close
1.

電子ブック

EB
Mike Allerhand
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Introduction to R / 1:
Why Command Lines and Scripts? / 1.1:
The R Console / 1.1.1:
Variables / 1.1.2:
Functions / 1.1.3:
Finding Functions and Getting Help / 1.2:
Libraries / 1.2.1:
Packages / 1.2.2:
Finding Functions / 1.2.3:
Getting Help / 1.2.4:
R Projects / 1.3:
Saving Your Session / 1.3.1:
Scripts / 1.3.2:
Data Structures / 2:
Vectors, Matrices, and Arrays / 2.1:
Data Frames and Lists / 2.1.2:
Creating Data / 2.1.3:
Sampling Data / 2.1.4:
Reading Data / 2.1.5:
Operations on Vectors and Matrices / 2.2:
Arithmetic Functions / 2.2.1:
Descriptive Functions / 2.2.2:
Operators and Expressions / 2.2.3:
Factors / 2.3:
Making Factors / 2.3.1:
Operations on Factors / 2.3.2:
Re-ordering and Re-labelling / 2.3.3:
Indexing / 2.4:
Indexing by Name / 2.4.1:
Indexing by Number / 2.4.2:
Inserting and Deleting Rows or Columns / 2.4.3:
Indexing with Factors / 2.4.4:
Conditional Indexing / 2.4.5:
Sorting / 2.4.6:
Reshaping / 2.5:
Stacking and Unstacking? / 2.5.1:
Reshaping: Wide and Long / 2.5.2:
Merging / 2.5.3:
Missing Values / 2.6:
Recoding Missing Values / 2.6.1:
Operations with Missing Values / 2.6.2:
Counting and Sorting Missing Values / 2.6.3:
Handling Missing Values / 2.6.4:
Mapping Functions / 2.7:
Repeated Evaluation / 2.7.1:
Applying Functions / 2.7.2:
Writing Functions / 2.8:
Anonymous Functions / 2.8.1:
Optional Arguments / 2.8.2:
Tables and Graphs / 3:
Tables / 3.1:
Frequency Tables / 3.1.1:
Tables of Cell Means and Other Summaries / 3.1.2:
Saving Tables / 3.1.3:
Graphs / 3.2:
Base Graphics / 3.2.1:
Lattice Graphics / 3.2.2:
Multiple Plot Layout / 3.2.3:
Saving Graphics / 3.2.4:
Hypothesis Tests / 4:
Probability Distributions / 4.1:
How to Run a t test / 4.2:
Linear Models / 5:
Model Formulas / 5.1:
Formula and Data Frame / 5.1.1:
Updating Model Fits / 5.1.2:
General Linear Models / 5.2:
Regression Diagnostics / 5.2.1:
Testing the Regression Coefficients / 5.2.2:
Prediction / 5.2.3:
Stepwise Regression / 5.2.4:
Extracting Information from the Fit Object / 5.2.5:
Residualizing / 5.2.6:
ANOVA / 5.3:
ANOVA Tables / 5.3.1:
Comparisons / 5.3.2:
Learning R / 5.4:
Index
Introduction to R / 1:
Why Command Lines and Scripts? / 1.1:
The R Console / 1.1.1:
2.

電子ブック

EB
Johann; Engel, Thomas Gasteiger, Thomas Engel, Johann Gasteiger
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2003
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Addresses of the Authors
Introduction / 1:
The Domain of Chemistry / 1.1:
A Chemists Fundamental Questions / 1.2:
The Scope of Chemoinformatics / 1.3:
Learning in Chemoinformatics / 1.4:
Major Tasks / 1.5:
Representation of the Objects / 1.5.1:
Data / 1.5.2:
Learning / 1.5.3:
History of Chemoinformatics / 1.6:
Structure Databases 10 / 1.6.1:
Quantitative Structure--Activity Relationships / 1.6.2:
Molecular Modeling / 1.6.3:
Structure Elucidation / 1.6.4:
Chemical Reactions and Synthesis Design / 1.6.5:
The Scope of this Book / 1.7:
Teaching Chemoinformatics / 1.8:
Representation of Chemical Compounds / 2:
Chemical Nomenclature / 2.1:
Development of Chemical Nomenclature / 2.2.1:
Representation of Chemical Elements / 2.2.2:
Characterization of Elements / 2.2.2.1:
Representation of the Empirical Formulas of (Inorganic) Compounds / 2.2.3:
Present-Day Representation / 2.2.3.1:
Representation of the Empirical Formulas of Organic Compounds / 2.2.4:
Systematic Nomenclature of Inorganic and Organic Compounds / 2.2.4.1:
Line Notations / 2.3:
Wiswesser Line Notation / 2.3.1:
Applications / 2.3.1.1:
ROSDAL / 2.3.2:
The SMILES Coding / 2.3.2.1:
Sybyl Line Notation / 2.3.3.1:
Coding the Constitution / 2.3.4.1:
Graph Theory / 2.4.1:
Basics of Graph Theory / 2.4.1.1:
Matrix Representations / 2.4.2:
Adjacency Matrix / 2.4.2.1:
Distance Matrix / 2.4.2.2:
Atom Connectivity Matrix / 2.4.2.3:
Incidence Matrix / 2.4.2.4:
Bond Matrix / 2.4.2.5:
Connection Table / 2.4.3:
Input and Output of Chemical Structures / 2.4.4:
Standard Structure Exchange Formats / 2.4.5:
Tutorial: Molfiles and SDfiles / 2.4.6:
Structure of a Molfile / 2.4.6.1:
Structure of an SDfile / 2.4.6.2:
Libraries and Toolkits / 2.4.6.3:
Processing Constitutional Information / 2.5:
Ring Perception / 2.5.1:
Minimum Number of Cycles / 2.5.1.1:
All Cycles / 2.5.1.2:
Smallest Fundamental Basis / 2.5.1.3:
Unambiguous and Unique Representations / 2.5.2:
Structure Isomers and Isomorphism / 2.5.2.1:
Canonicalization / 2.5.2.2:
The Morgan Algorithm / 2.5.3:
Tutorial: Morgan Algorithm / 2.5.3.1:
Beyond a Connection Table / 2.6:
Deficiencies in Representing Molecular Structures by a Connection Table / 2.6.1:
Representation of Molecular Structures by Electron Systems / 2.6.2:
General Concepts / 2.6.2.1:
Simple Single and Double Bonds / 2.6.2.2:
Conjugation and Aromaticity / 2.6.2.3:
Orthogonality of ûSystems / 2.6.2.4:
Non-bonding Orbitals / 2.6.2.5:
Charged Species and Radicals / 2.6.2.6:
Ionized States / 2.6.2.7:
Electron-Deficient Compounds / 2.6.2.8:
Organometallic Compounds / 2.6.2.9:
Generation of RAMSES from a VB Representation / 2.6.3:
Special Notations of Chemical Structures / 2.7:
Markush Structures / 2.7.1:
Fragment Coding / 2.7.2:
Fingerprints / 2.7.2.1:
Hashed Fingerprints / 2.7.3.1:
Hash Codes / 2.7.4:
Representation of Stereochemistry / 2.7.4.1:
Representation of Configuration Isomers and Molecular Chirality / 2.8.1:
Detection and Specification of Chirality / 2.8.2.1:
Ordered Lists / 2.8.3:
Rotational Lists / 2.8.4:
Permutation Descriptors / 2.8.5:
Stereochemistry in Molfile and SMILES / 2.8.6:
Stere / 2.8.6.1:
Foreword
Preface
Addresses of the Authors
3.

