Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
An overcurrent is caused by a short-circuit, ground-fault, or an overload.A short-circuit may be hundreds or even thousands of times above the normal operating current. This type of fault may be an arcing fault between ungrounded conductors or between an ungrounded conductor and a grounded (usually, a neutral) conductor, a line-to-line arcing fault may produce a current of 74% of a 3-phase bolted fault. A line-to-neutral arcing fault will be somewhat less.A line-to-line bolted fault, the equivalent, of the conductors bolted together, may be up to 100% of the available short-circuit current.A line-to-neutral bolted fault may be in excess of 100% of the 3-phase bolted fault at the source, but considerably less downstream.A ground-fault, that is, the equivalent of a connection between an ungrounded conductor and the equipment grounding system, will produce a current that may be 38% or higher of the 3-phase bolted fault current. These types of faults are typically arcing faults which normally are intermittent in nature. That is, they strike and restrike over time and may produce a short-circuit fault due to insulation damage.Once again, a line-to-equipment ground fault near the source may produce a fault current of over 100% of the 3-phase bolted fault, but considerably less downstream.An overload typically ranges from one to six times the normal current, and are normally caused by motor starting currents or transformer magnetizing currents. These conditions are of such short duration that the circuit components are not damaged.This book has a detailed analysis of these types of faults, along with explanations and examples of the various types of overcurrent protective devices to assure proper protection.This volume has extensive information on the application of overcurrent protection for conductors and equipment. The reader will be able to calculate fault currents as well as establishing the short-circuit withstand rating of conductor insulation and to determine the appropriate type of overcurrent devices based on circuit conditions.In addition, determining ground-fault currents for the purpose of selecting the proper size of equipment grounding conductors to establish an effective ground-fault current path is discussed in detail.Readership - Anyone involved with the design of overcurrent protection for electrical distribution systems from the system source to the electrical utilization equipment. The emphasis is placed on the design of the overcurrent protection for specific installations to assure proper protection for the circuit components regardless of the type of fault encountered.
The first concern and the most important reason for proper grounding techniques are to protect people from the effects of ground-faults and lightning. Creating an effective ground-fault current path to assure the operation of overcurrent protective devices on solidly grounded systems and to limit the voltage-rise on equipment frames during fault condition is of paramount importance.The next concern is building and equipment protection. In this case, providing low impedance bonding and grounding paths between the system source, the electrical service and downstream equipment will serve to limit hazardous voltages due to faults and especially, lightning, A low resistance-to-ground system will serve to limit the voltage rise on systems and equipment.But of equal importance is the length of the grounding electrode conductor. It is critical to limit the length of this conductor due to the increased impedance of lightning currents.And finally, a properly installed grounding system will minimize the effects of electrical noise on sensitive circuits and stabilize the voltage-to-ground during normal operation.This volume has extensive information on grounding electrical systems and equipment.This information includes the following topics:System GroundingEquipment GroundingBondingThe Grounding Electrode SystemSolidly Grounded SystemsImpedance Grounded SystemsGrounding Separately-Derived SystemsCalculating Ground-Fault CurrentsConductor Insulation Withstand RatingsConductor Fusing or Melting CurrentsFunctional GroundingLightning ProtectionReadership: Anyone involved with designing a proper grounding system that will serve to protect people and equipment from the effects of ground faults and lightning. And to design a proper grounding system for special applications, including Solar and Wind Powered Systems.
