This book concentrates on web based enterprise energy and building automation systems, and serves as a capstone volume in this series. The thrust here is that the highest level functions of a building and facility automation system are provided by a web based EIS/ECS system that provides energy management, maintenance management, overall facility operational management, and ties in with the enterprise resource management system for the entire facility or the group of facilities being managed. If there were ever to be a fourth volume in this series, it would follow the logical progression of the first three volumes, and would probably be titled Web Based Enterprise Resource Management Systems.
标签: Enterprise Energy Based Web
上传时间: 2020-06-06
上传用户:shancjb
District energy (DE) systems use central heating and/or cooling facilities to provide heating and/or cooling services for communities. The advantages of district energy over conventional heating and cooling include improved efficiency, reliability and safety, reduced environmental impact, and for many situations better economics. DE systems can be particularly beneficial when integrated with cogeneration plants for electricity and heat, i.e., with combined heat and power (CHP) plants. One of the main impediments to increased use of cogeneration-based district energy is a lack of understanding of the behavior of integrated forms of such systems. This book is aimed at providing INformation on district energy and cogeneration tech- nologies, as well as systems that combine them.
标签: Cogeneration District Systems Energy and
上传时间: 2020-06-07
上传用户:shancjb
The large-scale deployment of the smart grid (SG) paradigm could play a strategic role in supporting the evolution of conventional electrical grids toward active, flexible and self- healing web energy networks composed of distributed and cooperative energy resources. From a conceptual point of view, the SG is the convergence of INformation and operational technologies applied to the electric grid, providing sustainable options to customers and improved security. Advances in research on SGs could increase the efficiency of modern electrical power systems by: (i) supporting the massive penetration of small-scale distributed and dispersed generators; (ii) facilitating the integration of pervasive synchronized metering systems; (iii) improving the interaction and cooperation between the network components; and (iv) allowing the wider deployment of self-healing and proactive control/protection paradigms.
标签: Computational Intelligence
上传时间: 2020-06-07
上传用户:shancjb
This book is written for engineers involved in the operation, control, and planning of electric power systems. In addition, the book provides INformation and tools for researchers working in the fields of power system security and stability. The book consists of two volumes. The first volume provides traditional techniques for the stability analysis of large scale power systems. In addition, an overview of the main drivers and requirements for modernization of the traditional methods for online applications are discussed. The second volume provides techniques for online security assessment and corrective action studies. In addition, the impact of variable generation on the security of power systems is considered in the second volume. The first volume may be considered as a background builder while the second volume is intended for the coverage of edge techniques and methods for online dynamic security studies.
上传时间: 2020-06-07
上传用户:shancjb
Since the original publication of Manual 74 in 1991, and the preceding “Guidelines for Transmission Line Structural Loading” in 1984, the understanding of structural loadings on transmission line structures has broadened signifi cantly. However, improvements in computational capa- bility have enabled the transmission line engineer to more easily deter- mine structural loadings without properly understanding the parameters that affect these loads. Many seasoned professionals have expressed concern for the apparent lack of recent INformation on the topic of struc- tural loadings as new engineers enter this industry. The Committee on Electrical Transmission Structures is charged with the responsibility to report, evaluate, and provide loading requirements of transmission struc- tures. This task committee was therefore formed to update and revise the 1991 manual.
标签: Transmission Guidelines Electrical Line for
上传时间: 2020-06-07
上传用户:shancjb
Under the Energy Independence and Security Act of 2007 (EISA), the National Institute of Standards and Technology (NIST) was assigned “primary responsibility to coordinate development of a framework that includes protocols and model standards for INformation management to achieve interoperability of Smart Grid devices and systems…” [EISA Section 1305]. 35 This responsibility comes at a time when the electric power grid and electric power industry are undergoing the most dramatic transformation in many decades. Very significant investments are being made by industry and the federal government to modernize the power grid. To realize the full benefits of these investments—and the continued investments forecast for the coming decades—there is a continued need to establish effective smart grid 36 standards and protocols for interoperability.
标签: Framework Roadmap NIST and
上传时间: 2020-06-07
上传用户:shancjb
The field of cyber security, or INformation security, or INformation assurance, depending on your preference, is an interdisciplinary one. It is part computer science, part statistics, part psychology, part law, and a part of many other fields. Moreover, any cyber security practi- tioner needs to know what he or she is protecting and where to pri- oritize. Just as someone should not spend $100 to protect something worth $10, one cannot be blind to the other disciplines.
上传时间: 2020-06-07
上传用户:shancjb