電子ブック

EB
Hans-Joachim Hubschmann
出版情報: Wiley Online Library - AutoHoldings Books , Weinheim : John Wiley & Sons, Inc., 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Fundamentals / 2:
Sample Preparation / 2.1:
Solid Phase Extraction / 2.1.1:
Solid Phase Microextraction / 2.1.1.1:
Supercritical Fluid Extraction / 2.1.2:
Pressurized Fluid Extraction / 2.1.3:
Online Liquid Chromatography Clean-up / 2.1.4:
Headspace Techniques / 2.1.5:
Static Headspace Technique / 2.1.5.1:
Dynamic Headspace Technique (Purge and Trap) / 2.1.5.2:
Headspace versus Purge and Trap / 2.1.5.3:
Adsorptive Enrichment and Thermodesorption / 2.1.6:
Sample Collection / 2.1.6.1:
Calibration / 2.1.6.2:
Desorption / 2.1.6.3:
Pyrolysis and Thermal Extraction / 2.1.7:
Foil Pyrolysis / 2.1.7.1:
Curie Point Pyrolysis / 2.1.7.2:
Thermal Extraction / 2.1.7.3:
Gas Chromatography / 2.2:
Fast Gas Chromatography / 2.2.1:
Fast Chromatography / 2.2.1.1:
Ultra Fast Chromatography / 2.2.1.2:
Two Dimensional Gas Chromatography / 2.2.2:
Heart Cutting / 2.2.2.1:
Comprehensive GC x GC / 2.2.2.2:
Modulation / 2.2.2.3:
Detection / 2.2.2.4:
Data Handling / 2.2.2.5:
Moving Capillary Stream Switching / 2.2.2.6:
GC/MS Sample Inlet Systems / 2.2.3:
Carrier Gas Regulation / 2.2.3.1:
The Microseal Septum / 2.2.3.2:
Hot Sample Injection / 2.2.3.3:
Cold Injection Systems / 2.2.3.4:
Injection Volumes / 2.2.3.5:
On-column Injection / 2.2.3.6:
Cryofocusing / 2.2.3.7:
Capillary Columns / 2.2.4:
Sample Capacity / 2.2.4.1:
Internal Diameter / 2.2.4.2:
Film Thickness / 2.2.4.3:
Column Length / 2.2.4.4:
Adjusting the Carrier Gas Flow / 2.2.4.5:
Properties of Stationary Phases / 2.2.4.6:
Chromatography Parameters / 2.2.5:
The Chromatogram and its Meaning / 2.2.5.1:
Capacity Factor k' / 2.2.5.2:
Chromatographic Resolution / 2.2.5.3:
Factors Affecting the Resolution / 2.2.5.4:
Maximum Sample Capacity / 2.2.5.5:
Peak Symmetry / 2.2.5.6:
Optimisation of Flow / 2.2.5.7:
Classical Detectors for GC/MS Systems / 2.2.6:
FID / 2.2.6.1:
NPD / 2.2.6.2:
ECD / 2.2.6.3:
PID / 2.2.6.4:
ELCD / 2.2.6.5:
FPD / 2.2.6.6:
PDD / 2.2.6.7:
Connection of Classical Detectors Parallel to the Mass Spectrometer / 2.2.6.8:
Mass Spectrometry / 2.3:
Resolving Power and Resolution in Mass Spectrometry / 2.3.1:
High Resolution / 2.3.1.1:
Unit Mass Resolution / 2.3.1.2:
High and Low Resolution in the Case of Dioxin Analysis / 2.3.1.3:
Time-of-Flight Analyser / 2.3.2:
Isotope Ratio Monitoring GC/MS / 2.3.3:
Ionisation Procedures / 2.3.4:
Electron Impact Ionisation / 2.3.4.1:
Chemical Ionisation / 2.3.4.2:
Measuring Techniques in GC/MS / 2.3.5:
Detection of the Complete Spectrum (Full Scan) / 2.3.5.1:
Recording Individual Masses (SIM/MID) / 2.3.5.2:
High Resolution Accurate Mass MID Data Acquisition / 2.3.5.3:
MS/MS - Tandem Mass Spectrometry / 2.3.6:
Mass Calibration / 2.3.7:
Special Aspects of GC/MS Coupling / 2.4:
Vacuum Systems / 2.4.1:
GC/MS Interface Solutions / 2.4.2:
Open Split Coupling / 2.4.2.1:
Direct Coupling / 2.4.2.2:
Separator Techniques / 2.4.2.3:
References for Chapter 2
Evaluation of GC/MS Analyses / 3:
Display of Chromatograms / 3.1:
Total Ion Current Chromatograms / 3.1.1:
Mass Chromatograms / 3.1.2:
Substance Identification / 3.2:
Extraction of Mass Spectra / 3.2.1:
The Retention Index / 3.2.2:
Libraries of Mass Spectra / 3.2.3:
Universal Mass Spectral Libraries / 3.2.3.1:
Application Libraries of Mass Spectra / 3.2.3.2:
Library Search Procedures / 3.2.4:
The INCOS/NIST Search Procedure / 3.2.4.1:
The PBM Search Procedure / 3.2.4.2:
The SISCOM Procedure / 3.2.4.3:
Interpretation of Mass Spectra / 3.2.5:
Isotope Patterns / 3.2.5.1:
Fragmentation and Rearrangement Reactions / 3.2.5.2:
DMOX Derivatives for Location of Double Bond Positions / 3.2.5.3:
Mass Spectroscopic Features of Selected Substance Classes / 3.2.6:
Volatile Halogenated Hydrocarbons / 3.2.6.1:
Benzene/Toluene/Ethylbenzene/Xylenes (BTEX, Alkylaromatics) / 3.2.6.2:
Polyaromatic Hydrocarbons (PAH) / 3.2.6.3:
Phenols / 3.2.6.4:
Pesticides / 3.2.6.5:
Polychlorinated Biphenyls (PCBs) / 3.2.6.6:
Polychlorinated Dioxins/Furans (PCDDs/PCDFs) / 3.2.6.7:
Drugs / 3.2.6.8:
Explosives / 3.2.6.9:
Chemical Warfare Agents / 3.2.6.10:
Brominated Flame Retardants (BFR) / 3.2.6.11:
Quantitation / 3.3:
Decision Limit / 3.3.1:
Limit of Detection / 3.3.2:
Limit of Quantitation / 3.3.3:
Sensitivity / 3.3.4:
The Calibration Function / 3.3.5:
Quantitation and Standardisation / 3.3.6:
External Standardization / 3.3.6.1:
Internal Standardisation / 3.3.6.2:
The Standard Addition Procedure / 3.3.6.3:
Frequently Occurring Impurities / 3.4:
References for Chapter 3
Applications / 4:
Air Analysis According to EPA Method TO-14 / 4.1:
BTEX Using Headspace GC/MS / 4.2:
Simultaneous Determination of Volatile Halogenated Hydrocarbons and BTEX / 4.3:
Static Headspace Analysis of Volatile Priority Pollutants / 4.4:
MAGIC 60 - Analysis of Volatile Organic Compounds / 4.5:
irm-GC/MS of Volatile Organic Compounds Using Purge and Trap Extraction / 4.6:
Vinyl Chloride in Drinking Water / 4.7:
Chloral Hydrate in Surface Water / 4.8:
Field Analysis of Soil Air / 4.9:
Residual Monomers and Polymerisation Additives / 4.10:
Geosmin and Methylisoborneol in Drinking Water / 4.11:
Substituted Phenols in Drinking Water / 4.12:
GC/MS/MS Target Compound Analysis of Pesticide Residues in Difficult Matrices / 4.13:
Multi-component Pesticide Analysis by MS/MS / 4.14:
Multi-method for the Determination of 239 Pesticides / 4.15:
Nitrophenol Herbicides in Water / 4.16:
Dinitrophenol Herbicides in Water / 4.17:
Hydroxybenzonitrile Herbicides in Drinking Water / 4.18:
Routine Analysis of 24 PAHs in Water and Soil / 4.19:
Fast GC Quantification of 16 EC Priority PAH Components / 4.20:
Analysis of Water Contaminants by On-line SPE-GC/MS / 4.21:
Determination of Polar Aromatic Amines by SPME / 4.22:
Congener Specific Isotope Analysis of Technical PCB Mixtures / 4.23:
Polychlorinated Biphenyls in Indoor Air / 4.24:
Confirmation Analysis of Dioxins and Dioxin-like PCBs / 4.25:
Fast GC Analysis for PCBs / 4.26:
Analysis of Brominated Flame Retardants PBDE / 4.27:
Trace Analysis of BFRs in Waste Water Using SPME-GC/MS/MS / 4.28:
Analysis of Military Waste / 4.29:
Detection of Drugs in Hair / 4.30:
Detection of Morphine Derivatives / 4.31:
Detection of Cannabis Consumption / 4.32:
Analysis of Steroid Hormones Using MS/MS / 4.33:
Determination of Prostaglandins Using MS/MS / 4.34:
Detection of Clenbuterol by CI / 4.35:
General Unknown Toxicological-chemical Analysis / 4.36:
Clofibric Acid in Aquatic Systems / 4.37:
Polycyclic Musks in Waste Water / 4.38:
Identification and Quantification of Trichothecene Mycotoxins / 4.39:
Highly Sensitive Screening and Quantification of Environmental Components Using Chemical Ionisation with Water / 4.40:
Characterization of Natural Waxes by Pyrolysis-GC/MS / 4.41:
Quantitative Determination of Acrylate Copolymer Layers / 4.42:
References for Chapter 4
Glossary / 5:
Subject Index
Introduction / 1:
Fundamentals / 2:
Sample Preparation / 2.1:
4.

