1.

Record Nr.

UNINA9911004844503321

Titolo

Lightning protection / / edited by Vernon Cooray

Pubbl/distr/stampa

London, : Institution of Engineering and Technology, 2010

ISBN

1-282-49993-9

9786612499937

1-61583-338-2

1-84919-106-9

Descrizione fisica

1 online resource (1070 p.)

Collana

IET power and energy series ; ; 58

Altri autori (Persone)

CoorayVernon

Disciplina

621.317

Soggetti

Lightning protection

Buildings - Protection

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Contents; List of contributors; Preface; Acknowledgements; 1 Benjamin Franklin and lightning rods; 2 Lightning parameters of engineering interest; 3 Rocket-triggered lightning and new insights into lightning protection gained from triggered-lightning experiments; 4 Attachment of lightning flashes to grounded structures; 5 Protection against lightning surges; 6 External lightning protection system; 7 Internal lightning protection system; 8 Risk analysis; 9 Low-frequency grounding resistance and lightning protection; 10 High-frequency grounding; 11 Soil ionization

12 Lightning protection of low-voltage networks13 Lightning protection of medium voltage lines; Appendix A13 Procedure to calculate the lightning performance ofdistribution lines according to IEEE Std. 1410-2004(from Reference 4); Appendix B13 The LIOV-Monte Carlo (LIOV-MC) procedure tocalculate the lightning performance of distributionlines (from Reference 56); Appendix C13 The LIOV code: models and equations; Acknowledgements; References; 14 Lightning protection of wind turbines; 15 Lightning protection of telecommunication towers; 16 Lightning protection of satellite launch pads

17 Lightning protection of structures with risk of fire and explosion18



Lightning and trees; 19 Lightning warning systems; 20 Lightning-caused injuries in humans; 21 Lightning standards; 22 High-voltage and high-current testing; 23 Return stroke models for engineering applications; Index

Sommario/riassunto

Lightning is a natural phenomenon that has always fascinated humans. It is also a destructive force, and the science of protecting humans and their belongings on earth is called lightning protection. This book provides the reader with a thorough background in almost every aspect of lightning protection. The contents of the book, distributed over 23 chapters, covers all aspects of lightning protection including lightning parameters of engineering interest, the evaluation of the risk imposed by lightning strikes, the art of installing lightning protection systems on various structures, basic pri

2.

Record Nr.

UNINA9911011657903321

Autore

Cai Zhipeng

Titolo

Wireless Artificial Intelligent Computing Systems and Applications : 19th International Conference, WASA 2025, Tokyo, Japan, June 24–26, 2025, Proceedings, Part II / / edited by Zhipeng Cai, Yongxin Zhu, Yonghao Wang, Meikang Qiu

Pubbl/distr/stampa

Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025

ISBN

981-9687-28-4

Edizione

[1st ed. 2025.]

Descrizione fisica

1 online resource (711 pages)

Collana

Lecture Notes in Computer Science, , 1611-3349 ; ; 15687

Altri autori (Persone)

ZhuYongxin

WangYonghao

QiuMeikang

Disciplina

621.384

Soggetti

Wireless communication systems

Mobile communication systems

Artificial intelligence

Application software

Computers

Computer networks

Wireless and Mobile Communication

Artificial Intelligence

Computer and Information Systems Applications

Computing Milieux

Computer Communication Networks



Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

-- GAT-Enhanced DRL Decision Framework for Joint Routing and Scheduling under Vehicular Time-Sensitive Networking.  -- CSI-Cro A Cross-Domain Sign Language Recognition System Based on Dual-Attention Feature Decoupled Network.  -- Latency-Optimal and Memory-Aware Model Partitioning for Cooperative Inference at the Edge.  -- A Sub-Domain Index System for Network Security Situation Assessment.  -- Integrating Pretrained Models with Graph Neural Networks for Smart Contract Interpretability.  -- A Simple Heuristic Finding Connectivity Bottleneck in Networks with Shared Risk Resource Groups.  -- Improving the Freshness of Digital Twins in Edge Computing.  -- Joint Offloading and Resource Allocation Optimization based on Multi-coupled Directed Acyclic Graphs for IIoT.  -- SeRed: A Selective Reduction Method for Efficient Network Flow Storage.  -- CAG: A Constraint-Driven Adversarial Traffic Generation Scheme Based on Feature Correlations.  -- A Supervisor-Oriented Privacy-Preserving Fair Exchange Scheme for V2G.  -- MACROSS: End-to-End Network Attack Detection Model for EV Charging Station Based on Temporal-Frequency Feature Fusion.  -- Game Theory-Based Secure Deduplication Method.  -- A Cuckoo Filter-based Anomaly Detection and Localization Mechanism for SDN-based Multidomain IoT.  -- Enhancing Federated Learning in IoT Through Dynamic Spectral Clustering.  -- Differentially Private Vertical Federated Learning with Dual-Sparsification.  -- Bandwidth Prediction within Playback-time of Buffer Duration based on Frame-level Stable Segment for Live Streaming.  -- MissingClip: An Industrial Anomaly Detection Method under Modality Missing.  -- Multi-Preference Sequence Recommendation Transformer.  -- Exploring Heterogeneity in Federated Learning.  -- Diverse Delay-Sensitive Task Offloading and Resource Allocation for IIoT: An SoI Enhanced Approach.  -- DEFA: A Prairie Rat-hole Target Detection Algorithm Integrating Depth Estimation Based on MiDas.  -- PIS-EnsemNet: A novel method for predicting the number of devices in hotspot sharing networks based on passive measurement.  -- Joint Hierarchical Feature Fusion and Progressive Learning for Topology Robustness Prediction.  -- A SCA-Based Method for RIS Assisted Over-the-Air Computation.  -- MPAM: Dual-Transformer for Millimeter-Wave Sensing Based Multi-person Activity Monitoring System.  -- Dynamic Graph-based Semi-Supervised Anomaly Detection for In-Vehicle CAN Bus Network.  -- A Model of Multi-order Sampling Neighbor Aggregation for Traffic Flow Prediction.  -- Physics-Informed Transformer for Efficient Fluid Dynamics Predictions.  -- ICSPFuzzer: An Efficient Fuzzing Technique for ICS Protocols.  -- MRT-DETR: A New Real-Time Object Detection Method.  -- MASS: Empowering Wi-Fi Human Sensing with Metasurface-Assisted Sample Synthesis.  -- DDC Sketch: A Dynamically Adaptive Framework for Network Traffic Measurement.  -- Timely Watchers: Cost-Effective Schedule for Urban Sensor Patrols.  -- vGPU Performance Testing Framework for Large Model Inference.

Sommario/riassunto

The 3-volume set LNCS 15686 - 15688 constitutes the proceedings of the 19th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2025, which took place in Tokyo, Japan, during June 24-26, 2025. The 70 full papers and 34



short papers included in the proceedings were carefully reviewed and selected from 282 submissions. The proceedings also contain 10 papers from the AICom2 symposium. WASA is a prestigious annual gathering that serves as a global platform for researchers, academics, and industry professionals to explore and exchange cuttingedge ideas, research findings, and innovative solutions at the dynamic intersection of wireless technologies and artificial intelligence (AI) computing systems.