close
1.

図書

図書
Maxim Ryadnov
出版情報: Cambridge : RSC Publishing, c2009  ix, 238 p. ; 24 cm
シリーズ名: RSC nanoscience & nanotechnology ; no.7
所蔵情報: loading…
目次情報: 続きを見る
Introductory Notes / Chapter 1:
Inspiring Hierarchical / 1.1:
Encoding Instructive / 1.2:
Starting Lowest / 1.3:
Picturing Biological / 1.4:
References
Recycling Hereditary / Chapter 2:
Coding Dual / 2.1:
Deoxyribonucleic / 2.1.1:
Building up in Two / 2.1.1.1:
Keeping in Shape / 2.1.1.2:
Priming Topological / 2.1.2:
Resequencing Basic / 2.1.2.1:
Choosing the Fittest / 2.1.2.1.1:
Evolving Diverse / 2.1.2.1.2:
Primary Motifs / 2.1.2.2:
Gluing Universal / 2.1.2.2.1:
Alienating Axial / 2.1.2.2.2:
Fixing Spatial / 2.2:
Hinting Geometric: Secondary Motifs / 2.2.1:
Crossing Double / 2.2.1.1:
Reporting Visible / 2.2.1.1.1:
Translating Symmetrical / 2.2.1.1.2:
Extending Cohesive / 2.2.1.2:
Sharing Mutual / 2.2.1.2.1:
Multiplying Traversal / 2.2.1.2.2:
Tiling Square / 2.2.1.2.3:
Scaffolding Algorithmic / 2.3:
Pursuing Autonomous / 2.3.1:
Lengthening to Shorten / 2.3.1.1:
Gathering to Limit / 2.3.1.2:
Assigning Arbitrary / 2.3.2:
Synchronising Local / 2.3.2.1:
Prescribing General / 2.3.2.2:
Adding up to Third / 2.3.3:
Wrapping to Shut / 2.3.3.1:
Framing to Classify / 2.3.3.2:
Outlook / 2.4:
Recaging Within / Chapter 3:
Enclosing to Deliver / 3.1:
Transporting Foreign / 3.1.1:
Fitting Flat and Straight / 3.1.1.1:
Spiralling Along / 3.1.1.2:
Packing Out and In / 3.1.2:
Spooling Around / 3.1.2.1:
Tunnelling Through
Escaping Walled / 3.1.3:
Capturing On and Off / 3.1.3.1:
Storing Exchangeable / 3.1.3.2:
Reacting Nano / 3.2:
Clustering Spherical / 3.2.1:
Contriving Consistent / 3.2.1.1:
Scaling Hosting / 3.2.1.2:
Following Linear / 3.2.2:
Channelling Inner
Converting Outer
Repairing from Inside / 3.3:
Uninviting Levy / 3.3.1:
Necessitating Exterior / 3.3.2:
Antagonising Dressing / 3.3.2.1:
Renting Occasional / 3.3.2.1.2:
Phasing West / 3.3.2.2:
Facing Concentric / 3.3.2.2.1:
Encircling Between / 3.3.2.2.2:
Singling Out Unique / 3.3.2.2.3:
Sharing the Balance / 3.3.3:
Driving Symmetrical / 3.3.3.1:
Sealing Annular / 3.3.3.2:
Reassembling Multiple / 3.4:
Keeping All in Touch / 4.1:
Unravelling the Essential / 4.1.1:
Winding Three in One / 4.1.1.1:
Aligning Stagger / 4.1.1.2:
Tapering Polar / 4.1.1.3:
Branching and Stretching / 4.1.1.4:
Replicating Apparent / 4.1.2:
Scraping Refusal / 4.1.2.1:
Tempting Compatible / 4.1.2.2:
Likening Synthetic / 4.1.2.3:
Recovering Intelligent / 4.1.2.4:
Restoring Available / 4.2:
Prompting Longitudinal / 4.2.1:
Invoking Granted / 4.2.1.1:
Reposing Modular / 4.3:
Displacing Coil / 4.3.1:
Settling Lateral / 4.3.2:
Bundling Exclusive / 4.3.2.1:
Permitting Distinctive / 4.3.2.2:
Inviting Captive / 4.3.2.3:
Clearing Limiting / 4.3.3:
Equilibrating Transitional / 4.3.3.1:
Extracting Minimal / 4.3.3.2:
Gambling Beyond / 4.4:
Guiding Proliferative / 4.4.1:
Feeding Proximate / 4.4.1.1:
Rooting Renewal / 4.4.1.2:
Accepting Inescapable / 4.4.2:
Patterning Positional / 4.4.2.1:
Relating Interfacial / 4.4.2.2:
Grafting Integral / 4.4.2.3:
Concluding Remarks / 4.5:
Learning Fluent / 5.1:
Parsing Semantic / 5.2:
Drawing Pragmatic / 5.3:
Revealing Contributory / Chapter 6:
Subject Index
Introductory Notes / Chapter 1:
Inspiring Hierarchical / 1.1:
Encoding Instructive / 1.2:
2.