電子ブック

EB
Anthony Sofronas
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Inc., 2005
所蔵情報: loading…
目次情報: 続きを見る
Preface
Introduction / 1:
Strength of Materials / 2:
Load Calculations / 2.1:
Stress Calculations / 2.2:
Axial / 2.2.1:
Shear / 2.2.2:
Bending / 2.2.3:
Torsional / 2.2.4:
Combined Stresses / 2.2.5:
Thermal Stresses / 2.2.6:
Transient Temperatures and Stresses / 2.2.7:
High Temperature Creep / 2.2.8:
Shell Stresses / 2.2.9:
Piping Thermal Forces, Moments, Frequencies / 2.3:
Piping Failures / 2.3.1:
Allowable and Design Stresses / 2.4:
Fatigue Due to Cyclic Loading / 2.5:
Elongation and Deflection Calculations / 2.6:
Factors of Safety / 2.7:
Case History: Agitator Bearing Loading / 2.8:
Case History: Shaft Failure / 2.9:
Dynamic Loading / 2.10:
Centrifugal Force / 2.10.1:
Inertia's and WR2 / 2.10.2:
Energy Relationships / 2.10.3:
Case History: Centrifuge Bearing Failures / 2.11:
Case History: Bird Impact Force on a Windscreen / 2.12:
Case History: Torsional Impact on a Propeller / 2.13:
Case History: Start-up Torque on a Motor Coupling / 2.14:
Case History: Frictional Clamping Due to Bolting / 2.15:
Case History: Failure of a Connecting Rod in a Race Car / 2.16:
Bolting / 2.17:
Holding Capacity / 2.17.1:
Limiting Torque / 2.17.2:
Bolt Elongation and Relaxation / 2.17.3:
Torquing Methods / 2.17.4:
Fatigue of Bolts / 2.17.5:
Stripping Strength of Threads / 2.17.6:
Case History: A Power Head Gasket Leak / 2.17.7:
Ball and Roller Bearing Life Estimates / 2.18:
Case History: Bearing Life of a Shaft Support / 2.18.1:
Coupling Offset and Bearing Life / 2.18.2:
Hydrodynamic Bearings / 2.19:
Shell and Pad Failures / 2.19.1:
Gears / 2.20:
Gear Acceptability Calculations / 2.20.1:
Case History: Up-Rate Acceptability of a Gear Unit / 2.20.2:
Interference Fits / 2.21:
Keyless Hydraulically Fitted Hubs / 2.21.1:
Case History: Taper Fit Holding Ability / 2.21.2:
Case History: The Flying Hydraulically Fitted Hub / 2.21.3:
Strength of Welds / 2.22:
Fatigue of Welds / 2.23:
Repair of Machinery / 2.24:
Shafts / 2.24.1:
Housing and Cases / 2.24.2:
Gearboxes / 2.24.3:
Sleeve bearings and Bushing Clearances / 2.24.4:
Alignments / 2.24.5:
Acceptable Coupling Offset and Angular Misalignment / 2.24.6:
Vibration Measurements / 2.24.7:
Interpreting Mechanical Failures / 2.25:
Failures with Axial, Bending and Torsional Loading / 2.25.1:
Gear Teeth Failures / 2.25.2:
Spring Failures / 2.25.3:
Bolt Failures / 2.25.4:
Bearing Failures / 2.25.5:
Reading a Bearing / 2.25.6:
Large Gearbox Keyway / Shaft Failures / 2.25.7:
Case History: Sizing a Bushing Running Clearance / 2.26:
Case History: Galling of a Shaft In A Bushing / 2.27:
Case History: Remaining Fatigue Life with Cyclic Stresses / 2.28:
A Procedure for Evaluating Gasket Joints / 2.29:
Gaskets In High Temperature Service / 2.30:
"O" Ring Evaluation / 2.31:
Case History: Gasket Won't Pass Hydrotest / 2.32:
Case History: Heat Exchanger Leak Due to Temperature / 2.33:
Wear of Equipment / 2.34:
Case History: Excessive Wear of a Ball Valve / 2.35:
Vibration Analysis / 3:
Spring /Mass Systems and Resonance / 3.1:
Case History: Critical Speed Problem on Steam Turbine / 3.2:
Determining Vibration Amplitudes / 3.3:
Allowable Levels for X or F at Resonance / 3.3.1:
Case History: Vibratory Torque on Gear of a Ship System / 3.4:
Torsional Vibration / 3.5:
Case History: Torsional Vibration of Motor-Generator-Blower / 3.6:
Vibration Diagnosis and Campbell Diagrams / 3.7:
Case History: The Effect of a Suddenly Applied Torsional Load / 3.8:
Flow Induced Vibrations / 3.9:
Preface
Introduction / 1:
Strength of Materials / 2:
5.

