Understanding the settlement process of Cr in marine bay is essential to pollution control and environmental remediation. Jiaozhou Bay is a semi-closed bay located in Shandong Province, China. this paper analyzed the ...
详细信息
Understanding the settlement process of Cr in marine bay is essential to pollution control and environmental remediation. Jiaozhou Bay is a semi-closed bay located in Shandong Province, China. this paper analyzed the seasonal variations of Cr in bottom waters, and identified the settlement process. Results showed that Cr contents in bottom waters in spring, summer and autumn were 0.06-3.78 μg L, 0.03-2.11 μg L and 0.27-1.58 μg L, respectively, indicating order of autumn > summer > spring. By means of the settlement process, there were four high Cr content regions in bottom waters of Jiaozhou Bay, i.e., 1) coastal waters in the west of the bay, 2) estuary of rivers in the east of the bay, 3) the center of the bay, and 4) the bay mouth. the input of Cr and the geomorphology of the bay were the mainly determining the settlement process of Cr, leading to the high Cr content regions mentioned above. Cr in surface waters was rapidly settling to bottom waters, and was accumulating in the bottom.
the electric energy system is changing more and more into a Smart Grid. A key technology in order to transform the actual grid is the information and communication technology. this means that advanced management, auto...
详细信息
ISBN:
(纸本)9781467324199
the electric energy system is changing more and more into a Smart Grid. A key technology in order to transform the actual grid is the information and communication technology. this means that advanced management, automation, control and communication concepts and systems have to be developed in order to cope with changing and challenging future requirements in the intelligent grid;especially the large-scale integration of distributed energy systems and electric vehicles. As a result of this trend, the future grid will consist of a huge number of intelligent electronic devices in order to manage the distributed and complex nature of Smart Girds. In order to guarantee a high level of interoperability, which is a major requirement for Smart Grids and its related components and devices, the international Electrotechnical Commission has introduced the IEC 61850 standard for power utility automation. Since it covers only interoperability and communication issues, a proper design, modeling and implementation approach is required. the main aim of this paper therefore is to discuss the usage of IEC 61850 together withthe IEC 61499 reference model for distributed automation and the development of a related IEC 61499 Compliance Profile for Smart Grids.
the Fifthinternationalconference on Mechatronics (ICOM2013), took place in Kuala Lumpur Malaysia from 2–4 July 2013. the biannual conference which started in 2001 is regularly organized by Faculty of Engineering, I...
the Fifthinternationalconference on Mechatronics (ICOM2013), took place in Kuala Lumpur Malaysia from 2–4 July 2013. the biannual conference which started in 2001 is regularly organized by Faculty of Engineering, international Islamic University Malaysia (IIUM) withthe aims to serve as a platform for exchange of ideas on advances of in mechatronics and their applications as well as to foster research and worldwide collaboration. the theme for the 2013 conference was 'Mechatronics: Sustainable Development through Innovative Solutions'. the ICOM 2013 conference consisted of Keynote Speeches (5) and oral contributions (150). the topics of the conference were: Mechatronic systems and Applications Intelligent Systems control and Instrumentation Signal and Image Processing Machine Vision robotics and automation Manufacturing Mechatronics Green Mechatronics Mechatronic Education Smart Materials and Structures Active Vibration control Computer and Information Technology MEMS and NEMS Biomechatronics and Rehabilitation Engineering Autonomous Systems Energy and Sustainability Transportation System It is our great pleasure to present this volume of IOP conference Series: Materials Science and Engineering (MSE) to the scientific community to promote further research in these areas. We believe that this volume will be both an excellent source of scientific material in the fast evolving fields that were covered by ICOM 2013. We thank the authors for their enthusiastic and high-grade contributions. We would also like to express our gratitude to the Organizing Committee, the Institutions and Sponsors and everyone who contributed to this conferencethrough their supports and invaluable efforts. Editors Amir A Shafie aashafie@*** Raisuddin Khan raisuddin@*** Mahbubur Rashid mahbub@*** Department of Mechatronics, international Islamic University Malaysia (IIUM), Kuala Lumpur Malaysia Organizing Committee Md Raisuddin Khan Md Mozasser Rahman Shahrul Naim Side
Keynote Speakers 1. Prof. Dr Igor Kotenko, St. Petersburg Institute for informatics and automation of Russian Academy of Sciences (SPIIRAS), Russian Federation Title: Visual Analytics for Cyber Security: Mathematical ...
Keynote Speakers 1. Prof. Dr Igor Kotenko, St. Petersburg Institute for informatics and automation of Russian Academy of Sciences (SPIIRAS), Russian Federation Title: Visual Analytics for Cyber Security: Mathematical Models, Techniques and Practical Solutions In this talk visual analytics models, techniques and practical solutions for visualization and subsequent analysis in critical operational domains on the example of cyber security situation assessment will be considered. Methods of visual analytics can significantly improve efficiency when working with big data, as they combine the power of intelligent data processing methods, and particularities of the human visual perception of the information. In this talk we analyze existing methods of visual data analysis to solve various problems of protection against cyber attacks. the effectiveness of visual analysis is demonstrated by the example of existing and developed by the authors techniques and tools of visual analytics, including areas of network perimeter monitoring, policy assessment, vulnerability assessment, traffic analysis, attack detection, security metrics representation, fraud investigation, etc. We consider different visual models such as matrices, graphs, histograms, treemaps, spiral view, starburst, clock view, 3D scatter plots, 3D visualization, metaphoric host behavior, etc. the talk discusses a visual analytics technique implemented for displaying a set of security metrics used to assess overall computer network security status and evaluate the efficiency of protection mechanisms. the technique can assist in solving such security tasks which are important for security information and event management systems. the approach suggested is suitable for displaying security metrics of large networks and support historical analysis of the data. To demonstrate and evaluate the usefulness of the proposed technique we implemented a use case corresponding to the Olympic Games scenario and different ways of c
暂无评论