電子ブック

EB
Johann; Engel, Thomas Gasteiger, Thomas Engel, Johann Gasteiger
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2003
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Addresses of the Authors
Introduction / 1:
The Domain of Chemistry / 1.1:
A Chemists Fundamental Questions / 1.2:
The Scope of Chemoinformatics / 1.3:
Learning in Chemoinformatics / 1.4:
Major Tasks / 1.5:
Representation of the Objects / 1.5.1:
Data / 1.5.2:
Learning / 1.5.3:
History of Chemoinformatics / 1.6:
Structure Databases 10 / 1.6.1:
Quantitative Structure--Activity Relationships / 1.6.2:
Molecular Modeling / 1.6.3:
Structure Elucidation / 1.6.4:
Chemical Reactions and Synthesis Design / 1.6.5:
The Scope of this Book / 1.7:
Teaching Chemoinformatics / 1.8:
Representation of Chemical Compounds / 2:
Chemical Nomenclature / 2.1:
Development of Chemical Nomenclature / 2.2.1:
Representation of Chemical Elements / 2.2.2:
Characterization of Elements / 2.2.2.1:
Representation of the Empirical Formulas of (Inorganic) Compounds / 2.2.3:
Present-Day Representation / 2.2.3.1:
Representation of the Empirical Formulas of Organic Compounds / 2.2.4:
Systematic Nomenclature of Inorganic and Organic Compounds / 2.2.4.1:
Line Notations / 2.3:
Wiswesser Line Notation / 2.3.1:
Applications / 2.3.1.1:
ROSDAL / 2.3.2:
The SMILES Coding / 2.3.2.1:
Sybyl Line Notation / 2.3.3.1:
Coding the Constitution / 2.3.4.1:
Graph Theory / 2.4.1:
Basics of Graph Theory / 2.4.1.1:
Matrix Representations / 2.4.2:
Adjacency Matrix / 2.4.2.1:
Distance Matrix / 2.4.2.2:
Atom Connectivity Matrix / 2.4.2.3:
Incidence Matrix / 2.4.2.4:
Bond Matrix / 2.4.2.5:
Connection Table / 2.4.3:
Input and Output of Chemical Structures / 2.4.4:
Standard Structure Exchange Formats / 2.4.5:
Tutorial: Molfiles and SDfiles / 2.4.6:
Structure of a Molfile / 2.4.6.1:
Structure of an SDfile / 2.4.6.2:
Libraries and Toolkits / 2.4.6.3:
Processing Constitutional Information / 2.5:
Ring Perception / 2.5.1:
Minimum Number of Cycles / 2.5.1.1:
All Cycles / 2.5.1.2:
Smallest Fundamental Basis / 2.5.1.3:
Unambiguous and Unique Representations / 2.5.2:
Structure Isomers and Isomorphism / 2.5.2.1:
Canonicalization / 2.5.2.2:
The Morgan Algorithm / 2.5.3:
Tutorial: Morgan Algorithm / 2.5.3.1:
Beyond a Connection Table / 2.6:
Deficiencies in Representing Molecular Structures by a Connection Table / 2.6.1:
Representation of Molecular Structures by Electron Systems / 2.6.2:
General Concepts / 2.6.2.1:
Simple Single and Double Bonds / 2.6.2.2:
Conjugation and Aromaticity / 2.6.2.3:
Orthogonality of ûSystems / 2.6.2.4:
Non-bonding Orbitals / 2.6.2.5:
Charged Species and Radicals / 2.6.2.6:
Ionized States / 2.6.2.7:
Electron-Deficient Compounds / 2.6.2.8:
Organometallic Compounds / 2.6.2.9:
Generation of RAMSES from a VB Representation / 2.6.3:
Special Notations of Chemical Structures / 2.7:
Markush Structures / 2.7.1:
Fragment Coding / 2.7.2:
Fingerprints / 2.7.2.1:
Hashed Fingerprints / 2.7.3.1:
Hash Codes / 2.7.4:
Representation of Stereochemistry / 2.7.4.1:
Representation of Configuration Isomers and Molecular Chirality / 2.8.1:
Detection and Specification of Chirality / 2.8.2.1:
Ordered Lists / 2.8.3:
Rotational Lists / 2.8.4:
Permutation Descriptors / 2.8.5:
Stereochemistry in Molfile and SMILES / 2.8.6:
Stere / 2.8.6.1:
Foreword
Preface
Addresses of the Authors
3.