電子ブック

EB
Kim-Kwang Raymond Choo
出版情報: Springer eBooks Computer Science , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
Computer Security Approach / 1.2.1:
Computational Complexity Approach / 1.2.2:
Research Objectives and Deliverables / 1.2.3:
Structure of Book and Contributions to Knowledge / 1.3:
References
Background Materials / 2:
Mathematical Background / 2.1:
Abstract Algebra and the Main Groups / 2.1.1:
Bilinear Maps from Elliptic Curve Pairings / 2.1.2:
Computational Problems and Assumptions / 2.1.3:
Cryptographic Tools / 2.1.4:
Encryption Schemes: Asymmetric Setting / 2.1.4.1:
Encryption Schemes: Symmetric Setting / 2.1.4.2:
Digital Signature Schemes / 2.1.4.3:
Message Authentication Codes / 2.1.4.4:
Cryptographic Hash Functions / 2.1.4.5:
Random Oracles / 2.1.4.6:
Key Establishment Protocols and their Basis / 2.2:
Protocol Architectures / 2.2.1:
Existing Cryptographic Keys / 2.2.1.1:
Method of Session Key Generation / 2.2.1.2:
Number of Entities / 2.2.1.3:
Protocol Goals and Attacks / 2.2.2:
Protocol Goals / 2.2.2.1:
Additional Security Attributes / 2.2.2.2:
Types of Attacks / 2.2.2.3:
A Need for Rigorous Treatment / 2.2.2.4:
The Computational Complexity Approach / 2.3:
Adversarial Powers / 2.3.1:
Definition of Freshness / 2.3.2:
Definition of Security / 2.3.3:
The Bellare-Rogaway Models / 2.3.4:
The BR93 Model / 2.3.4.1:
The BR95 Model / 2.3.4.2:
The BPR2000 Model / 2.3.4.3:
The Canetti-Krawczyk Model / 2.3.5:
Protocol Security / 2.3.6:
Summary / 2.4:
A Flawed BR95 Partnership Function / 3:
A Flaw in the Security Proof for 3PKD Protocol / 3.1:
The 3PKD Protocol / 3.1.1:
Key Replicating Attack on 3PKD Protocol / 3.1.2:
The Partner Function used in the BR95 Proof / 3.1.3:
A Revised 3PKD Protocol in Bellare-Rogaway Model / 3.2:
Defining SIDs in the 3PKD Protocol / 3.2.1:
An Improved Provably Secure 3PKD Protocol / 3.2.2:
Security Proof for the Improved 3PKD Protocol / 3.2.3:
Adaptive MAC Forger F / 3.2.3.1:
Multiple Eavesdropper Attacker ME / 3.2.3.2:
Conclusion of Proof / 3.2.3.3:
On The Key Sharing Requirement / 3.3:
Bellare-Rogaway 3PKD Protocol in CK2001 Model / 4.1:
New Attack on 3PKD Protocol / 4.1.1:
A New Provably-Secure 3PKD Protocol in CK2001 Model / 4.1.3:
Jeong-Katz-Lee Protocol JP2 / 4.2:
Protocol JP2 / 4.2.1:
New Attack on Protocol JP2 / 4.2.2:
An Improved Protocol JP2 / 4.2.3:
The Key Sharing Requirement / 4.3:
Comparison of Bellare-Rogaway and Canetti-Krawczyk Models / 4.4:
Relating The Notions of Security / 5.1:
Proving BR93 (EA+KE) to BPR2000 (EA+KE) / 5.1.1:
Proof for the key establishment goal / 5.1.1.1:
Proof for the entity authentication goal / 5.1.1.2:
Proving CK2001 to BPR2000 (KE) / 5.1.2:
Proving CK2001 to BR93 (KE) / 5.1.3:
BR93 (KE) to BR95 and BR93 (KE), CK2001 [not left arrow] BR95 / 5.1.4:
BR93 (KE)/CK2001 [not left arrow] BPR2000 (KE) / 5.1.5:
CK2001 [not left arrow] BR93 (EA+KE) / 5.1.6:
BR93 (KE) [not left arrow] CK2001 / 5.1.7:
BPR200 (KE) [not left arrow] BR95 / 5.1.8:
A Drawback in the BPR2000 Model / 5.2:
Case Study: Abdalla-Pointcheval 3PAKE / 5.2.1:
Unknown Key Share Attack on 3PAKE / 5.2.2:
An Extension to the Bellare-Rogaway Model / 5.3:
A Provably-Secure Revised Protocol of Boyd / 6.1:
Secure Authenticated Encryption Schemes / 6.1.1:
Revised Protocol of Boyd / 6.1.2:
Security Proof / 6.1.3:
Integrity attacker / 6.1.3.1:
Confidentiality attacker / 6.1.3.2:
Conclusion of Security Proof / 6.1.3.3:
An Extension to the BR93 Model / 6.2:
An Efficient Protocol in Extended Model / 6.3:
An Efficient Protocol / 6.3.1:
Integrity Breaker / 6.3.2:
Confidentiality Breaker / 6.3.2.2:
Comparative Security and Efficiency / 6.3.2.3:
A Proof of Revised Yahalom Protocol / 6.5:
The Yahalom Protocol and its Simplified Version / 7.1:
A New Provably-Secure Protocol / 7.2:
Proof for Protocol 7.2 / 7.2.1:
Conclusion of Proof for Theorem 7.2.1 / 7.2.1.1:
An Extension to Protocol 7.2 / 7.2.2:
Partnering Mechanism: A Brief Discussion / 7.3:
Errors in Computational Complexity Proofs for Protocols / 7.4:
Boyd-Gonzalez Nieto Protocol / 8.1:
Unknown Key Share Attack on Protocol / 8.1.1:
An Improved Conference Key Agreement Protocol / 8.1.2:
Limitations of Existing Proof / 8.1.3:
Jakobsson-Pointcheval MAKEP / 8.2:
Unknown Key Share Attack on JP-MAKEP / 8.2.1:
Flaws in Existing Security Proof for JP-MAKEP / 8.2.2:
Wong-Chan MAKEP / 8.3:
A New Attack on WC-MAKEP / 8.3.1:
Preventing the Attack / 8.3.2:
Flaws in Existing Security Proof for WC-MAKEP / 8.3.3:
An MT-Authenticator / 8.4:
Encryption-Based MT-Authenticator / 8.4.1:
Flaw in Existing Security Proof Revealed / 8.4.2:
Addressing the Flaw / 8.4.3:
An Example Protocol as a Case Study / 8.4.4:
On Session Key Construction / 8.5:
Chen-Kudla ID-Based Protocol / 9.1:
The ID-Based Protocol / 9.1.1:
Existing Arguments on Restriction of Reveal Query / 9.1.2:
Improved Chen-Kudla Protocol / 9.1.3:
Security Proof for Improved Chen-Kudla Protocol / 9.1.4:
McCullagh-Barreto 2P-IDAKA Protocol / 9.2:
The 2P-IDAKA Protocol / 9.2.1:
Why Reveal Query is Restricted / 9.2.2:
Errors in Existing Proof for 2P-IDAKA Protocol / 9.2.3:
Error 1 / 9.2.3.1:
Error 2 / 9.2.3.2:
Improved 2P-IDAKA Protocol / 9.2.4:
A Proposal for Session Key Construction / 9.3:
Another Case Study / 9.4:
Reflection Attack on Lee-Kim-Yoo Protocol / 9.4.1:
Complementing Computational Protocol Analysis / 9.4.2:
The Formal Framework / 10.1:
Analysing a Provably-Secure Protocol / 10.2:
Protocol Specification / 10.2.1:
Initial State of Protocol 10.1 / 10.2.1.1:
Step 1 of Protocol 10.1 / 10.2.1.2:
A Malicious State Transition / 10.2.1.3:
Protocol Analysis / 10.2.2:
Hijacking Attack / 10.2.2.1:
New Attack 1 / 10.2.2.2:
New Attack 2 / 10.2.2.3:
Analysing Another Two Protocols With Claimed Proofs of Security / 10.3:
Analysis of Protocol 10.2 / 10.3.1:
Analysis of Protocol 10.3 / 10.3.1.2:
Flaws in Refuted Proofs / 10.3.2:
A Possible Fix / 10.3.3:
Analysing Protocols with Heuristic Security Arguments / 10.4:
Case Studies / 10.4.1:
Jan-Chen Mutual Protocol / 10.4.1.1:
Yang-Shen-Shieh Protocol / 10.4.1.2:
Kim-Huh-Hwang-Lee Protocol / 10.4.1.3:
Lin-Sun-Hwang Key Protocols MDHEKE I and II / 10.4.1.4:
Yeh-Sun Key Protocol / 10.4.1.5:
Protocol Analyses / 10.4.2:
Protocol Analysis 1 / 10.4.2.1:
Protocol Analysis 2 / 10.4.2.2:
Protocol Analysis 3 / 10.4.2.3:
Protocol Analysis 4 / 10.4.2.4:
Protocol Analysis 5 / 10.4.2.5:
Protocol Analysis 6 / 10.4.2.6:
Protocol Analysis 7 / 10.4.2.7:
An Integrative Framework to Protocol Analysis and Repair / 10.5:
Case Study Protocol / 11.1:
Proposed Integrative Framework / 11.2:
Protocols Specification / 11.2.1:
Defining SIDs in Protocol 11.1 / 11.2.1.1:
Description of Goal State / 11.2.1.2:
Description of Possible Actions / 11.2.1.3:
Protocols Analysis / 11.2.2:
Protocol Repair / 11.2.3:
Conclusion and Future Work / 11.3:
Research Summary / 12.1:
Open Problems and Future Directions / 12.2:
Index
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
6.

