Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher veröffentlicht von Self Publisher

Filter
Filter
Ordnen nachSortieren Beliebt
  • von Kalra Meenu
    32,00 €

    "DURABILITY OF CONCRETE MADE FROM BLENDED CEMENT" is a comprehensive book that explores the performance and long-term durability of concrete structures produced using blended cement. Blended cement, which combines Portland cement with supplementary cementitious materials (SCMs), offers numerous advantages in terms of strength, durability, and sustainability. This book serves as an essential guide for engineers, researchers, and concrete practitioners seeking to understand and optimize the durability of blended cement concrete.The book begins by providing a thorough overview of blended cement and its constituents, including various types of SCMs such as fly ash, slag, silica fume, and others. It discusses the chemical and physical properties of these materials, their effects on fresh and hardened concrete, and their contributions to the durability aspects of concrete structures.One of the central themes of this book is the examination of the durability mechanisms of blended cement concrete. It delves into topics such as resistance to chloride penetration, sulfate attack, alkali-silica reaction, freeze-thaw cycles, carbonation, and corrosion of reinforcing steel. Through detailed discussions and case studies, the authors shed light on the performance of blended cement concrete in challenging environmental conditions, and the strategies for enhancing its resistance to deterioration.Furthermore, "Durability of Concrete Made from Blended Cement" provides insights into the optimization of concrete mixtures using blended cement. It discusses mixture proportioning, selection of SCMs, and the influence of factors such as water-to-cement ratio, curing methods, and supplementary admixtures on the durability characteristics of concrete. The book also emphasizes the importance of proper quality control and testing procedures to ensure the desired performance and durability of blended cement concrete.In addition, the book explores the sustainability aspects of blended cement concrete, including the reduction of carbon dioxide emissions and the utilization of industrial by-products. It discusses the environmental benefits of using SCMs, the life-cycle assessment of blended cement concrete, and the role of sustainable construction practices in achieving resilient and durable structures."DURABILITY OF CONCRETE MADE FROM BLENDED CEMENT" is a valuable resource for professionals and researchers involved in the design, construction, and maintenance of concrete structures. It offers practical insights, technical guidance, and up-to-date research findings to aid in the development of durable, sustainable, and high-performance concrete. By understanding the durability mechanisms and optimization strategies for blended cement concrete, readers will be equipped with the knowledge to create long-lasting structures that can withstand the challenges of time and environment.

  • von Avijit Sahay
    31,00 €

    Multifaceted Impacts of Rivers on the Land" is a comprehensive exploration of the intricate relationship between rivers and the terrestrial environment. This enlightening book delves into the diverse ways in which rivers shape and influence the land they traverse, leaving an indelible mark on our planet.Drawing on the expertise of renowned geographers, hydrologists, ecologists, and environmental scientists, this book offers a captivating journey into the myriad impacts of rivers on the terrestrial landscape. It combines scientific research, case studies, and captivating narratives to provide a holistic understanding of the multifaceted nature of river-land interactions.The book begins by elucidating the fundamental processes that shape rivers and their geological formations. It explores the transformative power of rivers as they erode, transport, and deposit sediments, forging intricate networks of channels and floodplains. The dynamic interplay between rivers and the land unveils captivating insights into the evolution of landscapes over time.Furthermore, the book delves into the vital role of rivers as conduits for water, nutrients, and sediment, shaping ecosystems and supporting a rich diversity of plant and animal life. It examines how riverine ecosystems, from headwaters to deltas, create unique habitats and sustain intricate food webs. Additionally, the text highlights the complex interdependencies between riverine and terrestrial ecosystems, revealing the profound influence rivers exert on land-based ecological processes.The book also addresses the socio-economic significance of rivers as lifelines for human civilizations. It explores the historical importance of rivers for settlement, trade, and cultural development, shedding light on the deep-rooted connections between human societies and riverine landscapes. Moreover, it examines the challenges and opportunities presented by river management, including flood control, water resource allocation, and the preservation of ecological integrity.Through its interdisciplinary approach, "Multifaceted Impacts of Rivers on the Land" bridges the gap between scientific research and public awareness. It presents a compelling case for understanding and appreciating the profound impacts of rivers on the land, advocating for sustainable management practices and responsible stewardship of these invaluable natural resources.Whether you are a student, researcher, environmentalist, or simply intrigued by the wonders of nature, this book will captivate your imagination and deepen your understanding of the intricate relationships between rivers and the land they shape. It serves as an invaluable resource for anyone seeking to explore the profound significance of rivers in our world today.

  • von Jagan S
    33,00 €

    "Concrete Prepared with Bio-Deposited Aggregates" is an insightful and comprehensive book that explores the innovative and sustainable use of bio-deposited aggregates in concrete production. Authored by leading experts in the field, this book serves as a valuable resource for researchers, engineers, architects, and students interested in sustainable construction practices and environmentally friendly materials.The book delves into the concept of bio-deposited aggregates and their potential to revolutionize the construction industry. It provides a detailed overview of the various biological sources that can be utilized for aggregate formation, including bacteria, fungi, algae, and plants. The authors discuss the underlying processes involved in the bio-deposition of aggregates and highlight the advantages they offer over traditional natural aggregates.Readers will gain a deep understanding of the environmental benefits associated with using bio-deposited aggregates. The book explores how this alternative approach reduces the ecological footprint of construction activities by minimizing the need for resource-intensive mining operations. It examines the sustainable methods employed in the production of bio-deposited aggregates, emphasizing the importance of conservation, energy efficiency, and waste reduction.One of the key focuses of the book is the impact of bio-deposited aggregates on the properties of concrete. It provides a comprehensive analysis of the mechanical, physical, and chemical characteristics of concrete prepared with these aggregates. The authors present case studies and experimental results to demonstrate the enhanced performance of bio-deposited aggregate concrete in terms of strength, durability, and resistance to environmental factors.In addition, the book covers the practical aspects of incorporating bio-deposited aggregates into concrete mixtures. It discusses the compatibility of these aggregates with different types of cement, their proportioning, and the influence of various factors, such as curing conditions and admixtures, on the overall performance of the concrete. The authors also address the challenges and limitations associated with the implementation of bio-deposited aggregates in large-scale construction projects."Concrete Prepared with Bio-Deposited Aggregates" combines scientific principles, engineering knowledge, and sustainability considerations to provide a holistic perspective on this emerging field. It offers valuable insights and guidelines for researchers and practitioners seeking to develop more environmentally friendly and high-performance concrete materials. By embracing bio-deposited aggregates, the construction industry can take significant strides towards a greener and more sustainable future

