| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9911004844503321 |
|
|
Titolo |
Lightning protection / / edited by Vernon Cooray |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
London, : Institution of Engineering and Technology, 2010 |
|
|
|
|
|
|
|
ISBN |
|
1-282-49993-9 |
9786612499937 |
1-61583-338-2 |
1-84919-106-9 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (1070 p.) |
|
|
|
|
|
|
Collana |
|
IET power and energy series ; ; 58 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Lightning protection |
Buildings - Protection |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Contents; List of contributors; Preface; Acknowledgements; 1 Benjamin Franklin and lightning rods; 2 Lightning parameters of engineering interest; 3 Rocket-triggered lightning and new insights into lightning protection gained from triggered-lightning experiments; 4 Attachment of lightning flashes to grounded structures; 5 Protection against lightning surges; 6 External lightning protection system; 7 Internal lightning protection system; 8 Risk analysis; 9 Low-frequency grounding resistance and lightning protection; 10 High-frequency grounding; 11 Soil ionization |
12 Lightning protection of low-voltage networks13 Lightning protection of medium voltage lines; Appendix A13 Procedure to calculate the lightning performance ofdistribution lines according to IEEE Std. 1410-2004(from Reference 4); Appendix B13 The LIOV-Monte Carlo (LIOV-MC) procedure tocalculate the lightning performance of distributionlines (from Reference 56); Appendix C13 The LIOV code: models and equations; Acknowledgements; References; 14 Lightning protection of wind turbines; 15 Lightning protection of telecommunication towers; 16 Lightning protection of satellite launch pads |
17 Lightning protection of structures with risk of fire and explosion18 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Lightning and trees; 19 Lightning warning systems; 20 Lightning-caused injuries in humans; 21 Lightning standards; 22 High-voltage and high-current testing; 23 Return stroke models for engineering applications; Index |
|
|
|
|
|
|
Sommario/riassunto |
|
Lightning is a natural phenomenon that has always fascinated humans. It is also a destructive force, and the science of protecting humans and their belongings on earth is called lightning protection. This book provides the reader with a thorough background in almost every aspect of lightning protection. The contents of the book, distributed over 23 chapters, covers all aspects of lightning protection including lightning parameters of engineering interest, the evaluation of the risk imposed by lightning strikes, the art of installing lightning protection systems on various structures, basic pri |
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9911011657903321 |
|
|
Autore |
Cai Zhipeng |
|
|
Titolo |
Wireless Artificial Intelligent Computing Systems and Applications : 19th International Conference, WASA 2025, Tokyo, Japan, June 24–26, 2025, Proceedings, Part II / / edited by Zhipeng Cai, Yongxin Zhu, Yonghao Wang, Meikang Qiu |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2025.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (711 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 15687 |
|
|
|
|
|
|
Altri autori (Persone) |
|
ZhuYongxin |
WangYonghao |
QiuMeikang |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Wireless communication systems |
Mobile communication systems |
Artificial intelligence |
Application software |
Computers |
Computer networks |
Wireless and Mobile Communication |
Artificial Intelligence |
Computer and Information Systems Applications |
Computing Milieux |
Computer Communication Networks |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
-- GAT-Enhanced DRL Decision Framework for Joint Routing and Scheduling under Vehicular Time-Sensitive Networking. -- CSI-Cro A Cross-Domain Sign Language Recognition System Based on Dual-Attention Feature Decoupled Network. -- Latency-Optimal and Memory-Aware Model Partitioning for Cooperative Inference at the Edge. -- A Sub-Domain Index System for Network Security Situation Assessment. -- Integrating Pretrained Models with Graph Neural Networks for Smart Contract Interpretability. -- A Simple Heuristic Finding Connectivity Bottleneck in Networks with Shared Risk Resource Groups. -- Improving the Freshness of Digital Twins in Edge Computing. -- Joint Offloading and Resource Allocation Optimization based on Multi-coupled Directed Acyclic Graphs for IIoT. -- SeRed: A Selective Reduction Method for Efficient Network Flow Storage. -- CAG: A Constraint-Driven Adversarial Traffic Generation Scheme Based on Feature Correlations. -- A Supervisor-Oriented Privacy-Preserving Fair Exchange Scheme for V2G. -- MACROSS: End-to-End Network Attack Detection Model for EV Charging Station Based on Temporal-Frequency Feature Fusion. -- Game Theory-Based Secure Deduplication Method. -- A Cuckoo Filter-based Anomaly Detection and Localization Mechanism for SDN-based Multidomain IoT. -- Enhancing Federated Learning in IoT Through Dynamic Spectral Clustering. -- Differentially Private Vertical Federated Learning with Dual-Sparsification. -- Bandwidth Prediction within Playback-time of Buffer Duration based on Frame-level Stable Segment for Live Streaming. -- MissingClip: An Industrial Anomaly Detection Method under Modality Missing. -- Multi-Preference Sequence Recommendation Transformer. -- Exploring Heterogeneity in Federated Learning. -- Diverse Delay-Sensitive Task Offloading and Resource Allocation for IIoT: An SoI Enhanced Approach. -- DEFA: A Prairie Rat-hole Target Detection Algorithm Integrating Depth Estimation Based on MiDas. -- PIS-EnsemNet: A novel method for predicting the number of devices in hotspot sharing networks based on passive measurement. -- Joint Hierarchical Feature Fusion and Progressive Learning for Topology Robustness Prediction. -- A SCA-Based Method for RIS Assisted Over-the-Air Computation. -- MPAM: Dual-Transformer for Millimeter-Wave Sensing Based Multi-person Activity Monitoring System. -- Dynamic Graph-based Semi-Supervised Anomaly Detection for In-Vehicle CAN Bus Network. -- A Model of Multi-order Sampling Neighbor Aggregation for Traffic Flow Prediction. -- Physics-Informed Transformer for Efficient Fluid Dynamics Predictions. -- ICSPFuzzer: An Efficient Fuzzing Technique for ICS Protocols. -- MRT-DETR: A New Real-Time Object Detection Method. -- MASS: Empowering Wi-Fi Human Sensing with Metasurface-Assisted Sample Synthesis. -- DDC Sketch: A Dynamically Adaptive Framework for Network Traffic Measurement. -- Timely Watchers: Cost-Effective Schedule for Urban Sensor Patrols. -- vGPU Performance Testing Framework for Large Model Inference. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The 3-volume set LNCS 15686 - 15688 constitutes the proceedings of the 19th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2025, which took place in Tokyo, Japan, during June 24-26, 2025. The 70 full papers and 34 |
|
|
|
|
|
|
|
|
|
|
short papers included in the proceedings were carefully reviewed and selected from 282 submissions. The proceedings also contain 10 papers from the AICom2 symposium. WASA is a prestigious annual gathering that serves as a global platform for researchers, academics, and industry professionals to explore and exchange cuttingedge ideas, research findings, and innovative solutions at the dynamic intersection of wireless technologies and artificial intelligence (AI) computing systems. |
|
|
|
|
|
| |