電子ブック

EB
Kim-Kwang Raymond Choo
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
Computer Security Approach / 1.2.1:
Computational Complexity Approach / 1.2.2:
Research Objectives and Deliverables / 1.2.3:
Structure of Book and Contributions to Knowledge / 1.3:
References
Background Materials / 2:
Mathematical Background / 2.1:
Abstract Algebra and the Main Groups / 2.1.1:
Bilinear Maps from Elliptic Curve Pairings / 2.1.2:
Computational Problems and Assumptions / 2.1.3:
Cryptographic Tools / 2.1.4:
Encryption Schemes: Asymmetric Setting / 2.1.4.1:
Encryption Schemes: Symmetric Setting / 2.1.4.2:
Digital Signature Schemes / 2.1.4.3:
Message Authentication Codes / 2.1.4.4:
Cryptographic Hash Functions / 2.1.4.5:
Random Oracles / 2.1.4.6:
Key Establishment Protocols and their Basis / 2.2:
Protocol Architectures / 2.2.1:
Existing Cryptographic Keys / 2.2.1.1:
Method of Session Key Generation / 2.2.1.2:
Number of Entities / 2.2.1.3:
Protocol Goals and Attacks / 2.2.2:
Protocol Goals / 2.2.2.1:
Additional Security Attributes / 2.2.2.2:
Types of Attacks / 2.2.2.3:
A Need for Rigorous Treatment / 2.2.2.4:
The Computational Complexity Approach / 2.3:
Adversarial Powers / 2.3.1:
Definition of Freshness / 2.3.2:
Definition of Security / 2.3.3:
The Bellare-Rogaway Models / 2.3.4:
The BR93 Model / 2.3.4.1:
The BR95 Model / 2.3.4.2:
The BPR2000 Model / 2.3.4.3:
The Canetti-Krawczyk Model / 2.3.5:
Protocol Security / 2.3.6:
Summary / 2.4:
A Flawed BR95 Partnership Function / 3:
A Flaw in the Security Proof for 3PKD Protocol / 3.1:
The 3PKD Protocol / 3.1.1:
Key Replicating Attack on 3PKD Protocol / 3.1.2:
The Partner Function used in the BR95 Proof / 3.1.3:
A Revised 3PKD Protocol in Bellare-Rogaway Model / 3.2:
Defining SIDs in the 3PKD Protocol / 3.2.1:
An Improved Provably Secure 3PKD Protocol / 3.2.2:
Security Proof for the Improved 3PKD Protocol / 3.2.3:
Adaptive MAC Forger F / 3.2.3.1:
Multiple Eavesdropper Attacker ME / 3.2.3.2:
Conclusion of Proof / 3.2.3.3:
On The Key Sharing Requirement / 3.3:
Bellare-Rogaway 3PKD Protocol in CK2001 Model / 4.1:
New Attack on 3PKD Protocol / 4.1.1:
A New Provably-Secure 3PKD Protocol in CK2001 Model / 4.1.3:
Jeong-Katz-Lee Protocol JP2 / 4.2:
Protocol JP2 / 4.2.1:
New Attack on Protocol JP2 / 4.2.2:
An Improved Protocol JP2 / 4.2.3:
The Key Sharing Requirement / 4.3:
Comparison of Bellare-Rogaway and Canetti-Krawczyk Models / 4.4:
Relating The Notions of Security / 5.1:
Proving BR93 (EA+KE) to BPR2000 (EA+KE) / 5.1.1:
Proof for the key establishment goal / 5.1.1.1:
Proof for the entity authentication goal / 5.1.1.2:
Proving CK2001 to BPR2000 (KE) / 5.1.2:
Proving CK2001 to BR93 (KE) / 5.1.3:
BR93 (KE) to BR95 and BR93 (KE), CK2001 [not left arrow] BR95 / 5.1.4:
BR93 (KE)/CK2001 [not left arrow] BPR2000 (KE) / 5.1.5:
CK2001 [not left arrow] BR93 (EA+KE) / 5.1.6:
BR93 (KE) [not left arrow] CK2001 / 5.1.7:
BPR200 (KE) [not left arrow] BR95 / 5.1.8:
A Drawback in the BPR2000 Model / 5.2:
Case Study: Abdalla-Pointcheval 3PAKE / 5.2.1:
Unknown Key Share Attack on 3PAKE / 5.2.2:
An Extension to the Bellare-Rogaway Model / 5.3:
A Provably-Secure Revised Protocol of Boyd / 6.1:
Secure Authenticated Encryption Schemes / 6.1.1:
Revised Protocol of Boyd / 6.1.2:
Security Proof / 6.1.3:
Integrity attacker / 6.1.3.1:
Confidentiality attacker / 6.1.3.2:
Conclusion of Security Proof / 6.1.3.3:
An Extension to the BR93 Model / 6.2:
An Efficient Protocol in Extended Model / 6.3:
An Efficient Protocol / 6.3.1:
Integrity Breaker / 6.3.2:
Confidentiality Breaker / 6.3.2.2:
Comparative Security and Efficiency / 6.3.2.3:
A Proof of Revised Yahalom Protocol / 6.5:
The Yahalom Protocol and its Simplified Version / 7.1:
A New Provably-Secure Protocol / 7.2:
Proof for Protocol 7.2 / 7.2.1:
Conclusion of Proof for Theorem 7.2.1 / 7.2.1.1:
An Extension to Protocol 7.2 / 7.2.2:
Partnering Mechanism: A Brief Discussion / 7.3:
Errors in Computational Complexity Proofs for Protocols / 7.4:
Boyd-Gonzalez Nieto Protocol / 8.1:
Unknown Key Share Attack on Protocol / 8.1.1:
An Improved Conference Key Agreement Protocol / 8.1.2:
Limitations of Existing Proof / 8.1.3:
Jakobsson-Pointcheval MAKEP / 8.2:
Unknown Key Share Attack on JP-MAKEP / 8.2.1:
Flaws in Existing Security Proof for JP-MAKEP / 8.2.2:
Wong-Chan MAKEP / 8.3:
A New Attack on WC-MAKEP / 8.3.1:
Preventing the Attack / 8.3.2:
Flaws in Existing Security Proof for WC-MAKEP / 8.3.3:
An MT-Authenticator / 8.4:
Encryption-Based MT-Authenticator / 8.4.1:
Flaw in Existing Security Proof Revealed / 8.4.2:
Addressing the Flaw / 8.4.3:
An Example Protocol as a Case Study / 8.4.4:
On Session Key Construction / 8.5:
Chen-Kudla ID-Based Protocol / 9.1:
The ID-Based Protocol / 9.1.1:
Existing Arguments on Restriction of Reveal Query / 9.1.2:
Improved Chen-Kudla Protocol / 9.1.3:
Security Proof for Improved Chen-Kudla Protocol / 9.1.4:
McCullagh-Barreto 2P-IDAKA Protocol / 9.2:
The 2P-IDAKA Protocol / 9.2.1:
Why Reveal Query is Restricted / 9.2.2:
Errors in Existing Proof for 2P-IDAKA Protocol / 9.2.3:
Error 1 / 9.2.3.1:
Error 2 / 9.2.3.2:
Improved 2P-IDAKA Protocol / 9.2.4:
A Proposal for Session Key Construction / 9.3:
Another Case Study / 9.4:
Reflection Attack on Lee-Kim-Yoo Protocol / 9.4.1:
Complementing Computational Protocol Analysis / 9.4.2:
The Formal Framework / 10.1:
Analysing a Provably-Secure Protocol / 10.2:
Protocol Specification / 10.2.1:
Initial State of Protocol 10.1 / 10.2.1.1:
Step 1 of Protocol 10.1 / 10.2.1.2:
A Malicious State Transition / 10.2.1.3:
Protocol Analysis / 10.2.2:
Hijacking Attack / 10.2.2.1:
New Attack 1 / 10.2.2.2:
New Attack 2 / 10.2.2.3:
Analysing Another Two Protocols With Claimed Proofs of Security / 10.3:
Analysis of Protocol 10.2 / 10.3.1:
Analysis of Protocol 10.3 / 10.3.1.2:
Flaws in Refuted Proofs / 10.3.2:
A Possible Fix / 10.3.3:
Analysing Protocols with Heuristic Security Arguments / 10.4:
Case Studies / 10.4.1:
Jan-Chen Mutual Protocol / 10.4.1.1:
Yang-Shen-Shieh Protocol / 10.4.1.2:
Kim-Huh-Hwang-Lee Protocol / 10.4.1.3:
Lin-Sun-Hwang Key Protocols MDHEKE I and II / 10.4.1.4:
Yeh-Sun Key Protocol / 10.4.1.5:
Protocol Analyses / 10.4.2:
Protocol Analysis 1 / 10.4.2.1:
Protocol Analysis 2 / 10.4.2.2:
Protocol Analysis 3 / 10.4.2.3:
Protocol Analysis 4 / 10.4.2.4:
Protocol Analysis 5 / 10.4.2.5:
Protocol Analysis 6 / 10.4.2.6:
Protocol Analysis 7 / 10.4.2.7:
An Integrative Framework to Protocol Analysis and Repair / 10.5:
Case Study Protocol / 11.1:
Proposed Integrative Framework / 11.2:
Protocols Specification / 11.2.1:
Defining SIDs in Protocol 11.1 / 11.2.1.1:
Description of Goal State / 11.2.1.2:
Description of Possible Actions / 11.2.1.3:
Protocols Analysis / 11.2.2:
Protocol Repair / 11.2.3:
Conclusion and Future Work / 11.3:
Research Summary / 12.1:
Open Problems and Future Directions / 12.2:
Index
Introduction / 1:
The Key Distribution Problem / 1.1:
Solution: Key Establishment Protocols / 1.2:
7.