電子ブック

EB
Hans-Joachim Hubschmann
出版情報: Wiley Online Library - AutoHoldings Books , Weinheim : John Wiley & Sons, Inc., 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Fundamentals / 2:
Sample Preparation / 2.1:
Solid Phase Extraction / 2.1.1:
Solid Phase Microextraction / 2.1.1.1:
Supercritical Fluid Extraction / 2.1.2:
Pressurized Fluid Extraction / 2.1.3:
Online Liquid Chromatography Clean-up / 2.1.4:
Headspace Techniques / 2.1.5:
Static Headspace Technique / 2.1.5.1:
Dynamic Headspace Technique (Purge and Trap) / 2.1.5.2:
Headspace versus Purge and Trap / 2.1.5.3:
Adsorptive Enrichment and Thermodesorption / 2.1.6:
Sample Collection / 2.1.6.1:
Calibration / 2.1.6.2:
Desorption / 2.1.6.3:
Pyrolysis and Thermal Extraction / 2.1.7:
Foil Pyrolysis / 2.1.7.1:
Curie Point Pyrolysis / 2.1.7.2:
Thermal Extraction / 2.1.7.3:
Gas Chromatography / 2.2:
Fast Gas Chromatography / 2.2.1:
Fast Chromatography / 2.2.1.1:
Ultra Fast Chromatography / 2.2.1.2:
Two Dimensional Gas Chromatography / 2.2.2:
Heart Cutting / 2.2.2.1:
Comprehensive GC x GC / 2.2.2.2:
Modulation / 2.2.2.3:
Detection / 2.2.2.4:
Data Handling / 2.2.2.5:
Moving Capillary Stream Switching / 2.2.2.6:
GC/MS Sample Inlet Systems / 2.2.3:
Carrier Gas Regulation / 2.2.3.1:
The Microseal Septum / 2.2.3.2:
Hot Sample Injection / 2.2.3.3:
Cold Injection Systems / 2.2.3.4:
Injection Volumes / 2.2.3.5:
On-column Injection / 2.2.3.6:
Cryofocusing / 2.2.3.7:
Capillary Columns / 2.2.4:
Sample Capacity / 2.2.4.1:
Internal Diameter / 2.2.4.2:
Film Thickness / 2.2.4.3:
Column Length / 2.2.4.4:
Adjusting the Carrier Gas Flow / 2.2.4.5:
Properties of Stationary Phases / 2.2.4.6:
Chromatography Parameters / 2.2.5:
The Chromatogram and its Meaning / 2.2.5.1:
Capacity Factor k' / 2.2.5.2:
Chromatographic Resolution / 2.2.5.3:
Factors Affecting the Resolution / 2.2.5.4:
Maximum Sample Capacity / 2.2.5.5:
Peak Symmetry / 2.2.5.6:
Optimisation of Flow / 2.2.5.7:
Classical Detectors for GC/MS Systems / 2.2.6:
FID / 2.2.6.1:
NPD / 2.2.6.2:
ECD / 2.2.6.3:
PID / 2.2.6.4:
ELCD / 2.2.6.5:
FPD / 2.2.6.6:
PDD / 2.2.6.7:
Connection of Classical Detectors Parallel to the Mass Spectrometer / 2.2.6.8:
Mass Spectrometry / 2.3:
Resolving Power and Resolution in Mass Spectrometry / 2.3.1:
High Resolution / 2.3.1.1:
Unit Mass Resolution / 2.3.1.2:
High and Low Resolution in the Case of Dioxin Analysis / 2.3.1.3:
Time-of-Flight Analyser / 2.3.2:
Isotope Ratio Monitoring GC/MS / 2.3.3:
Ionisation Procedures / 2.3.4:
Electron Impact Ionisation / 2.3.4.1:
Chemical Ionisation / 2.3.4.2:
Measuring Techniques in GC/MS / 2.3.5:
Detection of the Complete Spectrum (Full Scan) / 2.3.5.1:
Recording Individual Masses (SIM/MID) / 2.3.5.2:
High Resolution Accurate Mass MID Data Acquisition / 2.3.5.3:
MS/MS - Tandem Mass Spectrometry / 2.3.6:
Mass Calibration / 2.3.7:
Special Aspects of GC/MS Coupling / 2.4:
Vacuum Systems / 2.4.1:
GC/MS Interface Solutions / 2.4.2:
Open Split Coupling / 2.4.2.1:
Direct Coupling / 2.4.2.2:
Separator Techniques / 2.4.2.3:
References for Chapter 2
Evaluation of GC/MS Analyses / 3:
Display of Chromatograms / 3.1:
Total Ion Current Chromatograms / 3.1.1:
Mass Chromatograms / 3.1.2:
Substance Identification / 3.2:
Extraction of Mass Spectra / 3.2.1:
The Retention Index / 3.2.2:
Libraries of Mass Spectra / 3.2.3:
Universal Mass Spectral Libraries / 3.2.3.1:
Application Libraries of Mass Spectra / 3.2.3.2:
Library Search Procedures / 3.2.4:
The INCOS/NIST Search Procedure / 3.2.4.1:
The PBM Search Procedure / 3.2.4.2:
The SISCOM Procedure / 3.2.4.3:
Interpretation of Mass Spectra / 3.2.5:
Isotope Patterns / 3.2.5.1:
Fragmentation and Rearrangement Reactions / 3.2.5.2:
DMOX Derivatives for Location of Double Bond Positions / 3.2.5.3:
Mass Spectroscopic Features of Selected Substance Classes / 3.2.6:
Volatile Halogenated Hydrocarbons / 3.2.6.1:
Benzene/Toluene/Ethylbenzene/Xylenes (BTEX, Alkylaromatics) / 3.2.6.2:
Polyaromatic Hydrocarbons (PAH) / 3.2.6.3:
Phenols / 3.2.6.4:
Pesticides / 3.2.6.5:
Polychlorinated Biphenyls (PCBs) / 3.2.6.6:
Polychlorinated Dioxins/Furans (PCDDs/PCDFs) / 3.2.6.7:
Drugs / 3.2.6.8:
Explosives / 3.2.6.9:
Chemical Warfare Agents / 3.2.6.10:
Brominated Flame Retardants (BFR) / 3.2.6.11:
Quantitation / 3.3:
Decision Limit / 3.3.1:
Limit of Detection / 3.3.2:
Limit of Quantitation / 3.3.3:
Sensitivity / 3.3.4:
The Calibration Function / 3.3.5:
Quantitation and Standardisation / 3.3.6:
External Standardization / 3.3.6.1:
Internal Standardisation / 3.3.6.2:
The Standard Addition Procedure / 3.3.6.3:
Frequently Occurring Impurities / 3.4:
References for Chapter 3
Applications / 4:
Air Analysis According to EPA Method TO-14 / 4.1:
BTEX Using Headspace GC/MS / 4.2:
Simultaneous Determination of Volatile Halogenated Hydrocarbons and BTEX / 4.3:
Static Headspace Analysis of Volatile Priority Pollutants / 4.4:
MAGIC 60 - Analysis of Volatile Organic Compounds / 4.5:
irm-GC/MS of Volatile Organic Compounds Using Purge and Trap Extraction / 4.6:
Vinyl Chloride in Drinking Water / 4.7:
Chloral Hydrate in Surface Water / 4.8:
Field Analysis of Soil Air / 4.9:
Residual Monomers and Polymerisation Additives / 4.10:
Geosmin and Methylisoborneol in Drinking Water / 4.11:
Substituted Phenols in Drinking Water / 4.12:
GC/MS/MS Target Compound Analysis of Pesticide Residues in Difficult Matrices / 4.13:
Multi-component Pesticide Analysis by MS/MS / 4.14:
Multi-method for the Determination of 239 Pesticides / 4.15:
Nitrophenol Herbicides in Water / 4.16:
Dinitrophenol Herbicides in Water / 4.17:
Hydroxybenzonitrile Herbicides in Drinking Water / 4.18:
Routine Analysis of 24 PAHs in Water and Soil / 4.19:
Fast GC Quantification of 16 EC Priority PAH Components / 4.20:
Analysis of Water Contaminants by On-line SPE-GC/MS / 4.21:
Determination of Polar Aromatic Amines by SPME / 4.22:
Congener Specific Isotope Analysis of Technical PCB Mixtures / 4.23:
Polychlorinated Biphenyls in Indoor Air / 4.24:
Confirmation Analysis of Dioxins and Dioxin-like PCBs / 4.25:
Fast GC Analysis for PCBs / 4.26:
Analysis of Brominated Flame Retardants PBDE / 4.27:
Trace Analysis of BFRs in Waste Water Using SPME-GC/MS/MS / 4.28:
Analysis of Military Waste / 4.29:
Detection of Drugs in Hair / 4.30:
Detection of Morphine Derivatives / 4.31:
Detection of Cannabis Consumption / 4.32:
Analysis of Steroid Hormones Using MS/MS / 4.33:
Determination of Prostaglandins Using MS/MS / 4.34:
Detection of Clenbuterol by CI / 4.35:
General Unknown Toxicological-chemical Analysis / 4.36:
Clofibric Acid in Aquatic Systems / 4.37:
Polycyclic Musks in Waste Water / 4.38:
Identification and Quantification of Trichothecene Mycotoxins / 4.39:
Highly Sensitive Screening and Quantification of Environmental Components Using Chemical Ionisation with Water / 4.40:
Characterization of Natural Waxes by Pyrolysis-GC/MS / 4.41:
Quantitative Determination of Acrylate Copolymer Layers / 4.42:
References for Chapter 4
Glossary / 5:
Subject Index
Introduction / 1:
Fundamentals / 2:
Sample Preparation / 2.1:
4.

