IEEE Recommended Practice for Powering and Grounding Electronic Equipment
Author :
Publisher :
Page : pages
File Size : 36,53 MB
Release : 2006
Category :
ISBN :
Author :
Publisher :
Page : pages
File Size : 36,53 MB
Release : 2006
Category :
ISBN :
Author : Institute of Electrical and Electronics Engineers
Publisher : Institute of Electrical & Electronics Engineers(IEEE)
Page : 776 pages
File Size : 19,31 MB
Release : 1994
Category : House & Home
ISBN :
A thorough analysis of basic electrical-systems considerations is presented. Guidance is provided in design, construction, and continuity of an overall system to achieve safety of life and preservation of property; reliability; simplicity of operation; voltage regulation in the utilization of equipment within the tolerance limits under all load conditions; care and maintenance; and flexibility to permit development and expansion. Recommendations are made regarding system planning; voltage considerations; surge voltage protection; system protective devices; fault calculations; grounding; power switching, transformation, and motor-control apparatus; instruments and meters; cable systems; busways; electrical energy conservation; and cost estimation.
Author : Institute of Electrical and Electronics Engineers
Publisher :
Page : 44 pages
File Size : 30,19 MB
Release : 1998
Category : Computers
ISBN :
The content and qualities of a good software requirements specification (SRS) are described and several sample SRS outlines are presented. This recommended practice is aimed at specifying requirements of software to be developed but also can be applied to assist in the selection of in-house and commercial software products. Guidelines for compliance with IEEE/EIA 1207.1-1997 are also provided.
Author : IEEE Industry Applications Society. Power Systems Engineering Committee
Publisher : Inst of Elect & Electronic
Page : 234 pages
File Size : 22,90 MB
Release : 1992
Category : Electric currants
ISBN : 9781559371414
The problems of system grounding, that is, connection to ground of neutral, of the corner of the delta, or of the midtap of one phase, are covered. The advantages and disadvantages of grounded versus ungrounded systems are discussed. Information is given on how to ground the system, where the system should be grounded, and how to select equipment for the grounding of the neutral circuits. Connecting the frames and enclosures of electric apparatus, such as motors, switchgear, transformers, buses, cables conduits, building frames, and portable equipment, to a ground system is addressed. The fundamentals of making the interconnection or ground-conductor system between electric equipment and the ground rods, water pipes, etc. are outlined. The problems of static electricity(how it is generated, what processes may produce it, how it is measured, and what should be done to prevent its generation or to drain the static charges to earth to prevent sparking(are treated. Methods of protecting structures against the effects of lightning are also covered. Obtaining a low-resistance connection to the earth, use of ground rods, connections to water pipes, etc, are discussed. A separate chapter on sensitive electronic equipment is included.
Author :
Publisher :
Page : 81 pages
File Size : 14,28 MB
Release : 2009
Category : Electric power distribution
ISBN : 9780738159409
Abstract: This recommended practice encompasses the monitoring of electrical characteristics of single-phase and polyphase ac power systems. It includes consistent descriptions of conducted electromagnetic phenomena occurring on power systems. This recommended practice describes nominal conditions and deviations from these nominal conditions that may originate within the source of supply or load equipment or may originate from interactions between the source and the load. Also, this recommended practice discusses power quality monitoring devices, application techniques, and the interpretation of monitoring results. Keywords: assessment, compatibility, dip, distortion, electromagnetic phenomena, harmonics, imbalance, instruments, monitoring, power quality, rms variation, sag, swell, transient, unbalance.
