虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Two-level

  • Dynamic Security

    This book is written for engineers involved in the operation, control, and planning of electric power systems. In addition, the book provides information and tools for researchers working in the fields of power system security and stability. The book consists of two volumes. The first volume provides traditional techniques for the stability analysis of large scale power systems. In addition, an overview of the main drivers and requirements for modernization of the traditional methods for online applications are discussed. The second volume provides techniques for online security assessment and corrective action studies. In addition, the impact of variable generation on the security of power systems is considered in the second volume. The first volume may be considered as a background builder while the second volume is intended for the coverage of edge techniques and methods for online dynamic security studies.

    标签: Security Dynamic

    上传时间: 2020-06-07

    上传用户:shancjb

  • High+Voltage+Engineering

    The first edition as well as its forerunner of Kuffel and Abdullah published in 1970 and their translations into Japanese and Chinese languages have enjoyed wide international acceptance as basic textbooks in teaching senior under- graduate and postgraduate courses in High-Voltage Engineering. Both texts have also been extensively used by practising engineers engaged in the design and operation of high-voltage equipment. Over the years the authors have received numerous comments from the text’s users with helpful suggestions for improvements. These have been incorporated in the present edition. Major revisions and expansion of several chapters have been made to update the continued progress and developments in high-voltage engineering over the past two decades.

    标签: Engineering Voltage High

    上传时间: 2020-06-07

    上传用户:shancjb

  • Power Over Ethernet

    December 2007, San Jose, California: It seems a long time ago. I walked into a big networking company to head their small Power over Ethernet (PoE) applications team. Surprisingly, I hardly knew anything about PoE prior to that day, having been a switching-power conversion engineer almost all my life. But it seemed a great opportunity to widen my horizons. As you can see, one notable outcome of that seemingly illogical career choice five years ago is the book you hold in your hands today. I hope this small body of work goes on to prove worthy of your expectations and also of all the effort that went into it. Because, behind the scenes, there is a rather interesting story to relate—about its backdrop, intertwined with a small slice of modern PoE history, punctuated by a rather res- tive search for our roots and our true heroes, one that takes us back almost two centuries

    标签: Ethernet Power Over

    上传时间: 2020-06-07

    上传用户:shancjb

  • POWERHVMOS_Devices_Compact_Modeling

    The continuous progress in modern power device technology is increasingly supported by power-specific modeling methodologies and dedicated simulation tools. These enable the detailed analysis of operational principles on the the device and on the system level; in particular, they allow the designer to perform trade- off studies by investigating the operation of competing design variants in a very early stage of the development process. Furthermore, using predictive computer simulation makes it possible to analyze the device and system behavior not only under regularoperatingconditions, but also at the rim of the safe-operatingarea and beyond of it, where destructive processes occur that limit the lifetime of a power system.

    标签: POWERHVMOS_Devices_Compact_Modeli ng

    上传时间: 2020-06-07

    上传用户:shancjb

  • Switch-Mode Power Supply Simulation

    Thepredecessorvolumeofthisbookwaspublishedin1996.Intheyears since then, some things have changed and some have not. Two of the things that have not changed are the desire for better models and faster simulations. I performed the original simulations on my “hyperfast” 133-MHz computer! At the time, I thought if I could just getafastercomputer,allofourSPICEproblemswouldbehistory,right? TodayIamsimulatingonacomputerthathasa2.6-GHzprocessorwith 512 MB of RAM, and I would still say that simulations run too slow. The computer technology has evolved, but so have the models. In 1996 wewereperformingsimulationson100-kHzpowerconverters,whereas today I routinely see 1- and 2-MHz power converters.

    标签: Switch-Mode Simulation Supply Power

    上传时间: 2020-06-07

    上传用户:shancjb

  • Computational+RFID

    Sensors are points ofcontact betweenthe material world ofatoms, mass, andenergy and the seemingly immaterial world of information, computation, and cognition. Linking these two domains more tightly yields all sorts of practical benefits, such as improvedinputdevicesforcomputers,moreeffectivemedicaldevices(implantedor worn), more precise agricultural operations, better monitored buildings or bridges, more secure payment systems, and more reliable sensor–actuator control systems. There are many settings in which tighter coupling between digital and physical planes can enhance safety, security, performance, and reliability.

    标签: Computational RFID

    上传时间: 2020-06-08

    上传用户:shancjb

  • Digital+Signal+Processing+for+RFID

    Identification is pervasive nowadays in daily life due to many complicated activities such as bank and library card reading, asset tracking, toll collecting, restricted access to sensitive data and procedures and target identification. This kind of task can be realized by passwords, bio- metric data such as fingerprints, barcode, optical character recognition, smart cards and radar. Radiofrequencyidentification(RFID)isatechniquetoidentifyobjectsbyusingradiosystems. It is a contactless, usually short distance, wireless data transmission and reception technique for identification of objects. An RFID system consists of two components: the tag (also called transponder) and the reader (also called interrogator).

    标签: Processing Digital Signal RFID for

    上传时间: 2020-06-08

    上传用户:shancjb

  • RFID_-_A_Guide_to_Radio_Frequency_IDentification

    Radio frequency identifi cation (RFID) technology is a wireless communication technology that enables users to uniquely identify tagged objects or people. RFID is rapidly becoming a cost-effective technology. This is in large part due to the efforts of Wal-Mart and the Department of Defense (DoD) to incorporate RFID technology into their supply chains. In 2003, with the aim of enabling pallet-level tracking of inventory, Wal-Mart issued an RFID mandate requiring its top suppliers to begin tagging pallets and cases, with Electronic Product Code (EPC) labels. The DoD quickly followed suit and issued the same mandate to its top 100 suppliers. This drive to incorporate RFID technology into their supply chains is motivated by the increased ship- ping, receiving and stocking effi ciency and the decreased costs of labor, storage, and product loss that pallet-level visibility of inventory can offer.

    标签: A_Guide_to_Radio_Frequency_IDenti fication RFID

    上传时间: 2020-06-08

    上传用户:shancjb

  • RFID+Essentials

    LIKE SO MANY OTHERS , THIS BOOK WAS WRITTEN BECAUSE WE COULDN ’ T FIND ONE LIKE IT . We needed something to hand to all of those people who have come to us asking for “a good book to read on RFID.” When we looked for candidates we found some great books, but most were aimed at electrical engineers or top-level managers, with very little for those of us who are in between. This book is for developers, system and software architects, and project managers, as well as students and professionals in all of the industries impacted by Radio Frequency Identification (RFID) who want to understand how this technology works. As the title suggests, this book is about RFID in general and not just the most recent developments; however, because so much is going on in the area of RFID for the supply chain and especially the Electronic Product Code (EPC), we have devoted consider- able space to these topics. Regardless of the type of RFID work you may be doing, we think you will find something useful here.

    标签: Essentials RFID

    上传时间: 2020-06-08

    上传用户:shancjb

  • RFID-WSN+Integrated+Architecture

    Radio frequency identification (RFID) and Wireless sensor networks (WSN) are the two key wireless technologies that have diversified applications in the present and the upcoming systems in this area. RFID is a wireless automated recognition technology which is primarily used to recognize objects or to follow their posi- tion without providing any sign about the physical form of the substance. On the other hand, WSN not only offers information about the state of the substance and environment but also enables multi-hop wireless communications.

    标签: Architecture Integrated RFID-WSN

    上传时间: 2020-06-08

    上传用户:shancjb