  • von Singh Sukhdev
    32,00 €

    "Biometric Framework Security using Finger Knuckle" is a comprehensive and cutting-edge guide that explores the application of finger knuckle biometrics in building secure and robust biometric authentication systems. Authored by experts in the field of biometrics and security, this book serves as a valuable resource for researchers, practitioners, and security professionals interested in leveraging the unique characteristics of finger knuckle biometrics to enhance the security of authentication systems.In this book, the authors delve into the innovative field of finger knuckle biometrics, which involves capturing and analyzing the unique features present in the finger knuckle region to establish the identity of individuals. They present a detailed analysis of the biometric framework security that can be achieved using finger knuckle traits, offering practical insights into its advantages, challenges, and applications.Introduction to biometric authentication: The authors provide an overview of biometric authentication systems, their significance in enhancing security, and the limitations of traditional biometric modalities. They discuss the need for more robust and secure biometric solutions and introduce finger knuckle biometrics as a promising approach.Finger knuckle biometric framework: The book explores the underlying principles of finger knuckle biometrics, discussing the unique anatomical features of the finger knuckle region and their suitability for biometric identification. It covers image acquisition techniques, feature extraction methods, and matching algorithms specific to finger knuckle biometrics.Security aspects of finger knuckle biometrics: The authors analyze the security aspects of finger knuckle biometrics, including its resistance against spoofing attacks, usability, and privacy considerations. They discuss the advantages of using finger knuckle traits as a biometric identifier and the challenges associated with its implementation.Feature extraction and matching algorithms: The book provides insights into the feature extraction algorithms employed in finger knuckle biometrics, including texture analysis, shape analysis, and ridge-based methods. It also discusses the matching algorithms used to compare and authenticate finger knuckle biometric templates.Performance evaluation and benchmarking: The authors present methodologies for evaluating the performance of finger knuckle biometric systems, including accuracy, robustness, and efficiency metrics. They discuss benchmarking frameworks and datasets to enable fair and comparative assessments of different finger knuckle biometric solutions.Applications of finger knuckle biometrics: The book showcases the diverse applications of finger knuckle biometrics across various domains, such as access control systems, border security, mobile device authentication, and forensic investigations. It highlights the potential of finger knuckle biometrics in enhancing security and convenience in these contexts.Emerging trends and future directions: The authors discuss emerging trends in finger knuckle biometrics, including multimodal fusion, deep learning-based approaches, and fusion with other biometric modalities. They explore the future directions and potential advancements in this field, offering insights into the evolving landscape of biometric security.Throughout the book, the authors provide theoretical explanations, practical guidelines, and case studies to facilitate the understanding and implementation of finger knuckle biometric frameworks. By harnessing the power of finger knuckle biometrics, "Biometric Framework Security using Finger Knuckle" empowers readers to build robust, secure, and efficient biometric authentication systems that leverage the unique characteristics of the finger knuckle region for reliable identity verification and access control.

  • von Maddel M Manisha
    35,00 €

    "Security Management System of Cyber Cafes" is a comprehensive and practical guide that outlines effective strategies and best practices for ensuring the security of cyber cafes. Written by industry experts and cybersecurity professionals, this book serves as a valuable resource for cyber cafe owners, managers, and IT administrators seeking to establish robust security measures and safeguard their customers' digital experiences.In this book, the authors address the unique security challenges faced by cyber cafes, where numerous individuals access public computer terminals and shared networks. They provide a step-by-step approach to implementing a comprehensive security management system that encompasses various aspects of cyber cafe security, including network protection, user authentication, data privacy, content filtering, and incident response.Key topics covered in this book include:Introduction to cyber cafes: The authors provide an overview of cyber cafes, their services, and their importance in providing internet access to the public. They discuss the evolving landscape of cyber threats and the need for robust security measures to protect customers' privacy and prevent malicious activities.Risk assessment and security planning: The book guides cyber cafe owners and managers in conducting a thorough risk assessment to identify potential vulnerabilities and security gaps. It offers practical insights into creating a customized security plan tailored to the specific needs of the cyber cafe environment.Network security: The authors delve into network security considerations, addressing topics such as secure Wi-Fi deployment, firewall configuration, intrusion detection and prevention systems, and network segmentation. They emphasize the importance of protecting the cyber cafe's network infrastructure from unauthorized access and external threats.User authentication and access control: The book explores various methods of user authentication and access control, including password policies, multi-factor authentication, and biometric solutions. It highlights the significance of implementing strong authentication measures to prevent unauthorized access to the cyber cafe's resources.Data privacy and protection: The authors discuss strategies for protecting customer data and ensuring privacy within the cyber cafe environment. They cover topics such as data encryption, secure data storage, and compliance with data protection regulations, guiding cyber cafe owners in establishing robust data privacy practices.Content filtering and parental controls: The book addresses the importance of content filtering and parental control mechanisms in cyber cafes. It explores techniques for blocking access to inappropriate or harmful content, protecting minors, and ensuring a safe browsing environment for all customers.Incident response and incident handling: The authors provide guidelines for establishing an effective incident response plan and implementing incident handling procedures. They discuss incident detection, analysis, containment, and recovery, enabling cyber cafe staff to respond promptly and effectively to security incidents.Training and awareness: The book emphasizes the significance of training cyber cafe staff and raising customer awareness about security best practices. It offers guidance on conducting security awareness programs, educating employees and customers about potential risks, and promoting responsible online behavior.Throughout the book, the authors provide practical tips, case studies, and checklists to assist cyber cafe owners and managers in implementing a comprehensive security management system.