図書

図書
Karl Pfleger, Hans H. Maurer, Armin Weber
出版情報: Weinheim : Wiley-VCH, c2007  2 v. ; 29 cm
所蔵情報: loading…
目次情報: 続きを見る
(Methods, Tables) / Volume 1:
Methods
Introduction / 1:
Experimental Section / 2:
Origin and choice of samples / 2.1:
Sample preparation / 2.2:
Standard extraction procedures / 2.2.1:
Standard liquid-liquid extraction (LLE) for plasma, urine or gastric contents (P, U, G) / 2.2.1.1:
STA procedure (hydrolysis, extraction and microwave-assisted acetylation) for urine (U+UHYAC) / 2.2.1.2:
Extraction of urine after cleavage of conjugates by glucuronidase and arylsulfatase (UGLUC) / 2.2.1.3:
Extractive methylation procedure for urine or plasma (UME, PME) / 2.2.1.4:
Solid-phase extraction for plasma or urine (PSPE, USPE) / 2.2.1.5:
LLE of plasma for determination of drugs for brain death diagnosis / 2.2.1.6:
Extraction of ethylene glycol and other glycols from plasma or urine followed by microwave-assisted pivalylation (PEGPIV or UEGPIV) / 2.2.1.7:
Derivatization procedures / 2.2.2:
Acetylation (AC) / 2.2.2.1:
Methylation (ME) / 2.2.2.2:
Ethylation (ET) / 2.2.2.3:
tert.-Butyldimethylsilylation (TBDMS) / 2.2.2.4:
Trimethylsilylation (TMS) / 2.2.2.5:
Trimethylsilylation followed by trifluoroacetylation (TMSTFA) / 2.2.2.6:
Trifluoroacetylation (TFA) / 2.2.2.7:
Pentafluoropropionylation (PFP) / 2.2.2.8:
Pentafluoropropylation (PFPOL) / 2.2.2.9:
Heptafluorobutyrylation (HFB) / 2.2.2.10:
Pivalylation (PIV) / 2.2.2.11:
Heptafluorobutyrylprolylation (HFBP) / 2.2.2.12:
GC-MS Apparatus / 2.3:
Apparatus and operation conditions / 2.3.1:
Quality assurance of the apparatus performance / 2.3.2:
Determination of retention indices / 2.4:
Systematic toxicological analysis (STA) of several classes of drugs and their metabolites by GC-MS / 2.5:
Screening for 200 drugs in blood plasma after LLE / 2.5.1:
Screening for most of the basic and neutral drugs in urine after acid hydrolysis, LLE and acetylation / 2.5.2:
Systematic toxicological analysis procedures for the detection of acidic drugs and/or their metabolites / 2.5.3:
General screening procedure for zwitterionic compounds after SPE and silylation / 2.5.4:
Application of the electronic version of this handbook / 2.6:
Quantitative determination / 2.7:
Correlation between Structure and Fragmentation / 3:
Principle of electron-ionization mass spectrometry (EI-MS) / 3.1:
Correlation between fundamental structures or side chains and fragment ions / 3.2:
Formation of Artifacts / 4:
Artifacts formed by oxidation during extraction with diethyl ether / 4.1:
N-Oxidation of tertiary amines / 4.1.1:
S-Oxidation of phenothiazines / 4.1.2:
Artifacts formed by thermolysis during GC (GC artifact) / 4.2:
Decarboxylation of carboxylic acids / 4.2.1:
Cope elimination of N-oxides (-(CH3)2NOH, -(C2H5)2NOH, -C6H14N2O2) / 4.2.2:
Rearrangement of bis-deethyl flurazepam (-H2O) / 4.2.3:
Elimination of various residues / 4.2.4:
Methylation of carboxylic acids in methanol ((ME), ME in methanol) / 4.2.5:
Formation of formaldehyde adducts using methanol as solvent (GC artifact in methanol) / 4.2.6:
Artifacts formed by thermolysis during GC and during acid hydrolysis (GC artifact, HY artifact) / 4.3:
Dehydration of alcohols (-H2O) / 4.3.1:
Decarbamoylation of carbamates / 4.3.2:
Cleavage of morazone to phenmetrazine / 4.3.3:
Artifacts formed during acid hydrolysis / 4.4:
Cleavage of the ether bridge in beta-blockers and alkanolamine antihistamines (HY) / 4.4.1:
Cleavage of 1,4-benzodiazepines to aminobenzoyl derivatives (HY) / 4.4.2:
Cleavage and rearrangement of N-demethyl metabolites of clobazam to benzimidazole derivatives (HY) / 4.4.3:
Cleavage and rearrangement of bis-deethyl flurazepam (HY -H2O) / 4.4.4:
Cleavage and rearrangement of tetrazepam / 4.4.5:
(Methods, Tables) / Volume 1:
Methods
Introduction / 1:
5.

電子ブック

EB
Anthony Sofronas
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Inc., 2005
所蔵情報: loading…
目次情報: 続きを見る
Preface
Introduction / 1:
Strength of Materials / 2:
Load Calculations / 2.1:
Stress Calculations / 2.2:
Axial / 2.2.1:
Shear / 2.2.2:
Bending / 2.2.3:
Torsional / 2.2.4:
Combined Stresses / 2.2.5:
Thermal Stresses / 2.2.6:
Transient Temperatures and Stresses / 2.2.7:
High Temperature Creep / 2.2.8:
Shell Stresses / 2.2.9:
Piping Thermal Forces, Moments, Frequencies / 2.3:
Piping Failures / 2.3.1:
Allowable and Design Stresses / 2.4:
Fatigue Due to Cyclic Loading / 2.5:
Elongation and Deflection Calculations / 2.6:
Factors of Safety / 2.7:
Case History: Agitator Bearing Loading / 2.8:
Case History: Shaft Failure / 2.9:
Dynamic Loading / 2.10:
Centrifugal Force / 2.10.1:
Inertia's and WR2 / 2.10.2:
Energy Relationships / 2.10.3:
Case History: Centrifuge Bearing Failures / 2.11:
Case History: Bird Impact Force on a Windscreen / 2.12:
Case History: Torsional Impact on a Propeller / 2.13:
Case History: Start-up Torque on a Motor Coupling / 2.14:
Case History: Frictional Clamping Due to Bolting / 2.15:
Case History: Failure of a Connecting Rod in a Race Car / 2.16:
Bolting / 2.17:
Holding Capacity / 2.17.1:
Limiting Torque / 2.17.2:
Bolt Elongation and Relaxation / 2.17.3:
Torquing Methods / 2.17.4:
Fatigue of Bolts / 2.17.5:
Stripping Strength of Threads / 2.17.6:
Case History: A Power Head Gasket Leak / 2.17.7:
Ball and Roller Bearing Life Estimates / 2.18:
Case History: Bearing Life of a Shaft Support / 2.18.1:
Coupling Offset and Bearing Life / 2.18.2:
Hydrodynamic Bearings / 2.19:
Shell and Pad Failures / 2.19.1:
Gears / 2.20:
Gear Acceptability Calculations / 2.20.1:
Case History: Up-Rate Acceptability of a Gear Unit / 2.20.2:
Interference Fits / 2.21:
Keyless Hydraulically Fitted Hubs / 2.21.1:
Case History: Taper Fit Holding Ability / 2.21.2:
Case History: The Flying Hydraulically Fitted Hub / 2.21.3:
Strength of Welds / 2.22:
Fatigue of Welds / 2.23:
Repair of Machinery / 2.24:
Shafts / 2.24.1:
Housing and Cases / 2.24.2:
Gearboxes / 2.24.3:
Sleeve bearings and Bushing Clearances / 2.24.4:
Alignments / 2.24.5:
Acceptable Coupling Offset and Angular Misalignment / 2.24.6:
Vibration Measurements / 2.24.7:
Interpreting Mechanical Failures / 2.25:
Failures with Axial, Bending and Torsional Loading / 2.25.1:
Gear Teeth Failures / 2.25.2:
Spring Failures / 2.25.3:
Bolt Failures / 2.25.4:
Bearing Failures / 2.25.5:
Reading a Bearing / 2.25.6:
Large Gearbox Keyway / Shaft Failures / 2.25.7:
Case History: Sizing a Bushing Running Clearance / 2.26:
Case History: Galling of a Shaft In A Bushing / 2.27:
Case History: Remaining Fatigue Life with Cyclic Stresses / 2.28:
A Procedure for Evaluating Gasket Joints / 2.29:
Gaskets In High Temperature Service / 2.30:
"O" Ring Evaluation / 2.31:
Case History: Gasket Won't Pass Hydrotest / 2.32:
Case History: Heat Exchanger Leak Due to Temperature / 2.33:
Wear of Equipment / 2.34:
Case History: Excessive Wear of a Ball Valve / 2.35:
Vibration Analysis / 3:
Spring /Mass Systems and Resonance / 3.1:
Case History: Critical Speed Problem on Steam Turbine / 3.2:
Determining Vibration Amplitudes / 3.3:
Allowable Levels for X or F at Resonance / 3.3.1:
Case History: Vibratory Torque on Gear of a Ship System / 3.4:
Torsional Vibration / 3.5:
Case History: Torsional Vibration of Motor-Generator-Blower / 3.6:
Vibration Diagnosis and Campbell Diagrams / 3.7:
Case History: The Effect of a Suddenly Applied Torsional Load / 3.8:
Flow Induced Vibrations / 3.9:
Preface
Introduction / 1:
Strength of Materials / 2:
6.

