LEADER 00895nam0-2200277 --450 001 9910683583803321 005 20230418112102.0 010 $a978-88-498-7401-3 100 $a20230418d2022----kmuy0itay5050 ba 101 0 $aita 102 $aIT 105 $aa 001yy 200 1 $a<>bello simmetrico$el'arte urbana e il corso Numistrano di Nicastro$fGiovanni Iuffrida$gpresentazione di Alessandro Bianchi 210 $aSoveria Mannelli$cRubbettino$d2022 215 $a205 p.$cill.$d21 cm 225 1 $aImmagini di cittą$v9 610 0 $aCorso Numistrano$aNicastro (Lamezia Terme)$aStoria 700 1$aIuffrida,$bGiovanni$039964 702 1$aBianchi,$bAlessandro$f<1945- > 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910683583803321 952 $aURB.LE B 3460$b267/2023$fFARBC 959 $aFARBC 996 $aBello simmetrico$93085380 997 $aUNINA LEADER 02295nam 2200373 450 001 996575000903316 005 20231205170133.0 010 $a1-5044-8777-X 035 $a(IEEE)9828002 035 $a(CKB)24248997900041 035 $a(NjHacI)9924248997900041 035 $a(EXLCZ)9924248997900041 100 $a20231205d2022 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$a"1885-2022 - IEEE Guide for Assessing, Measuring, and Verifying Volt-Var Control and Optimization on Distribution Systems" /$fIEEE 210 1$aNew York :$cIEEE,$d2022. 210 4$d©2022 215 $a1 online resource (58 pages) 330 $aElectric utilities are seeking to improve the overall efficiency and performance of the distribution system while helping to achieve energy and demand savings. Distribution volt-var optimization (VVO) can play a major role in accomplishing these objectives while maintaining safety, preserving assets, and meeting all operating constraints such as loading and voltage levels. Initial studies and experience show there is significant potential for energy savings, demand management and loss reduction through improved management of distribution voltage profiles and reactive power flow. Consistent methods are needed for verifying the benefits achieved by VVO systems that have already been implemented. Guidelines for modeling system loads as well as distributed resources and their response to voltage and var changes are needed along with methods for performing the evaluations to estimate total benefits. These benefits can then be evaluated as a function of the investment requirements for the improved VVO on a feeder by feeder or substation by substation basis and deployment priorities can be developed. 606 $aElectric power distribution 606 $aEnergy conservation 615 0$aElectric power distribution. 615 0$aEnergy conservation. 676 $a621.319 801 0$bNjHacI 801 1$bNjHacl 906 $aDOCUMENT 912 $a996575000903316 996 $a"1885-2022 - IEEE Guide for Assessing, Measuring, and Verifying Volt-Var Control and Optimization on Distribution Systems"$93880166 997 $aUNISA LEADER 05551nam 22006975 450 001 9910484752803321 005 20251113190734.0 010 $a3-030-66922-X 024 7 $a10.1007/978-3-030-66922-5 035 $a(CKB)4100000011728519 035 $a(DE-He213)978-3-030-66922-5 035 $a(MiAaPQ)EBC6461912 035 $a(PPN)253253829 035 $a(EXLCZ)994100000011728519 100 $a20210121d2021 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Privacy in New Computing Environments $eThird EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings /$fedited by Ding Wang, Weizhi Meng, Jinguang Han 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (XIII, 462 p. 122 illus., 108 illus. in color.) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v344 300 $aIncludes index. 311 08$a3-030-66921-1 327 $aNetwork Security -- A Characterisation of Smart Grid DoS Attacks -- Security and Privacy in 5G Applications: Challenges and Solutions -- Alarm Elements based Adaptive Network Security Situation Prediction Model -- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback -- System Security -- Research on IoT Security Technology and Standardization in the 5G Era -- MIMEC Based Information System Security Situation Assessment Model -- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings -- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain -- Machine Learning -- Research on a Hybrid EMD-SVR Model for Time Series Prediction -- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity -- User Identity Linkage across Social Networks based on Neural Tensor Network -- An Efficient and Privacy-Preserving Physiological Case Classification Scheme forE-healthcare System -- A multi-class detection system for Android malicious Apps based on color image features -- Authentication and Access Control -- PUF-based Two-factor Group Authentication in Smart Home -- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems -- Access Control for Wireless Body Area Networks -- FIDO - that dog won?t hunt -- Blockchain-enabled user authentication in zero trust Internet of Things -- Cloud Security -- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage -- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain -- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data -- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration -- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing -- Cryptography -- Generative image steganography based on digital Cardan Grille -- Pixel Grouping Based Image Hashing for DIBR 3D Image -- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP -- Applied Cryptography -- A Verifiable Combinatorial Auction Scheme with Bidder?s Privacy Protection -- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query -- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User -- A3BAC: Attribute-Based Access Control Model with Anonymous Access -- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid. 330 $aThis book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v344 606 $aComputer networks$xSecurity measures 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aApplication software 606 $aMobile and Network Security 606 $aData and Information Security 606 $aCryptology 606 $aSecurity Services 606 $aComputer and Information Systems Applications 615 0$aComputer networks$xSecurity measures. 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 14$aMobile and Network Security. 615 24$aData and Information Security. 615 24$aCryptology. 615 24$aSecurity Services. 615 24$aComputer and Information Systems Applications. 676 $a004 702 $aWang$b Ding 702 $aMeng$b Weizhi$f1986- 702 $aHan$b Jinguang 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484752803321 996 $aSecurity and Privacy in New Computing Environments$92546874 997 $aUNINA