  • von Rana Harshika
    28,00 €

    3C Customized Cascaded Cryptography for Mobile Application" is an authoritative and comprehensive guide that explores the innovative approach of 3C customized cascaded cryptography for securing mobile applications. Authored by experts in the field of cryptography and mobile security, this book serves as a valuable resource for researchers, mobile app developers, and security professionals interested in enhancing the security of mobile applications using advanced cryptographic techniques.In this book, the authors introduce the concept of 3C customized cascaded cryptography, which combines three fundamental cryptographic components-encryption, hashing, and digital signatures-to provide a robust and tailored security solution for mobile applications. They present a detailed analysis of the architecture, algorithms, and implementation strategies for 3C cryptography, offering practical insights into its benefits and applications.Key topics covered in this book include:Introduction to mobile application security: The authors provide an overview of the security challenges faced by mobile applications, including data breaches, unauthorized access, and malicious activities. They discuss the importance of robust cryptographic techniques in ensuring the confidentiality, integrity, and authenticity of mobile app data.Fundamentals of cryptography: The book explores the fundamental cryptographic components of encryption, hashing, and digital signatures. It explains their purpose, algorithms, and their roles in securing mobile application data.Customized cascaded cryptography: The authors introduce the concept of customized cascaded cryptography, which involves combining the three cryptographic components in a tailored manner to suit the specific security requirements of mobile applications. They outline the advantages of this approach and its ability to provide strong and adaptable security measures.Architecture and implementation strategies: The book presents the architectural framework for integrating 3C cryptography into mobile applications. It discusses the design considerations, key management techniques, and implementation strategies for ensuring seamless integration and efficient performance.Security analysis and evaluation: The authors provide a comprehensive security analysis of 3C cryptography, examining its resistance against various attacks and vulnerabilities. They discuss the strengths and limitations of the approach, offering insights into its effectiveness in protecting mobile application data.Real-world applications and case studies: The book includes practical examples and case studies that demonstrate the application of 3C customized cascaded cryptography in different mobile application scenarios. It covers areas such as mobile banking, secure messaging, e-commerce, and data sharing, showcasing the versatility and effectiveness of the approach.Future directions and emerging trends: The authors discuss the future directions and emerging trends in mobile application security and customized cryptography. They explore areas such as post-quantum cryptography, blockchain integration, and secure decentralized applications, providing insights into the evolving landscape of mobile security.Throughout the book, the authors provide theoretical explanations, algorithmic details, and practical implementation guidelines to facilitate the understanding and adoption of 3C customized cascaded cryptography for mobile applications. By leveraging this innovative approach, "3C Customized Cascaded Cryptography for Mobile Application" enables readers to enhance the security posture of their mobile applications and protect sensitive data in an increasingly connected and vulnerable digital environment.

  • von Poornachandran Prabaharan
    33,00 €

    "Scalable Framework for Cyber Threat Situational Awareness" is a comprehensive and practical guide that explores the development and implementation of a scalable framework for achieving effective cyber threat situational awareness. Authored by cybersecurity experts and researchers, this book serves as a valuable resource for security professionals, analysts, and decision-makers seeking to enhance their understanding of cyber threats and improve their response capabilities.In this book, the authors address the critical need for organizations to establish robust situational awareness capabilities to detect, analyze, and respond to cyber threats in real-time. They present a scalable framework that integrates various data sources, analysis techniques, and visualization tools to provide a holistic view of the evolving threat landscape.Key topics covered in this book include:Introduction to cyber threat situational awareness: The authors provide an overview of the concept of cyber threat situational awareness, its importance in modern cybersecurity, and the challenges faced in achieving comprehensive awareness in dynamic and complex environments.Scalable framework architecture: The book presents the architecture of a scalable framework for cyber threat situational awareness. It covers the integration of diverse data sources, including network logs, intrusion detection systems, threat intelligence feeds, and user behavior data. The authors discuss the design principles and components necessary for building a scalable and adaptable framework.Data collection and aggregation: The authors delve into the process of collecting and aggregating data from various sources within the organization and external feeds. They explore techniques for data normalization, filtering, and enrichment to ensure the availability of high-quality data for analysis.Threat detection and analysis: The book covers advanced analytics techniques and algorithms for detecting and analyzing cyber threats. It explores anomaly detection, machine learning, and behavioral analysis approaches to identify patterns, indicators, and potential threats within the data.Visualization and reporting: The authors discuss visualization tools and techniques for presenting cyber threat information in a meaningful and intuitive manner. They highlight the importance of visualizing complex data to aid in decision-making, incident response, and collaboration among security teams.Incident response and mitigation: The book explores strategies for incident response and mitigation based on the insights gained from the cyber threat situational awareness framework. It covers incident triage, prioritization, and response coordination to ensure timely and effective actions against identified threats.Scalability and adaptability: The authors address the scalability and adaptability considerations of the framework, enabling organizations to handle large volumes of data, accommodate evolving threats, and integrate new data sources and analysis techniques.Integration with existing security systems: The book provides guidance on integrating the cyber threat situational awareness framework with existing security systems, such as security information and event management (SIEM) platforms, intrusion detection systems (IDS), and security orchestration, automation, and response (SOAR) tools.Emerging trends and future directions: The authors discuss emerging trends and technologies in cyber threat situational awareness, including threat intelligence sharing, collaborative defense, and leveraging artificial intelligence (AI) and machine learning (ML) for automated threat analysis.

