04796nam 22006375 450 991073147900332120250626163826.03-031-26496-710.1007/978-3-031-26496-2(MiAaPQ)EBC30594704(Au-PeEL)EBL30594704(OCoLC)1382693440(DE-He213)978-3-031-26496-2(PPN)272267090(CKB)27023212500041(EXLCZ)992702321250004120230614d2023 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierAdvances in Artificial Intelligence for Renewable Energy Systems and Energy Autonomy /edited by Mukhdeep Singh Manshahia, Valeriy Kharchenko, Gerhard-Wilhelm Weber, Pandian Vasant1st ed. 2023.Cham :Springer International Publishing :Imprint: Springer,2023.1 online resource (302 pages)EAI/Springer Innovations in Communication and Computing,2522-8609Print version: Manshahia, Mukhdeep Singh Advances in Artificial Intelligence for Renewable Energy Systems and Energy Autonomy Cham : Springer International Publishing AG,c2023 9783031264955 Chapter 1. General Approaches to Assessing Electrical Load of Agro-Industrial Complex Facilities When Justifying the Parameters of the Photovoltaic Power System -- Chapter 2. RBFNN for MPPT Controller in Wind Energy Harvesting System -- Chapter 3. Simulation Optimum Performance All-Wheels Plug-In Hybrid Electric Vehicle -- Chapter 4. Artificial Intelligence application to flexibility provision in energy management system: a survey -- Chapter 5. Machine Learning Applications for Renewable Energy Systems -- Chapter 6. New Technologies and Equipment For Smelting Technical Silicon -- Chapter 7. Reconfiguration of distribution network considering photovoltaic system placement based on metaheuristic algorithms -- Chapter 8. Technology of Secondary Cast Polycrystalline Silicon And Its Application In The Production Of Solar Cells -- Chapter 9. Machine Learning Applications for Renewable based Energy Systems -- Chapter 10. Bi-Objective Optimal Scheduling of Smart Homes Appliances using Artificial Intelligence -- Chapter 11. Optimal placement of photovoltaic systems and wind turbines in distribution systems by using Northern Goshawk Optimization algorithm -- Chapter 12. Granulated silicon and thermal energy converters on its basis -- Chapter 13. Security Constrained Unit Commitment with Wind Energy Resource using Universal Generating Function.This book provides readers with emerging research that explores the theoretical and practical aspects of implementing new and innovative artificial intelligence (AI) techniques for renewable energy systems. The contributions offer broad coverage on economic and promotion policies of renewable energy and energy-efficiency technologies, the emerging fields of neuro-computational models and simulations under uncertainty (such as fuzzy-based computational models and fuzzy trace theory), evolutionary computation, metaheuristics, machine learning applications, advanced optimization, and stochastic models. This book is a pivotal reference for IT specialists, industry professionals, managers, executives, researchers, scientists, and engineers seeking current research in emerging perspectives in artificial intelligence, renewable energy systems, and energy autonomy. Based on sustainability as a fundamental factor for intelligent computing; Focuses on the role AI playsin smart living, energy transition, and sustainable development; Covers a broad range of green energy-related topics.EAI/Springer Innovations in Communication and Computing,2522-8609Renewable energy sourcesArtificial intelligenceComputational intelligenceRenewable EnergyArtificial IntelligenceComputational IntelligenceRenewable energy sources.Artificial intelligence.Computational intelligence.Renewable Energy.Artificial Intelligence.Computational Intelligence.333.794333.794Manshahia Mukhdeep Singh1368887Kharchenko Valeriy1368888Weber Gerhard Wilhelm1368889Vasant Pandian1073665MiAaPQMiAaPQMiAaPQBOOK9910731479003321Advances in Artificial Intelligence for Renewable Energy Systems and Energy Autonomy3394880UNINA06184nam 22008173u 450 991096219580332120251117090548.01-283-17720-X97866131772091-118-11358-6(CKB)2550000000040607(EBL)693686(OCoLC)747412540(SSID)ssj0000541133(PQKBManifestationID)11391003(PQKBTitleCode)TC0000541133(PQKBWorkID)10498608(PQKB)10670831(WaSeSS)Ind00025751(MiAaPQ)EBC693686(EXLCZ)99255000000004060720130418d2011|||| u|| |engur|n|---|||||txtccrSecurity Administrator Street Smarts A Real World Guide to CompTIA Security+ Skills3rd ed.Hoboken Wiley20111 online resource (625 p.)Street smarts seriesSybex serious skillsDescription based upon print version of record.1-118-06116-0 Includes index.CompTIA Discount Coupon; Security Administrator Street Smarts: A Real World Guide to CompTIA Security+TM Skills; Contents; Introduction; Phase 1: The Grunt Work of Security; Task 1.1: Performing an Initial Risk Assessment; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.2: Determining Which Security Policy Is Most Important; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.3: Establishing a User-Awareness Program; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 1.4: Reviewing a Physical-Security Checklist; Scenario; Scope of TaskProcedureCriteria for Completion; Task 1.5: Understanding the Value of Documents; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 2: Hardening Systems; Task 2.1: Managing Services; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.2: Managing Ports; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.3: Patching the Operating System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.4: Security Templates; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.5: Securing Autoruns; Scenario; Scope of TaskProcedureCriteria for Completion; Task 2.6: Securing Hardware Devices; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.7: Virtualization; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 2.8: Locking the Computer Using an Idle Time-out; Scenario; Scope of Task; Procedure; Criteria for Completion; Phase 3: Malicious Software; Task 3.1: Installing, Updating, and Running Antivirus Software; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.2: Using a Rootkit Checker; Scenario; Scope of Task; Procedure; Criteria for CompletionTask 3.3: AdwareScenario; Scope of Task; Procedure; Criteria for Completion; Task 3.4: Using a Spyware Checker; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.5: Malicious Software Removal Tool; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.6: McAfee Site Advisor; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.7: ARP Poisoning with Cain & Abel; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 3.8: Attacking Authentication with Firesheep; Scenario; Scope of Task; Procedure; Criteria for CompletionPhase 4: Secure StorageTask 4.1: The Encrypting File System; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.2: EFS Data Recovery; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.3: Implementing Syskey; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.4: Converting FAT to NTFS; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.5: Implementing Disk Fault Tolerance with RAID; Scenario; Scope of Task; Procedure; Criteria for Completion; Task 4.6: Backing Up Data; Scenario; Scope of Task; ProcedureCriteria for CompletionA step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide,Serious skills.Computer networks --Security measures --Examinations --Study guidesComputer security --Examinations --Study guidesElectronic data processing personnel --CertificationElectronic data processing personnelCertificationStudy guidesComputer securityExaminationsStudy guidesComputer networksExaminationsSecurity measuresEngineering & Applied SciencesHILCCComputer ScienceHILCCComputer networks --Security measures --Examinations --Study guides.Computer security --Examinations --Study guides.Electronic data processing personnel --Certification.Electronic data processing personnelCertificationComputer securityExaminationsComputer networksExaminationsSecurity measures.Engineering & Applied SciencesComputer Science005.8COM055000bisacshMiller David R1856645Gregg Michael884346AU-PeELAU-PeELAU-PeELBOOK9910962195803321Security Administrator Street Smarts4456276UNINA