The book is composed of 12 chapters and three appendices, and can be divided into four parts. The first part includes Chapters 2 to 7, which discuss the concepts, models, methods and data in probabilistic transmission planning. The second part, Chapters 8 to 11, addresses four essential issues in probabilistic transmission planning applications using actual utility systems as examples. Chapter 12, as the third part, focuses on a special issue, i.e. how to deal with uncertainty of data in probabilistic transmission planning. The fourth part consists of three appendices, which provide the basic knowledge in mathematics for probabilistic planning.
Risk Assessment of Power Systems closes the gap between risk theory and real-world application. As a leading authority in power system risk evaluation for more than fifteen years and the author of a considerable number of papers and more than fifty technical reports on power system risk and reliability evaluation, Wenyuan Li is uniquely qualified to present this material. Following the models and methods developed from the author's hands-on experience, readers learn how to evaluate power system risk in planning, design, operations, and maintenance activities to keep risk at targeted levels."--BOOK JACKET.
Port Planning and Management Simulation examines port planning simulation applications, showing how they supports better port decision-making. Using a clear organizational format based on actual port system structure and operation processes, the book provides practical and theoretical insights on port planning and management. The book describes the water, land, collecting and distributing components of the port system, focusing on management, development, and risk mitigation. It examines the key challenges based on discrete system simulation theory that is less affected by local or national regulations. It compares various simulation scenarios for optimal port operational strategy. It quantifies port emissions, analyzes the impact of different reduction strategies, and presents operational strategies for green port planning developmentmand management. Port Planning and Management Simulation provides guidance for carrying out deep analysis in a complex and dynamic system, providing an integrated solution framework based on simulation techniques for improving efficiency and cost savings of the port system. Bridges the gaps between theory, practice and policy Comprehensive, practical and multidisciplinary content Case Studies
China's urbanization has stunned the world in the past two decades- but as the authors of this book explain, the growth is only set to continue. The divide between urban and rural citizens in China implicates every aspect of Chinese life, from education to pollution to healthcare. In this book, one of China's most celebrated academic urbanists and a major urban planner collaborate in laying out and analyzing the problems of China's urban-rural divide, experiences of urbanization, and what the future holds. This book is a must read, not only for the accurate summaries of China's developmental experience it includes, but also for the insights it provides into the mentalities of the government officials and private developers who are creating realities on the ground in Chinese cities.
This book focuses on corporate social responsibility (CSR) records of Chinese oil investments in five Latin American countries: Peru, Ecuador, Argentina, Colombia, and Venezuela. These investments have been spearheaded by China’s national oil companies and their behavior has been scantly studied. The author uses comparative case studies to empirically examine existing theories of CSR. By using oil companies as the basic unit of analysis, this project adds a micro-level dimension to the field of China-Latin America relationship. It is ideal for audiences interested in the political economy of the oil industry, China, Latin America, and corporate social responsibility.
The book is composed of 12 chapters and three appendices, and can be divided into four parts. The first part includes Chapters 2 to 7, which discuss the concepts, models, methods and data in probabilistic transmission planning. The second part, Chapters 8 to 11, addresses four essential issues in probabilistic transmission planning applications using actual utility systems as examples. Chapter 12, as the third part, focuses on a special issue, i.e. how to deal with uncertainty of data in probabilistic transmission planning. The fourth part consists of three appendices, which provide the basic knowledge in mathematics for probabilistic planning.
Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services. The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.
Power system risk assessment is becoming an important and mandatory task in planning, operation, maintenance, and asset management of utilities, particularly under the deregulation environment. This book will provide readers with the tools to solve practical problems using appropriate risk assessment techniques. Both analytical and Monte Carlo evaluation methods are discussed with an emphasis on applied techniques and actual considerations in generation, transmission, substation, and distribution systems.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.