  • von Bagga Rajni
    46,00 €

    "Crime in Cyberspace: An Analytical Study" is a comprehensive and insightful book that delves into the world of cybercrime, providing an in-depth analysis of its various dimensions and implications. Authored by experts in the field of cybersecurity and criminology, this book serves as an essential resource for researchers, law enforcement professionals, policymakers, and anyone interested in understanding and combating cybercrime.In this book, the authors explore the evolving landscape of crime in cyberspace, examining the motivations, methods, and impact of cybercriminal activities. They employ an analytical approach to dissect the complex nature of cybercrime, shedding light on its underlying factors, patterns, and trends. The book covers a wide range of cybercrimes, including hacking, identity theft, fraud, cyberbullying, online harassment, data breaches, and more.Key topics covered in this book include:Introduction to cybercrime: The authors provide an overview of cybercrime, its definitions, and its significance in the digital age. They discuss the unique challenges posed by cybercrime, such as anonymity, global reach, and the rapidly evolving nature of technology.Types of cybercrime: The book explores different categories of cybercrime, offering detailed insights into the various techniques employed by cybercriminals. It covers computer intrusion, phishing, ransomware attacks, social engineering, intellectual property theft, and other prevalent forms of cybercrime.Cybercriminal motivations and profiles: The authors delve into the motivations and characteristics of cybercriminals. They examine factors such as financial gain, ideology, revenge, and thrill-seeking, providing a nuanced understanding of the individuals or groups behind cybercriminal activities.The impact of cybercrime: The book addresses the far-reaching impact of cybercrime on individuals, organizations, and society as a whole. It discusses financial losses, reputational damage, privacy breaches, psychological effects, and the erosion of trust in online environments.Cybercrime investigation and prevention: The authors explore investigative techniques, tools, and strategies employed in cybercrime detection and prevention. They discuss digital forensics, incident response, threat intelligence, and the role of collaboration between law enforcement agencies, private organizations, and international bodies.Legal and policy considerations: The book examines the legal and policy frameworks surrounding cybercrime. It analyzes existing laws, regulations, and international treaties aimed at combating cybercrime, highlighting the challenges and opportunities for effective law enforcement and international cooperation.Emerging trends and future challenges: The authors discuss emerging trends in cybercrime, such as the rise of cryptocurrencies, the Internet of Things (IoT), and artificial intelligence (AI)-based attacks. They also explore the future challenges that law enforcement and cybersecurity professionals may face as technology continues to evolve.Throughout the book, the authors provide real-world examples, case studies, and practical insights to illustrate the complexities of cybercrime and the strategies employed to combat it. By presenting a comprehensive analytical study of crime in cyberspace, this book equips readers with the knowledge and tools necessary to understand, investigate, and mitigate the ever-growing threat of cybercrime in our interconnected digital world.

  • von Padmavathi M S
    34,00 €

    The widespread of using bar codes for most commercial products increased the capabilities of both generating and collecting data. The computerization of business management, government administration, scientific and engineering data management has led to the growth of powerful databases in which analysis is important. For this purpose, data mining emerged aiming to transform the processed data into useful information and knowledge. Data mining is defined as the process of extracting hidden, previously unknown, and potentially useful information from data. The idea is to build machine learning algorithms that sift through databases automatically in order to discover regularities or patterns.

  • von Hussaian Basha Ch
    31,00 €

    A comprehensive analysis of high-efficient maximum power point tracking (MPPT) techniques for solar photovoltaic (PV) grid-connected systems involves a detailed examination and evaluation of various MPPT algorithms and strategies to maximize the power output from PV panels and optimize their performance in grid-connected applications.The analysis begins by reviewing the fundamentals of MPPT and its significance in solar PV systems. It explores the challenges faced in grid-connected systems, such as varying environmental conditions, partial shading, and module mismatch, which affect the PV system's efficiency and power generation. The goal is to identify the most effective MPPT techniques that can address these challenges and enhance the overall system performance.Various MPPT techniques are analyzed, including Perturb and Observe (P&O), Incremental Conductance, Fractional Open Circuit Voltage, and many more. Each technique is assessed based on its ability to accurately track the maximum power point (MPP) under dynamic conditions and its suitability for grid-connected systems. Factors such as tracking speed, accuracy, convergence behavior, and stability are considered to determine the most efficient and reliable MPPT strategy.Additionally, the analysis includes a thorough investigation of the impact of different system parameters and configurations on MPPT performance. Parameters such as PV panel characteristics, converter topologies, control algorithms, and communication interfaces are examined to understand their influence on the effectiveness of MPPT techniques in grid-connected PV systems. The analysis also explores the interactions between MPPT and grid requirements, including voltage and frequency regulations, to ensure seamless integration and compliance with grid standards.Furthermore, performance evaluation and comparison of different MPPT techniques are conducted using simulation models and experimental setups. Various scenarios, including different solar irradiance levels, temperature variations, shading conditions, and module configurations, are considered to assess the techniques' performance under real-world operating conditions. The analysis aims to quantify the efficiency improvements, power extraction gains, and overall system performance achieved by each MPPT technique.The findings of the comprehensive analysis provide valuable insights into the selection and implementation of high-efficient MPPT techniques for solar PV grid-connected systems. They guide system designers and engineers in choosing the most suitable MPPT algorithm based on specific system requirements, thereby enhancing the energy generation efficiency, maximizing the power output, and ensuring optimal utilization of solar energy in grid-connected applications. Ultimately, this analysis contributes to the advancement and optimization of solar PV systems in meeting the growing demand for clean and renewable energy.