While the JPEG image standard was developed more than 25 years ago, it is still dominant in terms of image formation, manipulation and transmission over the internet and other media. As technology advances, new demands have arisen for the efficient transmission and storage of images causing other formats to emerge. Over the years, several extensions such as, JPEGLS, JPEG2K, JPEGXT, JPEGXR, JPEGXS and JPEG Pleno, have been added, constructing a series of standards for the compression and transmission of images. This book is the first to bring together most of the series of JPEG standards in a book.This book covers the descriptions of the JPEG standards and gives the reader an overview of the latest advances in the standards of the Joint Photographic Experts Group.Topics discussed include: * JEPG;* JPEG XR;* JPEG XT;* JPEG 2000;* JPEG XS;* JPEG Pleno;* JPEG AIC;* JPEG LS;* JPEG XL;* JPSearch;* JPEG Systems;* JBIG
The book presents unexplored issues of economic inequality, including case studies of various countries. This book book examines the major parameters of the socio-economic issues of inequality and focuses on the key economic issues of inequality, namely, income and wealth distribution, equity & equality of outcome, and equality of opportunities.
Intelligent and Connected Vehicles (ICVs) are moving into the mainstream of the worldwide automotive industry. A lot of advanced technologies, like artificial intelligence, big data, millimeter wave radar, LiDAR and high-definition camera based real-time environmental perception, etc., are increasingly being applied in ICVs, making them more intelligent and connected with devices surrounding the vehicles. However, although the versatile connection and information exchange among ICVs, external devices and human beings provides vehicles with a better and faster perception of surrounding environments and a better driving experience for users, they also create a series of intrusion portals for malicious attackers which threaten the safety of drivers and passengers. This book is concerned with the recognition and protection against such threats.Security for ICVs includes information across the fields of automobile engineering, artificial intelligence, computer, microelectronics, automatic control, communication technology, big data, edge/cloud computing and others. This book comprehensively and systematically introduces security threats to ICVs coming from automotive technology development, on-board sensors, vehicle networking, automobile communications, intelligent transportation, big data, cloud computing, etc. Then, through discussion of some typical automobile cyber-attack cases studies, readers will gain a deeper understanding of the working principle of ICVs, so that they can test vehicles more objectively and scientifically. In this way they will find the existence of vulnerabilities and security risks and take the corresponding protective measures to prevent malicious attacks.
This collection of edited papers gives an integrated understanding of the question of "why is society unequal"? This book is aimed at those stakeholders, who want to make or contribute to change and build an undivided, socially inclusive society, and to those who want to contribute to empowering society in the Twenty-First century.
This book provides the readers with the latest advances and insights in the ever-expanding field of Cardio-Oncology.
The book describes projects which help in developing cybersecurity solution architectures and the use of the right tools from the opensource software domain. These projects are covered in detail with recipes on how to use open-source tooling to obtain standard cyber defense and the ability to do self-penetration testing and vulnerability assessment
The aim of this book is to provide readers and researchers with timely and accurate knowledge on stem cell biology and regenerative medicine. This book will cover many topics in the field and is based on conferences given by recognized scientists involved in the international master course on stem cell biology at Sorbonne Universite in Paris.
This monograph is devoted to the construction of optimal estimates of values of linear functionals on solutions to Cauchy and two-point boundary value problems for systems of linear first-order ordinary differential equations, from indirect observations which are linear transformations of the same solutions perturbed by additive random noises. It is assumed that right-hand sides of equations and boundary data as well as statistical characteristics of random noises in observations are not known and belong to certain given sets in corresponding functional spaces. This leads to the necessity of introducing the minimax statement of an estimation problem when optimal estimates are defined as linear, with respect to observations, estimates for which the maximum of mean square error of estimation taken over the above-mentioned sets attains minimal value. Such estimates are called minimax or guaranteed estimates. It is established that these estimates are expressed explicitly via solutions to some uniquely solvable linear systems of ordinary differential equations of the special type. The authors apply these results for obtaining the optimal estimates of solutions from indirect noisy observations.Similar estimation problems for solutions of boundary value problems for linear differential equations of order n with general boundary conditions are considered. The authors also elaborate guaranteed estimation methods under incomplete data of unknown right-hand sides of equations and boundary data and obtain representations for the corresponding guaranteed estimates. In all the cases estimation errors are determined.