図書

図書
authors, G. Guelachvili, K.Narahari Rao ; editor, G. Guelachvili
出版情報: Berlin ; Tokyo : Springer, c2000  LXXVII, 229 p. ; 28 cm
シリーズ名: Landolt-Börnstein Zahlenwerte und Funktionen aus Naturwissenschaften und Technik, Neue Serie / Gesamtherausgabe, K.-H. Hellwege ; New Series, Group 2 . Molecules and radicals ; v. 20 . Molecular constans : mostly from infrared spectroscopy ; subv. B5
所蔵情報: loading…
目次情報: 続きを見る
CS2 (SCS).
CS2+ (SCS+).
CS2++ (SCS++).
CSe2 (SeCSe).
C2N (CCN).
C2N (CNC).
C2N+ (CCN+).
C2N+ (CNC+).
CS2 (SCS).
CS2+ (SCS+).
CS2++ (SCS++).
7.

図書

図書
Corneliu Constantinescu
出版情報: Amsterdam : Elsevier, 2001  xxi, 597 p. ; 23 cm
シリーズ名: North-Holland mathematical library ; v. 59 . C*-algebras / Corneliu Constantinescu ; v. 2
所蔵情報: loading…
目次情報: 続きを見る
Introduction
Banach Algebras / 2:
Algebras / 2.1:
General Results / 2.1.1:
Invertible Elements / 2.1.2:
The Spectrum / 2.1.3:
Standard Examples / 2.1.4:
Complexification of Algebras / 2.1.5:
Exercises
Normed Algebras / 2.2:
The Standard Examples / 2.2.1:
The Exponential Function and the Neumann Series / 2.2.3:
Invertible Elements of Unital Banach Algebras / 2.2.4:
The Theorems of Riesz and Gelfand / 2.2.5:
Poles of Resolvents / 2.2.6:
Modules / 2.2.7:
Involutive Banach Algebras / 2.3:
Involutive Algebras / 2.3.1:
Sesquilinear Forms / 2.3.2:
Positive Linear Forms / 2.3.4:
The State Space / 2.3.5:
Involutive Modules / 2.3.6:
Gelfand Algebras / 2.4:
The Gelfand Transform / 2.4.1:
Involutive Gelfand Algebras / 2.4.2:
Examples / 2.4.3:
Locally Compact Additive Groups / 2.4.4:
The Fourier Transform / 2.4.5:
Compact Operators / 3:
The General Theory / 3.1:
Fredholm Operators / 3.1.1:
Point Spectrum / 3.1.4:
Spectrum of a Compact Operator / 3.1.5:
Integral Operators / 3.1.6:
Linear Differential Equations / 3.2:
Boundary Value Problems for Differential Equations / 3.2.1:
Supplementary Results / 3.2.2:
Linear Partial Differential Equations / 3.2.3:
Name
Index Subject
Index Symbol
Index
Introduction
Banach Algebras / 2:
Algebras / 2.1:
8.