  • von Chandra Babu P
    31,00 €

    Performance improvement of maximum power point tracking (MPPT) controllers focuses on enhancing the effectiveness, accuracy, and efficiency of MPPT algorithms and techniques used in photovoltaic (PV) systems. The primary goal is to optimize power extraction from PV panels by continuously tracking and maintaining the system's operation at the maximum power point (MPP) under varying environmental conditions.The performance improvement of MPPT controllers involves several aspects, including algorithm design, control strategies, and system optimization. Researchers and engineers work on developing advanced MPPT algorithms that offer better tracking accuracy, faster response time, and improved stability compared to traditional techniques.One area of focus is algorithm design, where novel MPPT algorithms are developed or existing algorithms are enhanced to overcome limitations and improve performance. These algorithms utilize sensor measurements, such as PV panel voltage, current, and irradiance, to dynamically adjust the operating point of the PV system for maximum power extraction. Advanced techniques, such as adaptive algorithms, fuzzy logic, neural networks, and machine learning, may be employed to optimize the tracking efficiency and adaptability of the MPPT controllers.Another aspect is control strategy improvement, where the control parameters and feedback loops of the MPPT controllers are optimized. This involves carefully tuning the control parameters to ensure stable and efficient operation of the MPPT system. The feedback loops are designed to accurately measure and adjust the system's operating conditions, compensating for variations in solar irradiance, temperature, and load changes. Robust control techniques are implemented to handle uncertainties and disturbances, improving the overall performance of the MPPT controller.System optimization is also crucial for performance improvement. This includes considering factors such as PV panel characteristics, converter topologies, sensor placement, and communication interfaces. Optimizing these system parameters ensures compatibility and efficient operation of the MPPT controllers, leading to improved power extraction and higher energy yield from the PV system.To evaluate the performance improvement of MPPT controllers, simulations and experimental tests are conducted. Various operating conditions, such as different solar irradiance levels, temperature variations, shading effects, and load profiles, are considered to assess the controllers' effectiveness under real-world scenarios. Performance metrics, such as tracking accuracy, convergence speed, energy yield, and power losses, are analyzed to quantify the improvement achieved by the enhanced MPPT controllers.Overall, the performance improvement of MPPT controllers aims to enhance the energy conversion efficiency, increase power output, and maximize the utilization of solar energy in PV systems. It contributes to the advancement of renewable energy technologies, making PV systems more efficient, reliable, and economically viable for a wide range of applications.

  • von Kumar Vipin
    28,00 €

    The design of maximum power point tracking (MPPT) techniques for standalone photovoltaic (PV) systems involves the development and implementation of strategies to optimize the power extraction from PV panels in off-grid or standalone applications. Standalone PV systems are commonly used in remote areas or places without access to the electrical grid, where they provide independent and sustainable power generation.The MPPT design techniques for standalone PV systems aim to address the challenges faced in maximizing the power output in varying environmental conditions, such as changing solar irradiance levels, temperature variations, and shading effects. These techniques focus on accurately tracking and maintaining the PV system's operation at the maximum power point (MPP) under dynamic conditions to ensure efficient energy conversion.There are various MPPT design techniques employed in standalone PV systems. These techniques utilize different control algorithms and strategies to continuously monitor the PV panel's operating conditions and adjust the system's operating parameters for optimal power extraction. Examples of MPPT design techniques include Perturb and Observe (P&O), Incremental Conductance, Fractional Open Circuit Voltage, and Model Predictive Control, among others.The design of MPPT techniques for standalone PV systems involves selecting the most appropriate algorithm based on the specific system requirements and characteristics. Factors such as algorithm complexity, tracking accuracy, convergence speed, stability, and robustness are considered in the selection process. The chosen MPPT technique should be capable of adapting to changing environmental conditions, compensating for PV panel degradation, and providing reliable and efficient operation in standalone applications.The design also encompasses considerations related to hardware implementation, including sensor selection, converter topologies, and control circuitry. Sensors, such as current and voltage sensors, are used to measure the PV panel's electrical parameters, while converters, such as buck, boost, or buck-boost converters, are employed to optimize the power transfer between the PV panel and the load or energy storage system.Furthermore, the design of MPPT techniques for standalone PV systems involves performance evaluation and optimization. Simulation models and experimental setups are used to assess the MPPT technique's performance in various operating conditions and load profiles. The objective is to maximize the energy yield, minimize power losses, and ensure reliable and efficient operation of the standalone PV system.In summary, the design of MPPT techniques for standalone PV systems involves selecting the appropriate control algorithm, optimizing hardware implementation, and evaluating the performance under different operating conditions. These design techniques aim to enhance the energy conversion efficiency, increase the power output, and ensure the reliable and sustainable operation of standalone PV systems in areas without access to the electrical grid.

  • von Gupta Ankur Kumar
    31,00 €

    Performance analysis of maximum power point tracking (MPPT) techniques involves a thorough evaluation and assessment of the effectiveness, accuracy, and efficiency of MPPT algorithms and controllers used in photovoltaic (PV) systems. The primary objective is to analyze the performance of the MPPT techniques in maximizing the power output from PV panels under various operating conditions.The performance analysis of MPPT techniques entails several key aspects. One of the primary focuses is the tracking accuracy of the MPPT algorithms. The analysis examines how well the algorithms track the maximum power point (MPP) of the PV system, considering factors such as solar irradiance variations, temperature fluctuations, and shading effects. The accuracy of the MPPT technique is crucial in ensuring that the PV system operates consistently at its MPP, thereby maximizing power generation.Efficiency analysis is another vital component of the performance assessment. It involves evaluating the energy conversion efficiency of the MPPT techniques and their impact on the overall system efficiency. The analysis considers losses in the conversion process, such as conduction losses, switching losses, and control losses, to quantify the efficiency improvement achieved by the MPPT algorithms. Comparisons are made between different MPPT techniques to identify the most efficient approach.Stability analysis is also an important part of the performance evaluation. The analysis examines the stability of the MPPT controllers under various operating conditions and system parameters. It ensures that the MPPT techniques are robust and capable of maintaining stable operation, even in the presence of disturbances or uncertainties. Stability analysis helps identify any oscillations, instability, or performance degradation that may occur and provides insights for system optimization.Furthermore, the performance analysis of MPPT techniques may involve studying the response time and dynamic behavior of the algorithms. This includes evaluating the speed at which the MPPT technique adapts to changes in solar irradiance or other system parameters. The analysis focuses on the response time and the ability of the MPPT algorithms to quickly and accurately track the MPP, particularly during rapid changes in environmental conditions.To perform the performance analysis, various methodologies are utilized, such as simulations, mathematical modeling, and experimental tests. Simulations allow for the evaluation of different scenarios and operating conditions, providing insights into the performance of the MPPT techniques. Mathematical modeling helps in analyzing the theoretical performance limits and predicting the behavior of the MPPT algorithms. Experimental tests are conducted in real-world PV systems to validate the performance of the MPPT techniques under practical conditions.The findings from the performance analysis of MPPT techniques provide valuable insights into the strengths, weaknesses, and limitations of different algorithms. This analysis guides system designers and engineers in selecting the most suitable MPPT technique for a given PV system and optimizing its performance. By improving the performance of MPPT techniques, PV systems can achieve higher energy yields, maximize power generation, and contribute to more efficient and sustainable use of solar energy.