The book describes important networking standards, classifying their underlying technologies in a logical manner and gives detailed examples of successful applications. The book provides examples with supporting MATLAB codes and hands-on projects.
This book introduces the state-of-the-art trends and advances in the use of Machine Learning in Cloud and Big Data Analytics. The book will describe the concepts necessary to understand current Machine Learning issues, challenges and possible solutions as well as upcoming trends in Big Data Analytics.
The availability of packaged clustering programs means that anyone with data can easily do cluster analysis on it. But many users of this technology don't fully appreciate its many hidden dangers. In today's world of "e;grab and go algorithms,"e; part of my motivation for writing this book is to provide users with a set of cautionary tales about cluster analysis, for it is very much an art as well as a science, and it is easy to stumble if you don't understand its pitfalls. Indeed, it is easy to trip over them even if you do! The parenthetical word usually in the title is very important, because all clustering algorithms can and do fail from time to time.Modern cluster analysis has become so technically intricate that it is often hard for the beginner or the non-specialist to appreciate and understand its many hidden dangers. Here's how Yogi Berra put it, and he was right:In theory there's no difference between theory and practice. In practice, there is ~Yogi BerraThis book is a step backwards, to four classical methods for clustering in small, static data sets that have all withstood the tests of time. The youngest of the four methods is now almost 50 years old:Gaussian Mixture Decomposition (GMD, 1898)SAHN Clustering (principally single linkage (SL, 1909))Hard c-means (HCM, 1956, also widely known as (aka) "e;k-means"e;)Fuzzy c-means (FCM, 1973, reduces to HCM in a certain limit)The dates are the first known writing (to me, anyway) about these four models. I am (with apologies to Marvel Comics) very comfortable in calling HCM, FCM, GMD and SL the Fantastic Four.Cluster analysis is a vast topic. The overall picture in clustering is quite overwhelming, so any attempt to swim at the deep end of the pool in even a very specialized subfield requires a lot of training. But we all start out at the shallow end (or at least that's where we should start!), and this book is aimed squarely at teaching toddlers not to be afraid of the water. There is no section of this book that, if explored in real depth, cannot be expanded into its own volume. So, if your needs are for an in-depth treatment of all the latest developments in any topic in this volume, the best I can do - what I will try to do anyway - is lead you to the pool, and show you where to jump in.
This book introduces the field by addressing its fundamental principles, proceeding from its very beginnings, up to today's emerging technologies related to the fifth-generation wireless systems (5G), Multi-Input Multiple Output (MIMO) connectivity, and Aerospace/Electronic Warfare Radar. The tone is tutorial.
This book examines the key aspects that will define future sustainable energy systems: biofuels, green nanomaterials and the production of bioethanol and bio-hydrogen from bio-waste. Bio-based fuels are the future energy carriers for internal combustion engines as they have lower environmental impact and higher efficiency. The book clearly illustrates the requirement for a unified engineering approach based on solid mathematical and engineering principles. Aside from the ecological advantages, support for sustainable energy can help the socioeconomic situation of developing countries by providing a consistent supply of new energy along with the generation of new job opportunities. The sustainable energy applications and existing contextual investigations provide useful guidance for the broad comprehension of the significance of sustainable energy.Technical topics discussed in the book include: - Thermochemical Conversion process; - Catalytic conversion process;- Rankine cycle;- Nanomaterials;
Special functions are mathematical functions that have established names and notations due to their importance in mathematical analysis, functional analysis, geometry, physics, or other applications. This short text gives clear descriptions and explanations of the Gamma function, the Probability Integral and its related functions, Spherical Harmonics Theory, The Bessel function, Hermite polynomials and Laguerre polynomials. Each chapter finishes with a description of how the function is most commonly applied and a set of examples for the student to work through.
This book "Advanced Applications of Computational Mathematics" covers multidisciplinary studies containing advanced research in the field of computational and applied mathematics. The book includes research methodology, techniques, applications, and algorithms.