電子ブック

EB
Kim-Kwang Raymond Choo
出版情報: Springer eBooks Computer Science , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
Computer Security Approach / 1.2.1:
Computational Complexity Approach / 1.2.2:
Research Objectives and Deliverables / 1.2.3:
Structure of Book and Contributions to Knowledge / 1.3:
References
Background Materials / 2:
Mathematical Background / 2.1:
Abstract Algebra and the Main Groups / 2.1.1:
Bilinear Maps from Elliptic Curve Pairings / 2.1.2:
Computational Problems and Assumptions / 2.1.3:
Cryptographic Tools / 2.1.4:
Encryption Schemes: Asymmetric Setting / 2.1.4.1:
Encryption Schemes: Symmetric Setting / 2.1.4.2:
Digital Signature Schemes / 2.1.4.3:
Message Authentication Codes / 2.1.4.4:
Cryptographic Hash Functions / 2.1.4.5:
Random Oracles / 2.1.4.6:
Key Establishment Protocols and their Basis / 2.2:
Protocol Architectures / 2.2.1:
Existing Cryptographic Keys / 2.2.1.1:
Method of Session Key Generation / 2.2.1.2:
Number of Entities / 2.2.1.3:
Protocol Goals and Attacks / 2.2.2:
Protocol Goals / 2.2.2.1:
Additional Security Attributes / 2.2.2.2:
Types of Attacks / 2.2.2.3:
A Need for Rigorous Treatment / 2.2.2.4:
The Computational Complexity Approach / 2.3:
Adversarial Powers / 2.3.1:
Definition of Freshness / 2.3.2:
Definition of Security / 2.3.3:
The Bellare-Rogaway Models / 2.3.4:
The BR93 Model / 2.3.4.1:
The BR95 Model / 2.3.4.2:
The BPR2000 Model / 2.3.4.3:
The Canetti-Krawczyk Model / 2.3.5:
Protocol Security / 2.3.6:
Summary / 2.4:
A Flawed BR95 Partnership Function / 3:
A Flaw in the Security Proof for 3PKD Protocol / 3.1:
The 3PKD Protocol / 3.1.1:
Key Replicating Attack on 3PKD Protocol / 3.1.2:
The Partner Function used in the BR95 Proof / 3.1.3:
A Revised 3PKD Protocol in Bellare-Rogaway Model / 3.2:
Defining SIDs in the 3PKD Protocol / 3.2.1:
An Improved Provably Secure 3PKD Protocol / 3.2.2:
Security Proof for the Improved 3PKD Protocol / 3.2.3:
Adaptive MAC Forger F / 3.2.3.1:
Multiple Eavesdropper Attacker ME / 3.2.3.2:
Conclusion of Proof / 3.2.3.3:
On The Key Sharing Requirement / 3.3:
Bellare-Rogaway 3PKD Protocol in CK2001 Model / 4.1:
New Attack on 3PKD Protocol / 4.1.1:
A New Provably-Secure 3PKD Protocol in CK2001 Model / 4.1.3:
Jeong-Katz-Lee Protocol JP2 / 4.2:
Protocol JP2 / 4.2.1:
New Attack on Protocol JP2 / 4.2.2:
An Improved Protocol JP2 / 4.2.3:
The Key Sharing Requirement / 4.3:
Comparison of Bellare-Rogaway and Canetti-Krawczyk Models / 4.4:
Relating The Notions of Security / 5.1:
Proving BR93 (EA+KE) to BPR2000 (EA+KE) / 5.1.1:
Proof for the key establishment goal / 5.1.1.1:
Proof for the entity authentication goal / 5.1.1.2:
Proving CK2001 to BPR2000 (KE) / 5.1.2:
Proving CK2001 to BR93 (KE) / 5.1.3:
BR93 (KE) to BR95 and BR93 (KE), CK2001 [not left arrow] BR95 / 5.1.4:
BR93 (KE)/CK2001 [not left arrow] BPR2000 (KE) / 5.1.5:
CK2001 [not left arrow] BR93 (EA+KE) / 5.1.6:
BR93 (KE) [not left arrow] CK2001 / 5.1.7:
BPR200 (KE) [not left arrow] BR95 / 5.1.8:
A Drawback in the BPR2000 Model / 5.2:
Case Study: Abdalla-Pointcheval 3PAKE / 5.2.1:
Unknown Key Share Attack on 3PAKE / 5.2.2:
An Extension to the Bellare-Rogaway Model / 5.3:
A Provably-Secure Revised Protocol of Boyd / 6.1:
Secure Authenticated Encryption Schemes / 6.1.1:
Revised Protocol of Boyd / 6.1.2:
Security Proof / 6.1.3:
Integrity attacker / 6.1.3.1:
Confidentiality attacker / 6.1.3.2:
Conclusion of Security Proof / 6.1.3.3:
An Extension to the BR93 Model / 6.2:
An Efficient Protocol in Extended Model / 6.3:
An Efficient Protocol / 6.3.1:
Integrity Breaker / 6.3.2:
Confidentiality Breaker / 6.3.2.2:
Comparative Security and Efficiency / 6.3.2.3:
A Proof of Revised Yahalom Protocol / 6.5:
The Yahalom Protocol and its Simplified Version / 7.1:
A New Provably-Secure Protocol / 7.2:
Proof for Protocol 7.2 / 7.2.1:
Conclusion of Proof for Theorem 7.2.1 / 7.2.1.1:
An Extension to Protocol 7.2 / 7.2.2:
Partnering Mechanism: A Brief Discussion / 7.3:
Errors in Computational Complexity Proofs for Protocols / 7.4:
Boyd-Gonzalez Nieto Protocol / 8.1:
Unknown Key Share Attack on Protocol / 8.1.1:
An Improved Conference Key Agreement Protocol / 8.1.2:
Limitations of Existing Proof / 8.1.3:
Jakobsson-Pointcheval MAKEP / 8.2:
Unknown Key Share Attack on JP-MAKEP / 8.2.1:
Flaws in Existing Security Proof for JP-MAKEP / 8.2.2:
Wong-Chan MAKEP / 8.3:
A New Attack on WC-MAKEP / 8.3.1:
Preventing the Attack / 8.3.2:
Flaws in Existing Security Proof for WC-MAKEP / 8.3.3:
An MT-Authenticator / 8.4:
Encryption-Based MT-Authenticator / 8.4.1:
Flaw in Existing Security Proof Revealed / 8.4.2:
Addressing the Flaw / 8.4.3:
An Example Protocol as a Case Study / 8.4.4:
On Session Key Construction / 8.5:
Chen-Kudla ID-Based Protocol / 9.1:
The ID-Based Protocol / 9.1.1:
Existing Arguments on Restriction of Reveal Query / 9.1.2:
Improved Chen-Kudla Protocol / 9.1.3:
Security Proof for Improved Chen-Kudla Protocol / 9.1.4:
McCullagh-Barreto 2P-IDAKA Protocol / 9.2:
The 2P-IDAKA Protocol / 9.2.1:
Why Reveal Query is Restricted / 9.2.2:
Errors in Existing Proof for 2P-IDAKA Protocol / 9.2.3:
Error 1 / 9.2.3.1:
Error 2 / 9.2.3.2:
Improved 2P-IDAKA Protocol / 9.2.4:
A Proposal for Session Key Construction / 9.3:
Another Case Study / 9.4:
Reflection Attack on Lee-Kim-Yoo Protocol / 9.4.1:
Complementing Computational Protocol Analysis / 9.4.2:
The Formal Framework / 10.1:
Analysing a Provably-Secure Protocol / 10.2:
Protocol Specification / 10.2.1:
Initial State of Protocol 10.1 / 10.2.1.1:
Step 1 of Protocol 10.1 / 10.2.1.2:
A Malicious State Transition / 10.2.1.3:
Protocol Analysis / 10.2.2:
Hijacking Attack / 10.2.2.1:
New Attack 1 / 10.2.2.2:
New Attack 2 / 10.2.2.3:
Analysing Another Two Protocols With Claimed Proofs of Security / 10.3:
Analysis of Protocol 10.2 / 10.3.1:
Analysis of Protocol 10.3 / 10.3.1.2:
Flaws in Refuted Proofs / 10.3.2:
A Possible Fix / 10.3.3:
Analysing Protocols with Heuristic Security Arguments / 10.4:
Case Studies / 10.4.1:
Jan-Chen Mutual Protocol / 10.4.1.1:
Yang-Shen-Shieh Protocol / 10.4.1.2:
Kim-Huh-Hwang-Lee Protocol / 10.4.1.3:
Lin-Sun-Hwang Key Protocols MDHEKE I and II / 10.4.1.4:
Yeh-Sun Key Protocol / 10.4.1.5:
Protocol Analyses / 10.4.2:
Protocol Analysis 1 / 10.4.2.1:
Protocol Analysis 2 / 10.4.2.2:
Protocol Analysis 3 / 10.4.2.3:
Protocol Analysis 4 / 10.4.2.4:
Protocol Analysis 5 / 10.4.2.5:
Protocol Analysis 6 / 10.4.2.6:
Protocol Analysis 7 / 10.4.2.7:
An Integrative Framework to Protocol Analysis and Repair / 10.5:
Case Study Protocol / 11.1:
Proposed Integrative Framework / 11.2:
Protocols Specification / 11.2.1:
Defining SIDs in Protocol 11.1 / 11.2.1.1:
Description of Goal State / 11.2.1.2:
Description of Possible Actions / 11.2.1.3:
Protocols Analysis / 11.2.2:
Protocol Repair / 11.2.3:
Conclusion and Future Work / 11.3:
Research Summary / 12.1:
Open Problems and Future Directions / 12.2:
Index
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
9.