  • von Puneet Kumar Chaudhary
    29,00 €

    Investigations on automatic maximum power point tracking (MPPT) for single-phase standalone photovoltaic (PV) systems involve in-depth studies and analysis of MPPT algorithms and their application in optimizing the power output of PV systems operating independently from the grid. Standalone PV systems are commonly used in remote areas or off-grid applications to generate electricity from solar energy.The investigations begin by examining the principles of MPPT and the importance of accurate tracking in maximizing the power generation from PV panels. Various MPPT algorithms, such as Perturb and Observe (P&O), Incremental Conductance, and Fractional Open Circuit Voltage, are evaluated and compared in terms of their effectiveness, accuracy, and response time. The focus is on identifying the most suitable algorithm for automatic MPPT control in single-phase standalone PV systems.The investigations also consider the design and implementation aspects of automatic MPPT control in standalone PV systems. Factors such as system architecture, sensor selection, control loop design, and communication interfaces are taken into account to ensure efficient and reliable MPPT operation. Additionally, considerations related to system stability, noise immunity, and anti-islanding protection are addressed to ensure safe and robust operation of the standalone PV system.The performance evaluation of the automatic MPPT algorithms is a crucial part of the investigations. Real-world experiments are conducted under different environmental conditions, including varying solar irradiance levels, temperature changes, and shading effects. The investigations analyze the algorithms' ability to accurately track the maximum power point (MPP) and assess their performance in terms of power extraction efficiency, response time, and tracking accuracy.Furthermore, the investigations explore the impact of system parameters, such as PV panel characteristics, converter topologies, and energy storage systems, on the performance of the automatic MPPT control. The aim is to understand the interactions and dynamics between different components and optimize the system design for improved MPPT performance and overall energy generation.The findings of the investigations provide valuable insights into the automatic MPPT control for single-phase standalone PV systems. They contribute to the development of more efficient and reliable PV systems that can autonomously track and extract the maximum power from solar energy. These investigations also pave the way for advancements in standalone PV system technologies, enabling reliable and sustainable electricity generation in areas without grid access or in off-grid applications.

  • von Bhat Farooq Ahmad
    32,00 €

    Hydrodynamic stability is a fascinating field in the fluid mechanics, that deals with the transition of laminar flow to turbulence. In fact, this field discloses the originofinstabilityandleadstothephysicalmechanism. Italsounveilsavari- ety of complex phenomena on the fluid surface including the emergence of pri- mary and secondary waves and their behaviors in various physical conditions when the controlling flow parameters alter. More specifically, hydrodynamic instability enables us to decipher the rationale of complex waves appeared in different regimes of flow parameter. The study of hydrodynamic instability was initiated in the beginning of 19th century.

  • von Soumyajit Ghosh
    32,00 €

    The sources from which electrical energy is derived are getting exhausted day by day. So, the need has arisen to look for other renewable sources of energy which would meet the increasing demand. This is where the need of employing smart meter in residential houses arises. Smart meter helps householders to understand the pattern of electricity consumption by their houses' appliances and as a result find alternatives to lessen the energy consumption . In the present day a considerable amount of electricity is consumed by the household sector. An awareness among people regarding the consumption pattern will help to reduce electricity consumption . Efficient load monitoring in the metering side of households can improve the household energy management system considerably. In the residential energy monitoring system, the deployment of smart meters will have enormous contribution to the efficient and effective management system of energy. Real-time information, more reliable, secure, about consumers can be accessed by this. Consumers can have information of their energy consumption pattern and thereby use electricity judiciously through the communication between them and utility. The acquisition of data will be faster and more accurate with the concept of smart greed which was not possible earlier on account of lacking real-time information. For collection of real time data residences should be provided with sensors or devices for gathering such information and smart appliances for management and optimization of consumption of energy. Keeping in mind the fact that a smart grid is vital for implementing load monitoring and identification, this chapter deals with the conception regarding smart grid and its effective implementation in residential sector. The identification of loads and its monitoring are also the concerns of this chapter. In recent times, global utility industries are giving much endeavour to address challenges like generation heterogeneity, demand response, reduction in overall emission of carbon and conservation of energy. While conventional power grid, in vogue is unable to address such critical issues, it is expected from smart grid or intelligent grid to cover up the vital deficiency of the power grid used conventionally The rising energy demand and the scarcity of resources have made it extremely important to conserve energy throughout the world. Globally, out of the total energy consumption, consumption of residential energy accounts for a lion's share and it is predicted to rise in the upcoming days. For instance, in the European Union, 40% of the generated electricity is consumed by the residential sector and it is envisaged that the world-wide demand of energy will increase considerably by 2030. In United States too, approximately 35% of the whole energy produced gets consumed by the residential sector. Moreover, this consumption is estimated to rise by 15% by the year 2030 . Apart from energy price hikes and change in climate, the rise in consumption of energy will also affect a country's economy directly. In view of the above, it is very essential to reduce energy consumption, especially at the residential sector, significantly. To achieve this, residential energy consumption monitoring and relaying of data back to the consumers play a significant role.

  • von Sandeep Chawda
    34,00 €

    Load Serving Entity (LSE) is a new player in the electricity market, emerging due to deregulation and restructuring of power supply systems. It supplies electricity to the consumers that do not participate directly in the Wholesale Electricity Market (WEM). It performs the role of intermediator between consumers and generators/ producers of electricity by procuring electricity from WEM and selling it to consumers Electricity procurement incurs cost and electricity selling generates revenue. The difference between revenue and cost is profit. This profit margin is generally narrow . LSE maximizes this difference by minimizing procurement cost and maximizing revenue. Hence, LSE adopts a decision making process for optimal procurement and sale price decisions with an aim to minimize cost and maximize revenue. Evolving competition in the electricity markets comes up with opportunities and challenges for LSEs. Concerns of effective and strategic decision making have been raised to exploit benefits from opportunities while managing/ handling associated challenges. This is driving enormous interest of research community towards strategic decision making.