電子ブック

EB
Boy; Herrmann, Wolfgang A. Cornils, Boy Cornils, Wolfgang A. Herrmann
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2004
所蔵情報: loading…
目次情報: 続きを見る
Introduction. / 1:
Introduction / B. Cornils, ; W.A. Herrmann.
Basic Aqueous Chemistry. / 2:
Organic Chemistry in Water / A. Lubineau, ; J. Auge, ; M.-C. Scherrmann.2.1:
Origin of the Reactivity in Water. / 2.1.1:
Pericyclic Reactions / 2.1.3:
Diels - Alder Reactions. / 2.1.3.1:
Hetero Diels -Alder Reactions. / 2.1.3.2:
Other Cycloadditions. / 2.1.3.3:
Claisen Rearrangements. / 2.1.3.4:
Carbonyl Additions. / 2.1.4:
Aldol-type Reactions. / 2.1.4.1:
Michael-type Reactions. / 2.1.4.2:
Allylation Reactions. / 2.1.4.3:
Oxido-reductions. / 2.1.5:
Oxidations. / 2.1.5.1:
Reductions. / 2.1.5.2:
Radical Reactions. / 2.1.6:
Outlook. / 2.1.7:
Organometallic Chemistry in Water / W.A. Herrmann, ; F.E. Kuhn.2.2:
Water as a Solvent and Ligand. / 2.2.1:
Organometallic Reactions of Water. / 2.2.3:
Catalytic Reactions with Water. / 2.2.4:
Water-gas Shift Reaction. / 2.2.4.1:
Wacker- Hoechst Acetaldehyde Process. / 2.2.4.2:
Olefin Hydration. / 2.2.4.3:
Hydrodimerization. / 2.2.4.4:
Water-soluble Metal Complexes. / 2.2.5:
Perspectives. / 2.2.6:
Characterization of Organometallic Compounds in Water / G. Laurenczy.2.3:
General Survey. / 2.3.1:
Effect of High Hydrostatic Pressure on Aqueous Organometall lic Systems. / 2.3.3:
Aqueous Organometallics with Pressurized Gases. / 2.3.4:
Concluding Remarks. / 2.3.5:
Catalysts for an Aqueous Catalysis. / 3:
Variation of Central Atoms. / 3.1:
Transition Metals / D.J. Darensbourg, ; C.G. Ortiz.3.1.1:
Water-soluble Catalysts by Virtue of Water-soluble Ligands / 3.1.1.1:
Water-soluble Catalysts through Water Coordination. / 3.1.1.3:
Lanthanides in Aqueous-phase Catalysis / S. Kobayashi.3.1.2:
Aldol Reactions. / 3.1.2.1:
Mannich-type Reactions. / 3.1.2.3:
Micellar Systems. / 3.1.2.4:
Asymmetric Catalysis in Aqueous Media. / 3.1.2.6:
Conclusions / 3.1.2.7:
Variation of Ligands. / 3.2:
Monophosphines / O. Stelzer , ; S. Rossenbach, ; D. Hoff.3.2.1:
General Features, Scope, and Limitations. / 3.2.1.1:
Anionic Phosphines. / 3.2.1.2:
Cationic Phosphines. / 3.2.1.3:
Nonionic Water-soluble Phosphines. / 3.2.1.4:
Diphosphines and Other Phosphines / M. Schreuder Goedheijt, ; P.C.J. Kamer, ; J.N.H. Reek, P.W.N.M. van Leeuwen.3.2.2:
General. / 3.2.2.1:
Diphosphines - Introduction of Sulfonate Groups by Direct Sulfonation. / 3.2.2.2:
Introduction of Sulfonate Groups During Synthesis. / 3.2.2.3:
Diphosphines with Quaternized Aminoalkyl or Aminoaryl Groups. / 3.2.2.4:
Diphosphines with Hydroxyalkyl or Polyether Substituents / 3.2.2.5:
Carboxylated Diphosphines. / 3.2.2.6:
Amphiphilic Diphosphines. / 3.2.2.7:
Other Phosphines. / 3.2.2.8:
Ligands or Complexes Containing Ancillary Functionalities / P. Kalck, ; M. Urrutigoity.3.2.3:
Complexes Containing at Least Two Classical Functionalities. / 3.2.3.1:
Cationic Complexes / 3.2.3.2:
Immobilization on Silica Supports. / 3.2.3.3:
Macromolecular Ligands or Supports. / 3.2.3.4:
Ligands not Containing Phosphorus. / 3.2.3.5:
Additional Perspectives. / 3.2.3.6:
Tenside Ligands / G. Papadogianakis.3.2.4:
Tenside Phosphines and Amines / 3.2.4.1:
Hydroformylation Reactions Catalyzed by Transition Metal Surfactant -Phosphine Complexes. / 3.2.4.3:
Hydrogenation Reactions Catalyzed by Transition Metal Surfactant -Phosphine Complexes. / 3.2.4.4:
Carbonylation Reactions Catalyzed by Transition Metal Surfactant -Phosphine Complexe / 3.2.4.5:
Introduction. / 1:
Introduction / B. Cornils, ; W.A. Herrmann.
Basic Aqueous Chemistry. / 2:
8.