Author : Chwan-Hwa (John) Wu
Publisher : CRC Press
Page : 1373 pages
File Size : 14,40 MB
Release : 2016-04-19
Category : Computers
ISBN : 1466572140
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effective
Author :
Publisher :
Page : pages
File Size : 42,68 MB
Release : 2007
Category :
ISBN :
Author : Murali Chemuturi
Publisher : Springer Science & Business Media
Page : 275 pages
File Size : 21,88 MB
Release : 2012-09-26
Category : Computers
ISBN : 1461453771
Requirements Engineering and Management for Software Development Projects presents a complete guide on requirements for software development including engineering, computer science and management activities. It is the first book to cover all aspects of requirements management in software development projects. This book introduces the understanding of the requirements, elicitation and gathering, requirements analysis, verification and validation of the requirements, establishment of requirements, different methodologies in brief, requirements traceability and change management among other topics. The best practices, pitfalls, and metrics used for efficient software requirements management are also covered. Intended for the professional market, including software engineers, programmers, designers and researchers, this book is also suitable for advanced-level students in computer science or engineering courses as a textbook or reference.
Author : Guang-Zhong Yang
Publisher : Springer
Page : 572 pages
File Size : 48,62 MB
Release : 2014-04-16
Category : Computers
ISBN : 1447163745
The last decade has witnessed a rapid surge of interest in new sensing and monitoring devices for wellbeing and healthcare. One key development in this area is wireless, wearable and implantable in vivo monitoring and intervention. A myriad of platforms are now available from both academic institutions and commercial organisations. They permit the management of patients with both acute and chronic symptoms, including diabetes, cardiovascular diseases, treatment of epilepsy and other debilitating neurological disorders. Despite extensive developments in sensing technologies, there are significant research issues related to system integration, sensor miniaturisation, low-power sensor interface, wireless telemetry and signal processing. In the 2nd edition of this popular and authoritative reference on Body Sensor Networks (BSN), major topics related to the latest technological developments and potential clinical applications are discussed, with contents covering. Biosensor Design, Interfacing and Nanotechnology Wireless Communication and Network Topologies Communication Protocols and Standards Energy Harvesting and Power Delivery Ultra-low Power Bio-inspired Processing Multi-sensor Fusion and Context Aware Sensing Autonomic Sensing Wearable, Ingestible Sensor Integration and Exemplar Applications System Integration and Wireless Sensor Microsystems The book also provides a comprehensive review of the current wireless sensor development platforms and a step-by-step guide to developing your own BSN applications through the use of the BSN development kit.
Author : Tyson T. Brooks
Publisher : John Wiley & Sons
Page : 533 pages
File Size : 37,40 MB
Release : 2017-01-04
Category : Computers
ISBN : 1119193869
Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advanced concepts necessary to grasp current IA issues, challenges, and solutions for the IoT. The future trends in IoT infrastructures, architectures and applications are also examined. Other topics discussed include the IA protection of IoT systems and information being stored, processed or transmitted from unauthorized access or modification of machine-2-machine (M2M) devices, radio-frequency identification (RFID) networks, wireless sensor networks, smart grids, and supervisory control and data acquisition (SCADA) systems. The book also discusses IA measures necessary to detect, protect, and defend IoT information and networks/systems to ensure their availability, integrity, authentication, confidentially, and non-repudiation. Discusses current research and emerging trends in IA theory, applications, architecture and information security in the IoT based on theoretical aspects and studies of practical applications Aids readers in understanding how to design and build cyber-assurance into the IoT Exposes engineers and designers to new strategies and emerging standards, and promotes active development of cyber-assurance Covers challenging issues as well as potential solutions, encouraging discussion and debate amongst those in the field Cyber-Assurance for the Internet of Things is written for researchers and professionals working in the field of wireless technologies, information security architecture, and security system design. This book will also serve as a reference for professors and students involved in IA and IoT networking. Tyson T. Brooks is an Adjunct Professor in the School of Information Studies at Syracuse University; he also works with the Center for Information and Systems Assurance and Trust (CISAT) at Syracuse University, and is an information security technologist and science-practitioner. Dr. Brooks is the founder/Editor-in-Chief of the International Journal of Internet of Things and Cyber-Assurance, an associate editor for the Journal of Enterprise Architecture, the International Journal of Cloud Computing and Services Science, and the International Journal of Information and Network Security.