電子ブック

EB
Kim-Kwang Raymond Choo
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
Computer Security Approach / 1.2.1:
Computational Complexity Approach / 1.2.2:
Research Objectives and Deliverables / 1.2.3:
Structure of Book and Contributions to Knowledge / 1.3:
References
Background Materials / 2:
Mathematical Background / 2.1:
Abstract Algebra and the Main Groups / 2.1.1:
Bilinear Maps from Elliptic Curve Pairings / 2.1.2:
Computational Problems and Assumptions / 2.1.3:
Cryptographic Tools / 2.1.4:
Encryption Schemes: Asymmetric Setting / 2.1.4.1:
Encryption Schemes: Symmetric Setting / 2.1.4.2:
Digital Signature Schemes / 2.1.4.3:
Message Authentication Codes / 2.1.4.4:
Cryptographic Hash Functions / 2.1.4.5:
Random Oracles / 2.1.4.6:
Key Establishment Protocols and their Basis / 2.2:
Protocol Architectures / 2.2.1:
Existing Cryptographic Keys / 2.2.1.1:
Method of Session Key Generation / 2.2.1.2:
Number of Entities / 2.2.1.3:
Protocol Goals and Attacks / 2.2.2:
Protocol Goals / 2.2.2.1:
Additional Security Attributes / 2.2.2.2:
Types of Attacks / 2.2.2.3:
A Need for Rigorous Treatment / 2.2.2.4:
The Computational Complexity Approach / 2.3:
Adversarial Powers / 2.3.1:
Definition of Freshness / 2.3.2:
Definition of Security / 2.3.3:
The Bellare-Rogaway Models / 2.3.4:
The BR93 Model / 2.3.4.1:
The BR95 Model / 2.3.4.2:
The BPR2000 Model / 2.3.4.3:
The Canetti-Krawczyk Model / 2.3.5:
Protocol Security / 2.3.6:
Summary / 2.4:
A Flawed BR95 Partnership Function / 3:
A Flaw in the Security Proof for 3PKD Protocol / 3.1:
The 3PKD Protocol / 3.1.1:
Key Replicating Attack on 3PKD Protocol / 3.1.2:
The Partner Function used in the BR95 Proof / 3.1.3:
A Revised 3PKD Protocol in Bellare-Rogaway Model / 3.2:
Defining SIDs in the 3PKD Protocol / 3.2.1:
An Improved Provably Secure 3PKD Protocol / 3.2.2:
Security Proof for the Improved 3PKD Protocol / 3.2.3:
Adaptive MAC Forger F / 3.2.3.1:
Multiple Eavesdropper Attacker ME / 3.2.3.2:
Conclusion of Proof / 3.2.3.3:
On The Key Sharing Requirement / 3.3:
Bellare-Rogaway 3PKD Protocol in CK2001 Model / 4.1:
New Attack on 3PKD Protocol / 4.1.1:
A New Provably-Secure 3PKD Protocol in CK2001 Model / 4.1.3:
Jeong-Katz-Lee Protocol JP2 / 4.2:
Protocol JP2 / 4.2.1:
New Attack on Protocol JP2 / 4.2.2:
An Improved Protocol JP2 / 4.2.3:
The Key Sharing Requirement / 4.3:
Comparison of Bellare-Rogaway and Canetti-Krawczyk Models / 4.4:
Relating The Notions of Security / 5.1:
Proving BR93 (EA+KE) to BPR2000 (EA+KE) / 5.1.1:
Proof for the key establishment goal / 5.1.1.1:
Proof for the entity authentication goal / 5.1.1.2:
Proving CK2001 to BPR2000 (KE) / 5.1.2:
Proving CK2001 to BR93 (KE) / 5.1.3:
BR93 (KE) to BR95 and BR93 (KE), CK2001 [not left arrow] BR95 / 5.1.4:
BR93 (KE)/CK2001 [not left arrow] BPR2000 (KE) / 5.1.5:
CK2001 [not left arrow] BR93 (EA+KE) / 5.1.6:
BR93 (KE) [not left arrow] CK2001 / 5.1.7:
BPR200 (KE) [not left arrow] BR95 / 5.1.8:
A Drawback in the BPR2000 Model / 5.2:
Case Study: Abdalla-Pointcheval 3PAKE / 5.2.1:
Unknown Key Share Attack on 3PAKE / 5.2.2:
An Extension to the Bellare-Rogaway Model / 5.3:
A Provably-Secure Revised Protocol of Boyd / 6.1:
Secure Authenticated Encryption Schemes / 6.1.1:
Revised Protocol of Boyd / 6.1.2:
Security Proof / 6.1.3:
Integrity attacker / 6.1.3.1:
Confidentiality attacker / 6.1.3.2:
Conclusion of Security Proof / 6.1.3.3:
An Extension to the BR93 Model / 6.2:
An Efficient Protocol in Extended Model / 6.3:
An Efficient Protocol / 6.3.1:
Integrity Breaker / 6.3.2:
Confidentiality Breaker / 6.3.2.2:
Comparative Security and Efficiency / 6.3.2.3:
A Proof of Revised Yahalom Protocol / 6.5:
The Yahalom Protocol and its Simplified Version / 7.1:
A New Provably-Secure Protocol / 7.2:
Proof for Protocol 7.2 / 7.2.1:
Conclusion of Proof for Theorem 7.2.1 / 7.2.1.1:
An Extension to Protocol 7.2 / 7.2.2:
Partnering Mechanism: A Brief Discussion / 7.3:
Errors in Computational Complexity Proofs for Protocols / 7.4:
Boyd-Gonzalez Nieto Protocol / 8.1:
Unknown Key Share Attack on Protocol / 8.1.1:
An Improved Conference Key Agreement Protocol / 8.1.2:
Limitations of Existing Proof / 8.1.3:
Jakobsson-Pointcheval MAKEP / 8.2:
Unknown Key Share Attack on JP-MAKEP / 8.2.1:
Flaws in Existing Security Proof for JP-MAKEP / 8.2.2:
Wong-Chan MAKEP / 8.3:
A New Attack on WC-MAKEP / 8.3.1:
Preventing the Attack / 8.3.2:
Flaws in Existing Security Proof for WC-MAKEP / 8.3.3:
An MT-Authenticator / 8.4:
Encryption-Based MT-Authenticator / 8.4.1:
Flaw in Existing Security Proof Revealed / 8.4.2:
Addressing the Flaw / 8.4.3:
An Example Protocol as a Case Study / 8.4.4:
On Session Key Construction / 8.5:
Chen-Kudla ID-Based Protocol / 9.1:
The ID-Based Protocol / 9.1.1:
Existing Arguments on Restriction of Reveal Query / 9.1.2:
Improved Chen-Kudla Protocol / 9.1.3:
Security Proof for Improved Chen-Kudla Protocol / 9.1.4:
McCullagh-Barreto 2P-IDAKA Protocol / 9.2:
The 2P-IDAKA Protocol / 9.2.1:
Why Reveal Query is Restricted / 9.2.2:
Errors in Existing Proof for 2P-IDAKA Protocol / 9.2.3:
Error 1 / 9.2.3.1:
Error 2 / 9.2.3.2:
Improved 2P-IDAKA Protocol / 9.2.4:
A Proposal for Session Key Construction / 9.3:
Another Case Study / 9.4:
Reflection Attack on Lee-Kim-Yoo Protocol / 9.4.1:
Complementing Computational Protocol Analysis / 9.4.2:
The Formal Framework / 10.1:
Analysing a Provably-Secure Protocol / 10.2:
Protocol Specification / 10.2.1:
Initial State of Protocol 10.1 / 10.2.1.1:
Step 1 of Protocol 10.1 / 10.2.1.2:
A Malicious State Transition / 10.2.1.3:
Protocol Analysis / 10.2.2:
Hijacking Attack / 10.2.2.1:
New Attack 1 / 10.2.2.2:
New Attack 2 / 10.2.2.3:
Analysing Another Two Protocols With Claimed Proofs of Security / 10.3:
Analysis of Protocol 10.2 / 10.3.1:
Analysis of Protocol 10.3 / 10.3.1.2:
Flaws in Refuted Proofs / 10.3.2:
A Possible Fix / 10.3.3:
Analysing Protocols with Heuristic Security Arguments / 10.4:
Case Studies / 10.4.1:
Jan-Chen Mutual Protocol / 10.4.1.1:
Yang-Shen-Shieh Protocol / 10.4.1.2:
Kim-Huh-Hwang-Lee Protocol / 10.4.1.3:
Lin-Sun-Hwang Key Protocols MDHEKE I and II / 10.4.1.4:
Yeh-Sun Key Protocol / 10.4.1.5:
Protocol Analyses / 10.4.2:
Protocol Analysis 1 / 10.4.2.1:
Protocol Analysis 2 / 10.4.2.2:
Protocol Analysis 3 / 10.4.2.3:
Protocol Analysis 4 / 10.4.2.4:
Protocol Analysis 5 / 10.4.2.5:
Protocol Analysis 6 / 10.4.2.6:
Protocol Analysis 7 / 10.4.2.7:
An Integrative Framework to Protocol Analysis and Repair / 10.5:
Case Study Protocol / 11.1:
Proposed Integrative Framework / 11.2:
Protocols Specification / 11.2.1:
Defining SIDs in Protocol 11.1 / 11.2.1.1:
Description of Goal State / 11.2.1.2:
Description of Possible Actions / 11.2.1.3:
Protocols Analysis / 11.2.2:
Protocol Repair / 11.2.3:
Conclusion and Future Work / 11.3:
Research Summary / 12.1:
Open Problems and Future Directions / 12.2:
Index
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
10.