  • von Amit Jain
    32,00 €

    Resource assessment is the primary and essential exercise towards project evaluation. In renewable energy projects the resource assessment exercise is important because of the intermittent nature of the resource. The maximum possible value of solar radiation on earth is solar constant (i.e. 1367 W/m2 ); which is the part of the energy emitted by the sun per unit time intercepted by a unit area of surface perpendicular to the direction of propagation of the radiation at the earth's mean distance from sun outside the atmosphere. Hence this indicates the maximum level of solar radiation available close to the earth, while as experienced on the earth's surface, the intensity of incident solar radiation varies, due to earth's rotation and variation of distance from the sun throughout the year. The solar radiation intensity at any location varies throughout the year due to variation in solar declination angle, solar hour angle and geographical angles like latitude and longitude. Besides these atmospheric conditions, such as humidity, cloud cover, amount of dust in air etc contribute towards attenuation of solar radiation received on the earth's surface.

  • von Sarwar Md
    32,00 €

    With the advancement of technology as well as population throughout the world, the demand of electricity has increased in last few decades. Globally, the per-capita consumption of electricity, a parameter to gauge the development and economic growth of a country, has increased sharply. The growth in electrical energy consumption has kept the required demand unfulfilled. Although a large amount of electrical energy has been added yearly to the installed capacity, the gap in demand and supply is increasing every year. The growth in demand of electrical energy has been so phenomenal that it exceeds the supply by a handsome margin. The growth and development of generation, transmission and distribution sectors have not kept pace with the demand of electricity. Even the development amongst generation, transmission and distribution has been skewed. Pre-deregulation, all power utilities were owned and managed by government with monopoly in operation. This deteriorated the condition of utility due to various reasons such as mounting losses, corruption, system lethargy, unavailability of financial resources, no thrust for modernization and expansion etc. Also, the utility was unable to meet the increasing demand. The monopoly in its operation also leads to poor service to customers and under utilization of available resources. All these had compelled the government to give a rethink on the existing policies and resulted in the process of deregulating the electricity sector which would introduce the private players in it. This was expected to improve operational efficiency and service quality. As a result, power utilities were unbundled into different independent business entities which are Generation Company (GENCO), Transmission Company (TRANSCO) and Distribution Company (DISCO).

  • von Asha Alexander
    34,00 €

    Cartoons the world over have generated interest to a particular topic through their simple way of putting forth messages across to the public. There are various types of cartoons, animated and two dimensional cartoons. Two dimensional cartoons use visual metaphors in them to help communicate the difficult and uninteresting subjects in a more comprehensive manner with ease. Cartoons are basically more visual in nature and it is this aspect of the cartoons that attracts attention. Visuals are lighter in tone and there is not much of a strain in understanding what is depicted in it. It has attracted the attention of the young and the old alike as it stands out from all the other matters of text, photographs and videos. Cartoons promote participation in discussions by their ability to construct things that are serious in tone to something lighter. They are easy to connect with people and have dealt with political and social issues. Over all, cartoon attract entertain, educate, and arrest the interest of the people. Cartoons are very powerful weapons and they have initiated public debate. Each cartoonist has a peculiar way of portraying the same message. The peculiarity of cartooning becomes the style of the cartoonist. There are various types of cartoons: strip cartoons, editorial cartoons, pocket cartoons and concept cartoons. Strip cartoons have multiply frames and are continuous like a strip. The message is conveyed through the sequence of the continuous frame. One has to follow the sequence of the strip cartoon to understand the message conveyed. There are cartoons that are known as pocket cartoons where a single idea/concept is portrayed. These cartoons are smaller in size compared to the editorial cartoons. Editorial cartoons are cartoons that appear in the editorial page of newspapers and magazines. There are others who just draw cartoons to convey a single concept or a message. They are known as concept cartoons.

  • von Chitra S
    32,00 €

    Cartoons the world over have generated interest to a particular topic through their simple way of putting forth messages across to the public. There are various types of cartoons, animated and two dimensional cartoons. Two dimensional cartoons use visual metaphors in them to help communicate the difficult and uninteresting subjects in a more comprehensive manner with ease. Cartoons are basically more visual in nature and it is this aspect of the cartoons that attracts attention. Visuals are lighter in tone and there is not much of a strain in understanding what is depicted in it. It has attracted the attention of the young and the old alike as it stands out from all the other matters of text, photographs and videos. Cartoons promote participation in discussions by their ability to construct things that are serious in tone to something lighter. They are easy to connect with people and have dealt with political and social issues. Over all, cartoon attract entertain, educate, and arrest the interest of the people. Cartoons are very powerful weapons and they have initiated public debate. Each cartoonist has a peculiar way of portraying the same message. The peculiarity of cartooning becomes the style of the cartoonist. There are various types of cartoons: strip cartoons, editorial cartoons, pocket cartoons and concept cartoons. Strip cartoons have multiply frames and are continuous like a strip. The message is conveyed through the sequence of the continuous frame. One has to follow the sequence of the strip cartoon to understand the message conveyed. There are cartoons that are known as pocket cartoons where a single idea/concept is portrayed. These cartoons are smaller in size compared to the editorial cartoons. Editorial cartoons are cartoons that appear in the editorial page of newspapers and magazines. There are others who just draw cartoons to convey a single concept or a message. They are known as concept cartoons.