This edited book presents some unexplored issues of economic inequality, including case studies of various countries. Inequality is a chronic and divisive factor of society. Inequality exists as an integral attribute of human development.
The book discusses the activities involved in developing an Enterprise Continuity Program (ECP) that will cover both Business Continuity Management (BCM) as well as Disaster Recovery Management (DRM). The creation of quantitative metrics for BCM are discussed as well as several models and methods that correspond to the goals and objectives of the International Standards Organisation (ISO) Technical Committee ISO/TC 292 "e;Security and resilience"e;. Significantly, the book contains the results of not only qualitative, but also quantitative, measures of Cyber Resilience which for the first time regulates organizations' activities on protecting their critical information infrastructure.The book discusses the recommendations of the ISO 22301: 2019 standard "e;Security and resilience - Business continuity management systems - Requirements"e; for improving the BCM of organizations based on the well-known "e;Plan-Do-Check-Act"e; (PDCA) model. It also discusses the recommendations of the following ISO management systems standards that are widely used to support BCM. The ISO 9001 standard "e;Quality Management Systems"e;; ISO 14001 "e;Environmental Management Systems"e;; ISO 31000 "e;Risk Management"e;, ISO/IEC 20000-1 "e;Information Technology - Service Management"e;, ISO/IEC 27001 "e;Information Management security systems"e;, ISO 28000 "e;Specification for security management systems for the supply chain"e;, ASIS ORM.1-2017, NIST SP800-34, NFPA 1600: 2019, COBIT 2019, RESILIA, ITIL V4 and MOF 4.0, etc. The book expands on the best practices of the British Business Continuity Institute's Good Practice Guidelines (2018 Edition), along with guidance from the Disaster Recovery Institute's Professional Practices for Business Continuity Management (2017 Edition). Possible methods of conducting ECP projects in the field of BCM are considered in detail. Based on the practical experience of the author there are examples of Risk Assessment (RA) and Business Impact Analysis (BIA), examples of Business Continuity Plans (BCP) & Disaster Recovery Plans (DRP) and relevant BCP & DRP testing plans.This book will be useful to Chief Information Security Officers, internal and external Certified Information Systems Auditors, senior managers within companies who are responsible for ensuring business continuity and cyber stability, as well as teachers and students of MBA's, CIO and CSO programs.
This book describes the various AI, IoT, robotics, mathematical and computational modelling tools that have been used to fight the Covid-19 pandemic.
Over recent years, many new technologies have been introduced to drive the digital transformation in the building maintenance industry. The current trend in digital evolution involves data-driven decision making which opens new opportunities for an energy centered maintenance model. Artificial Intelligence and Machine Learning are helping the maintenance team to get to the next level of maintenance intelligence to provide real-time early warning of abnormal equipment performance.This edition follows the same methodology as the First. It provides detailed descriptions of the latest technologies associated with Artificial Intelligence and Machine Learning which enable data-driven decision-making processes about the equipment's operation and maintenance. Technical topics discussed in the book include: Different Maintenance Types and The Need for Energy Centered MaintenanceThe Centered Maintenance ModelEnergy Centered Maintenance Process Measures of Equipment and Maintenance Efficiency and EffectivenessData-Driven Energy Centered Maintenance Model:Digitally Enabled Energy Centered Maintenance TasksArtificial Intelligence and Machine Learning in Energy Centered MaintenanceModel Capabilities and Analytics RulesBuilding Management System SchematicsThe book contains a detailed description of the digital transformation process of most of the maintenance inspection tasks as they move away from being manually triggered. The book is aimed at building operators as well as those building automation companies who are working continuously to digitalize building operation and maintenance procedures. The benefits are reductions in the equipment failure rate, improvements in equipment reliability, increases in equipment efficiency and extended equipment lifespan.
This book explores the fundamentals, recent advances, and applications of the physics of highly correlated materials. This book serves as a handbook/reference for advanced graduate students.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.