電子ブック

EB
Boy; Herrmann, Wolfgang A. Cornils, Boy Cornils, Wolfgang A. Herrmann
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2004
所蔵情報: loading…
目次情報: 続きを見る
Introduction. / 1:
Introduction / B. Cornils, ; W.A. Herrmann.
Basic Aqueous Chemistry. / 2:
Organic Chemistry in Water / A. Lubineau, ; J. Auge, ; M.-C. Scherrmann.2.1:
Origin of the Reactivity in Water. / 2.1.1:
Pericyclic Reactions / 2.1.3:
Diels - Alder Reactions. / 2.1.3.1:
Hetero Diels -Alder Reactions. / 2.1.3.2:
Other Cycloadditions. / 2.1.3.3:
Claisen Rearrangements. / 2.1.3.4:
Carbonyl Additions. / 2.1.4:
Aldol-type Reactions. / 2.1.4.1:
Michael-type Reactions. / 2.1.4.2:
Allylation Reactions. / 2.1.4.3:
Oxido-reductions. / 2.1.5:
Oxidations. / 2.1.5.1:
Reductions. / 2.1.5.2:
Radical Reactions. / 2.1.6:
Outlook. / 2.1.7:
Organometallic Chemistry in Water / W.A. Herrmann, ; F.E. Kuhn.2.2:
Water as a Solvent and Ligand. / 2.2.1:
Organometallic Reactions of Water. / 2.2.3:
Catalytic Reactions with Water. / 2.2.4:
Water-gas Shift Reaction. / 2.2.4.1:
Wacker- Hoechst Acetaldehyde Process. / 2.2.4.2:
Olefin Hydration. / 2.2.4.3:
Hydrodimerization. / 2.2.4.4:
Water-soluble Metal Complexes. / 2.2.5:
Perspectives. / 2.2.6:
Characterization of Organometallic Compounds in Water / G. Laurenczy.2.3:
General Survey. / 2.3.1:
Effect of High Hydrostatic Pressure on Aqueous Organometall lic Systems. / 2.3.3:
Aqueous Organometallics with Pressurized Gases. / 2.3.4:
Concluding Remarks. / 2.3.5:
Catalysts for an Aqueous Catalysis. / 3:
Variation of Central Atoms. / 3.1:
Transition Metals / D.J. Darensbourg, ; C.G. Ortiz.3.1.1:
Water-soluble Catalysts by Virtue of Water-soluble Ligands / 3.1.1.1:
Water-soluble Catalysts through Water Coordination. / 3.1.1.3:
Lanthanides in Aqueous-phase Catalysis / S. Kobayashi.3.1.2:
Aldol Reactions. / 3.1.2.1:
Mannich-type Reactions. / 3.1.2.3:
Micellar Systems. / 3.1.2.4:
Asymmetric Catalysis in Aqueous Media. / 3.1.2.6:
Conclusions / 3.1.2.7:
Variation of Ligands. / 3.2:
Monophosphines / O. Stelzer , ; S. Rossenbach, ; D. Hoff.3.2.1:
General Features, Scope, and Limitations. / 3.2.1.1:
Anionic Phosphines. / 3.2.1.2:
Cationic Phosphines. / 3.2.1.3:
Nonionic Water-soluble Phosphines. / 3.2.1.4:
Diphosphines and Other Phosphines / M. Schreuder Goedheijt, ; P.C.J. Kamer, ; J.N.H. Reek, P.W.N.M. van Leeuwen.3.2.2:
General. / 3.2.2.1:
Diphosphines - Introduction of Sulfonate Groups by Direct Sulfonation. / 3.2.2.2:
Introduction of Sulfonate Groups During Synthesis. / 3.2.2.3:
Diphosphines with Quaternized Aminoalkyl or Aminoaryl Groups. / 3.2.2.4:
Diphosphines with Hydroxyalkyl or Polyether Substituents / 3.2.2.5:
Carboxylated Diphosphines. / 3.2.2.6:
Amphiphilic Diphosphines. / 3.2.2.7:
Other Phosphines. / 3.2.2.8:
Ligands or Complexes Containing Ancillary Functionalities / P. Kalck, ; M. Urrutigoity.3.2.3:
Complexes Containing at Least Two Classical Functionalities. / 3.2.3.1:
Cationic Complexes / 3.2.3.2:
Immobilization on Silica Supports. / 3.2.3.3:
Macromolecular Ligands or Supports. / 3.2.3.4:
Ligands not Containing Phosphorus. / 3.2.3.5:
Additional Perspectives. / 3.2.3.6:
Tenside Ligands / G. Papadogianakis.3.2.4:
Tenside Phosphines and Amines / 3.2.4.1:
Hydroformylation Reactions Catalyzed by Transition Metal Surfactant -Phosphine Complexes. / 3.2.4.3:
Hydrogenation Reactions Catalyzed by Transition Metal Surfactant -Phosphine Complexes. / 3.2.4.4:
Carbonylation Reactions Catalyzed by Transition Metal Surfactant -Phosphine Complexe / 3.2.4.5:
Introduction. / 1:
Introduction / B. Cornils, ; W.A. Herrmann.
Basic Aqueous Chemistry. / 2:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