  • von Shweta Sharma
    39,00 €

    Cartoons are sketches or portraits that can b¿ pr¿s¿nt¿d in many ways in print or oth¿r m¿dia. Comic strips, animat¿d movi¿s, drawings in t¿xt books, n¿wspap¿rs and magazin¿s ar¿ v¿ry popular among th¿ audi¿nc¿. At pr¿s¿nt, phantom stori¿s ar¿ b¿ing conv¿rt¿d into cartoon strips. Cartoons ar¿ not only m¿ant for kids but ar¿ also targ¿t¿d at an adult audi¿nc¿. Walt Disn¿y was th¿ first to introduc¿ cartoon charact¿rs' in motion for the ¿nt¿rtainment of childr¿n. Such cartoons ar¿ v¿ry common today and may b¿ ¿ducational in natur¿. Cartoonists' poss¿ss v¿ry k¿¿n obs¿rvational skills and d¿pict th¿ soci¿ty through m¿taphors in th¿ir cartoons. Th¿ cartoons may b¿ consid¿r¿d as th¿ artist's tak¿ or comm¿nt on th¿ r¿aliti¿s of th¿ soci¿ty, ¿ncompassing subj¿cts which ar¿ political, administrativ¿, judicial, ¿nvironm¿ntal or ¿conomic in natur¿.

  • von Nafade Surbhi
    39,00 €

    The creative process of Therapeutic Art in the field of caricature and cartoon paves the way and results in an unparalleled comfort and relaxation. Sometimes it is difficult for an individual to laugh genuinely and without any obligation to do so, especially when a person is trapped under the grasp of severe mental illness, and might be insecure or sensitive due to several torments of their lives. Many individuals have found a way and tried to make an attempt to cope with certain confusions around them by binding themselves with piece of art or other forms of visual arts. This confusion can be cured by a sudden appreciation of therapeutic art, which has the tendency of being ridiculous or humorous sometimes.

  • von Sarina
    37,00 €

    Communication of messages can be done verbally or non-verbally. Verbal communication includes oral and written messages and non-verbal communication includes body language, gestures, facial expressions, proximity, etc. Another mean through which messages can be communicated effectively is visual communication. Visual communication ranges from cave paintings to today's new media messages. In early era, people used to draw pictures on walls or on the surface of rocks or in cave using bones. After the usage of bones, people started using stones to draw paintings and then iron tools were developed. Visual communication is considered as more effective than verbal or non-verbal communication because there is no language or geographical barrier.

  • von Hemalatha R
    35,00 €

    It is opined that with the motive of supplying entertainment to home, rather than public places, TV was invented. In the early years TV became the extention of radio programmes. The initial TV personalities were radio stars, who defected to the new medium because of its glamour. News, sports, political events and elections were the major programmes. With TV becoming a household medium, the tilt towards programmes for children and women became prominent. Family entertainment assumed importance. Children and youth are the susceptible demographic sectors of TV. These groups watch TV most and get used / influenced by it. The serious changes in their approach to clothes, concept of beauty and tilt towards particular lifestyle images are due to TV. It reinforces particular patterns of consumption. While young people are attracted by urban and modern lifestyles, the elderly people seek the rural and traditional fare on TV. When it comes to language, English and Hindi dominate the air-waves. Consequently, the other native languages have started borrowing words and expressions from these two languages. A new language carries new ideas, concepts and new value will impact the local or traditional culture. Thus TV has imposed linguistic hegemony.

  • von Shanmuga Mohana S
    37,00 €

    A couple of decades back moms used to remain at their homes and the kids lived in a solid situation under the direction of mother and grandparents. They had adapted great conduct and other virtues from the senior individuals of the family. Kids were associated with numerous physical activities and outdoor exercises that had numerous beneficial outcomes on the brain and the wellbeing of kids. Anyhow, presently kids generally remain in the house without the supervision of guardians or some other gatekeeper. They spent more time with television and it directly affects his physical and mental ability. As they remain at the house, the main way they can engage themselves is TV. Animation programs are more appealing. Kid's shows have influenced the reasoning, and informative capacities of kids. Hence, this research is an attempt to study the influence of cartoon channels on children.

  • von S. Nazim Sha
    40,00 €

    The advancement of animated cool animated film over the world, and its circumstance in our country analysis of the issue. It moreover examines the destinations of the investigation and underlines the degree, restriction, and supports of this exploration and is studied in this section. Educational and engaging cartoon commercials say that a drug can be found in the brains of anintoxicating child, for example. Those works that children see on TV and web cartoon apps will greatly impact them and develop at a much-needed pace over many years. Children emerge as powerful audiences at the age of half-a- year, when children start watching cartoons on TV, and in recent days, children are looking for a new way to find some new information via the web.

  • von Dharmendra Kumar
    39,00 €

    The current study highlights the influence of watching animated cartoon on school students. The study was based on Noida, within the National Capital Region of Delhi. School students between age group of 10 to 15 studying in classes from Vth to XIth grades in secondary schools were studied. The researcher was able to collect data of 300 students aged 10-15 years studying in public and private schools, belonging to different social strata. The researcher has also collected the data of 200 parents to substantiate and enrich the research findings and get their perspective of cartoon watching on students. Several parameters were considered for analysing the data such as gender, time spent on watching, watching behaviour, buying behaviour. Different parameters were taken into consideration while analysing the influence of watching animated cartoon on school students on such as physical, social and emotional development, gender, age, level of education. Previous studies had been done on negative effect of watching television and cartoon. The current study focus on positive effect of watching animated cartoon on school students. The current study indicate that there is significant influence of cartoon networks on school students of specific age groups.

  • von Soujanya K. L. S.
    36,00 €

    Software Configuration Management (SCM) is the discipline which deals with the procedures or methods that involve in controlling the evolution of complex software systems. Software Product Line (SPL) is a family of products that increases reusability, reduces development effort besides increasing productivity. It is the paradigm shift moving from individual products to product lines. The new paradigm facilitates identifying generic solutions, building related products, reusing components to build common solutions. Lessons learned from the SPL helped software industry to adapt more useful industry standards in product line development and configuration. Component-based development is reinforced in SPL. The components which are prefabricated with standards can avoid reinventing the wheel beside positively affecting the timeline and budgets of software development.

  • von Paramvir Singh
    36,00 €

    Measuring the quality of object-oriented software aimed at developing a high quality software product has been one of the most interesting areas of research in the field of software engineering. Software metrics measure different aspects of software complexity and therefore play an important role in analyzing and improving software quality.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.