電子ブック

EB
Center for Chemical Process Safety (Ccps, Center for Chemical Process Safety, American Institute of Chemical Engineers.
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 1995
所蔵情報: loading…
目次情報: 続きを見る
List of Tables
List of Figures
Preface
Acknowledgments
Glossary
List of Symbols
Introduction / Chapter 1:
General / 1.1:
Chemical Reactivity / 1.2:
Detonations, Deflagrations, and Runaways / 1.3:
Assessment and Testing Strategies / 1.4:
Identification of Hazardous Chemical Reactivity / Chapter 2:
Summary/Strategy / 2.1:
Hazard Identification Strategy / 2.1.1:
Exothermic Reactions / 2.1.3:
Experimental Thermal and Reactivity Measurements / 2.1.4:
Test Strategies / 2.1.5:
Overview of Thermal Stability Test methods / 2.1.6:
Examples of Interpretation and Application of Test Data / 2.1.7:
Technical Section / 2.2:
Identification of High Energy Substances / 2.2.2:
Hazard Prediction by Thermodynamic Calculations / 2.2.3:
Oxygen Balance / 2.2.3.1:
Calculation of the Reaction Enthalpy / 2.2.3.2:
Application of Computer Programs / 2.2.3.3:
Instability/Incompatibility Factors / 2.2.4:
Factors Influencing Stability / 2.2.4.1:
Redox Systems / 2.2.4.2:
Reactions with Water / 2.2.4.3:
Reactions between Halogenated Hydrocarbons and Metals / 2.2.4.4:
Practical Testing / 2.3:
Screening Tests / 2.3.1:
Thermal Analysis / 2.3.1.1:
Isoperibolic Calorimetry / 2.3.1.2:
Thermal Stability and Runaway Testing / 2.3.2:
Isothermal Storage Tests / 2.3.2.1:
Dewar Flask Testing and Adiabatic Storage Tests / 2.3.2.2:
Accelerating Rate Calorimeter (ARC) / 2.3.2.3:
Stability Tests for Powders / 2.3.2.4:
Explosibility Testing / 2.3.3:
.Detonation Testing / 2.3.3.1:
Deflagration Testing and Autoclave Testing / 2.3.3.2:
Mechanical Sensitivity Testing / 2.3.3.3:
Sensitivity to heating Under Confinement / 2.3.3.4:
Reactivity Testing / 2.3.4:
Pyrophoric Properties / 2.3.4.1:
Reactivity with Water / 2.3.4.2:
Oxidizing Properties / 2.3.4.3:
Flammability Testing / 2.3.5:
Chemical Reactivity Considerations in Process/Reactor Design and Operation / Chapter 3:
Thermal Hazards: Identification and Analysis / 3.1:
Cause, Definition, and Prevention of a Runaway / 3.1.1.1:
Some Simple Rules for Inherent Safety / 3.1.1.2:
Strategy for Inherent Safety in Design and Operation / 3.1.1.3:
Equipment to be Used for the Analysis of Hazards / 3.1.1.4:
Reactor, Heat and Mass Balance Considerations / 3.2:
Heat and Mass Balances, Kinetics, and Reaction Stability / 3.2.1:
Adiabatic Temperature Rise / 3.2.1.1:
The Reaction / 3.2.1.2:
Reaction Rate / 3.2.1.3:
Reaction Rate Constant / 3.2.1.4:
Concentration of Reactants / 3.2.1.5:
Effect of Surrounding Temperature on Stability / 3.2.1.6:
Effect of Agitation and Surface Fouling on Stability / 3.2.1.7:
Mass Balance / 3.2.1.8:
Choice of Reactor / 3.2.2:
Heat Transfer / 3.2.3:
Heat Transfer in Nonagitated Vessels / 3.2.3.1:
Heat Transfer in Agitated Vessels / 3.2.3.2:
Acquisition and Use of Process Design data / 3.3:
Bench-Scale Equipment for Batch/Tank Reactors / 3.3.1:
Reaction Calorimeter (RC1) / 3.3.2.1:
Contalab / 3.3.2.2:
CPA ThermoMetric Instruments / 3.3.2.3:
Quantitative Reaction Calorimeter / 3.3.2.4:
Specialized Rectors / 3.3.2.5:
Vent Size Package (VSP) / 3.3.2.6:
Reactive System Screening Tool (RSST) / 3.3.2.7:
Process Safety for Reactive Systems / 3.3.3:
Test Plan / 3.3.3.1:
System Under Investigation / 3.3.3.2:
Test Results / 3.3.3.3:
Malfunction and Process Deviation Testing / 3.3.3.4:
Pressure Effect / 3.3.3.5:
Results from the ARC, RSST, and VSP / 3.3.3.6:
Scale-up and Pilot Plants / 3.3.4:
General Remarks / 3.3.4.1:
Chemical Kinetics. 3 / 3.3.4.2:
List of Tables
List of Figures
Preface
9.

電子ブック

EB
H?l?ne; Lattanzi, Alessandra; Dalpozzo, Renato Pellissier, Renato Dalpozzo, Alessandra Lattanzi
出版情報: Wiley Online Library - AutoHoldings Books , Wiley-VCH, 2017
所蔵情報: loading…
目次情報: 続きを見る
Preface
List of Abbreviations
Asymmetric Cyclopropanation / 1:
Introduction / 1.1:
Simmons-Smith Cyclopropanation / 1.2:
Chiral Substrates / 1.2.1:
Chiral Allylic Alcohols / 1.2.1.1:
Chiral Allylic Amines / 1.2.1.2:
Chiral Acetal-Directed Cyclopropanations / 1.2.1.3:
Simple Chiral Alkenes / 1.2.1.4:
Chiral Auxiliaries / 1.2.2:
Chiral Catalysts / 1.2.3:
Charette's Ligand / 1.2.3.1:
Other Stoichiometric Ligands / 1.2.3.2:
Walsh' Procedure / 1.2.3.3:
True Catalytic Procedures / 1.2.3.4:
Transition-Metal-Catalyzed Decomposition of Diazoalkanes / 1.3:
Intermolecular Cyclopropanation / 1.3.1:
Chiral Catalysts: Cobalt / 1.3.1.1:
Chiral Catalysts: Copper / 1.3.1.3:
Chiral Catalysts: Rhodium / 1.3.1.4:
Chiral Catalysts: Ruthenium / 1.3.1.5:
Chiral Catalyst: Other Metals / 1.3.1.6:
Intramolecular Cyclopropanation / 1.3.2:
Chiral Auxiliaries and Chiral Compounds / 1.3.2.1:
Chiral Stoichiometric Carbenes / 1.3.2.2:
Michael-Initiated and Other Ring Closures / 1.4:
Chiral Michael Acceptors / 1.4.1:
Chiral Nucleophiles / 1.4.2.2:
Organocatalysis / 1.4.3:
Ylides / 1.4.3.1:
Nitrocyclopropanation / 1.4.3.2:
Halocarbonyl Compounds / 1.4.3.3:
Metal Catalysis / 1.4.4:
Other Ring Closures / 1.4.5:
Miscellaneous Reactions / 1.5:
Rearrangement of Chiral Oxiranes / 1.5.1:
Cycloisomerization of 1,n-Enynes / 1.5.2:
Denitrogenation of Chiral Pyrazolines / 1.5.3:
C-H Insertion / 1.5.4:
Addition to Cyclopropenes / 1.5.5:
Other Methods / 1.5.6:
Conclusions / 1.6:
References
Asymmetric Aziridination / 2:
Aziridination Based on the Use of Chiral Substrates / 2.1:
Addition to Alkenes / 2.2.1:
Aziridination via Nitrene Transfer to Alkenes / 2.2.1.1:
Aziridination via Addition-Elimination Processes / 2.2.1.2:
Addition to Imines / 2.2.1.3:
Methylidation of Imines / 2.2.2.1:
Aza-Darzens and Analogous Reactions / 2.2.2.2:
Addition/Elimination Processes / 2.2.2.3:
Addition to Azirines / 2.2.2.4:
Aziridination via Intramolecular Substitution / 2.2.4:
From 1,2-Amino Alcohols / 2.2.4.1:
From 1,2-Amino Halides / 2.2.4.2:
From 1,2-Azido Alcohols / 2.2.4.3:
From 1,2-Amino Sulfides and 1,2-Amino Selenides / 2.2.4.4:
From Epoxides / 2.2.4.5:
Aziridination Based on the Use of Chiral Catalysts / 2.2.5:
Cu-Catalyzed Aziridination / 2.3.1:
Rh-Catalyzed Aziridination / 2.3.1.2:
Ru-Catalyzed Aziridination / 2.3.1.3:
Catalysis by Other Metals / 2.3.1.4:
Organocatalyzed Aziridination / 2.3.1.5:
Aziridination via Carbene Transfer to Imines / 2.3.2:
Carbene Methodology / 2.3.2.1:
Sulfur-Ylide-Mediated Aziridination / 2.3.2.2:
Kinetic Resolutions of Aziridines / 2.3.3:
Asymmetric Epoxidation / 2.4:
Asymmetric Epoxidations Based on the Use of Chiral Auxiliaries / 3.1:
Asymmetric Metal-Catalyzed Epoxidations / 3.3:
Ti-, Zr-, Hf-Catalyzed Epoxidations / 3.3.1:
V-, Nb-, Ta-Catalyzed Epoxidations / 3.3.2:
Cr-, Mo-, W-Catalyzed Epoxidations / 3.3.3:
Mn-, Re-, Fe-, Ru-Catalyzed Epoxidations / 3.3.4:
Pt-, Zn-, Lanthanoid-Catalyzed Epoxidations / 3.3.5:
Asymmetric Organocatalyzed Epoxidations / 3.4:
Phase-Transfer Catalyst / 3.4.1:
Polyamino Acids and Aspartate-Derived Peracids / 3.4.2:
Chiral Dioxiranes, Iminium Salts, and Alkyl Hydroperoxides / 3.4.3:
Chiral Amines / 3.4.4:
Kinetic Resolution of Racemic Epoxides / 3.5:
Asymmetric Sulfur-Ylide-Mediated Epoxidations / 3.6:
Asymmetric Darzens-Type Epoxidations / 3.7:
Chiral Auxiliary- and Reagent-Mediated Darzens Reactions / 3.7.1:
Catalytic Asymmetric Darzens Reactions / 3.7.2:
Other Ylide-Mediated Epoxidations / 3.8:
Asymmetric Biocatalyzed Synthesis of Epoxides / 3.9:
Asymmetric Oxaziridination / 3.10:
Oxaziridination Using Chiral Substrates / 4.1:
Oxaziridination Using Chiral Catalysts / 4.3:
Kinetic Resolutions / 4.4:
Asymmetric Azirination and Thiirination / 4.5:
Asymmetric Azirination / 5.1:
Neber Approaches / 5.2.1:
Elimination Approaches / 5.2.2:
Other Approaches / 5.2.3:
Asymmetric Thiirination / 5.3:
Conversion of Epoxides / 5.3.1:
Condensation of Sulfur-Stabilized Carbanions to Carbonyl Compounds / 5.3.2:
Intramolecular Nucleophilic Substitution / 5.3.3:
Index / 5.3.4:
Preface
List of Abbreviations
Asymmetric Cyclopropanation / 1:
10.

電子ブック

EB
Alain Nouailhat
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : John Wiley & Sons, Inc., 2007
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Acknowledgements
Preface
What are Nanos? / Chapter 1:
What are we talking about? / 1.1:
References / 1.2:
Two basic facts / 1.2.1:
Two approaches / 1.2.2:
Two key points / 1.2.3:
Some bonus material for economists / 1.3:
Some Science to Get You Started / Chapter 2:
Quantum physics / 2.1:
From the traditional world to the quantum world / 2.1.1:
Two fundamental concepts / 2.1.2:
Wave-corpuscle duality / 2.1.2.1:
Probability in the quantum world / 2.1.2.2:
The key players / 2.2:
The electron / 2.2.1:
The cornerstone of matter / 2.2.1.1:
Electronic states / 2.2.1.2:
The quantification of energy / 2.2.1.3:
Bonds / 2.2.1.4:
The photon / 2.2.2:
The wave / 2.2.2.1:
The energy grain / 2.2.2.2:
Molecules / 2.3:
From the smallest molecule to the largest and their spectacular properties / 2.3.1:
Functionality / 2.3.2:
Solid matter / 2.4:
Insulators or conductors / 2.4.1:
Semi-conductors / 2.4.2:
Silicon crystal / 2.4.2.1:
Electrons and holes / 2.4.2.2:
Junctions / 2.4.2.3:
Nanomaterials / 2.4.3:
Quantum boxes: between the atom and the crystal / 2.5:
Some bonus material for physicists / 2.6:
Luminescence / 2.6.1:
The laser device / 2.6.2:
The Revolution in Techniques Used in Observation and Imagery / Chapter 3:
Observing with photons / 3.1:
The optical microscope in visible light / 3.1.1:
X-ray machines / 3.1.2:
Observing with electrons / 3.2:
The transmission electron microscope (TEM) / 3.2.1:
The scanning electron microscope (SEM) / 3.2.2:
Touching the atoms / 3.3:
Observing how our brain functions / 3.4:
Nuclear magnetic resonance / 3.4.1:
Functional magnetic resonance imaging / 3.4.2:
Some bonus material for researchers / 3.5:
The Marriage of Software and Hardware / Chapter 4:
Small is beautiful / 4.1:
Miniaturization / 4.2:
Integration / 4.3:
The silicon planet / 4.3.1:
An expanding universe / 4.3.2:
Programs / 4.4:
Some bonus material for mathematicians / 4.5:
Mechanics of the Living World / Chapter 5:
Proteins - molecules with exceptional properties / 5.1:
The program of cellular production / 5.1.1:
Reading instructions and the production of proteins / 5.1.2:
How does it work? / 5.1.3:
Molecular disfunctioning / 5.1.4:
External causes / 5.1.4.1:
Internal causes / 5.1.4.2:
Intervention of human beings / 5.2:
Medication / 5.2.1:
The creation of those famous GMOs (Genetically Modified Organisms) / 5.2.2:
Manipulation of embryos / 5.2.3:
Some bonus material for biologists / 5.3:
The Uses of Nanotechnologies / Chapter 6:
New objects / 6.1:
Carbon in all its states / 6.1.1:
Nanodiamonds / 6.1.1.1:
Carbon nanotubes / 6.1.1.2:
A handful of gold atoms / 6.1.2:
Ground-breaking products / 6.2:
Surface treatment / 6.2.1:
Incorporation in a composite environment / 6.2.2:
From micro to nanosystems / 6.3:
Miniature components - MEMS / 6.3.1:
A print head for inkjet printers / 6.3.1.1:
Airbags / 6.3.1.2:
A microlens for miniaturized optics / 6.3.1.3:
Magnetic disk readheads: quantum nanostructures / 6.3.1.4:
Microsources of energy: key points for embedded systems / 6.3.2:
Micromotors / 6.3.3:
A global integration / 6.4:
Some bonus material for engineers / 6.5:
Nanos are Changing the World / Chapter 7:
A simulation or a virtual world / 7.1:
Understanding nature / 7.2:
Understanding energy / 7.2.1:
Understanding materials / 7.2.2:
Understanding information / 7.2.3:
Understanding life / 7.2.4:
Watch out for nanomedicine / 7.3:
Nanosciences and our future / 7.4:
Essential ethics / 7.5:
Conclusion / 7.6:
Appendices
European Parliament Resolution on Nanosciences and Nanotechnologies / Appendix A:
Eight Guidelines on Nanotechnologies Issued by the CNRS Ethics Committee / Appendix B:
Abbreviations
Bibliography
Figures
Index
Foreword
Acknowledgements
Preface
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