close
1.

電子ブック

EB
Slav Petrov, Eugene Charniak
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Coarse-to-Fine Models / 1.1:
Coarse-to-Fine Inference / 1.2:
Latent Variable Grammars for Natural Language Parsing / 2:
Experimental Setup / 2.1:
Manual Grammar Refinement / 2.2:
Vertical and Horizontal Markovization / 2.2.1:
Additional Linguistic Refinements / 2.2.2:
Generative Latent Variable Grammars / 2.3:
Hierarchical Estimation / 2.3.1:
Adaptive Refinement / 2.3.2:
Smoothing / 2.3.3:
An Infinite Alternative / 2.3.4:
Inference / 2.4:
Hierarchical Coarse-to-Fine Pruning / 2.4.1:
Objective Functions for Parsing / 2.4.2:
Additional Experiments / 2.5:
Baseline Grammar Variation / 2.5.1:
Final Results WSJ / 2.5.3:
Multilingual Parsing / 2.5.4:
Corpus Variation / 2.5.5:
Training Size Variation / 2.5.6:
Analysis / 2.6:
Lexical Subcategories / 2.6.1:
Phrasal Subcategories / 2.6.2:
Multilingual Analysis / 2.6.3:
Summary and Future Work / 2.7:
Discriminative Latent Variable Grammars / 3:
Log-Linear Latent Variable Grammars / 3.1:
Single-Scale Discriminative Grammars / 3.3:
Efficient Discriminative Estimation / 3.3.1:
Experiments / 3.3.2:
Multi-scale Discriminative Grammars / 3.4:
Hierarchical Refinement / 3.4.1:
Learning Sparse Multi-scale Grammars / 3.4.2:
Additional Features / 3.4.3:
Structured Acoustic Models for Speech Recognition / 3.4.4:
Learning / 4.1:
The Hand-Aligned Case / 4.2.1:
Splitting / 4.2.2:
Merging / 4.2.3:
The Automatically-Aligned Case / 4.2.4:
Phone Recognition / 4.3:
Phone Classification / 4.4.2:
Coarse-to-Fine Machine Translation Decoding / 4.5:
Coarse-to-Fine Decoding / 5.1:
Related Work / 5.2.1:
Language Model Projections / 5.2.2:
Multipass Decoding / 5.2.3:
Inversion Transduction Grammars / 5.3:
Learning Coarse Languages / 5.4:
Random Projections / 5.4.1:
Frequency Clustering / 5.4.2:
HMM Clustering / 5.4.3:
JCluster / 5.4.4:
Clustering Results / 5.4.5:
Clustering / 5.5:
Spacing / 5.5.2:
Encoding Versus Order / 5.5.3:
Final Results / 5.5.4:
Search Error Analysis / 5.5.5:
Conclusions and Future Work / 5.6:
References
Introduction / 1:
Coarse-to-Fine Models / 1.1:
Coarse-to-Fine Inference / 1.2:
2.

電子ブック

EB
Haidou Wang, Binshi Xu
出版情報: SpringerLink Books - AutoHoldings , Dordrecht : Springer Berlin Heidelberg, 2012
所蔵情報: loading…
目次情報: 続きを見る
Solid Lubrication Materials / Chapter 1:
Overview of Solid Lubrication / 1.1:
Introduction / 1.1.1:
Adhesive Wear and Scuffing of Metals and Methods of Prevention / 1.1.2:
Solid Lubrication / 1.1.3:
Soft Metal / 1.2:
Crystal Structure / 1.2.1:
Physical and Chemical Properties / 1.2.2:
Lubrication Mechanism / 1.2.3:
Metal Compounds / 1.3:
FeS / 1.3.1:
MoS2 / 1.3.2:
WS2 / 1.3.3:
ZnS / 1.3.4:
Inorganic Solid Lubricant / 1.4:
Graphite / 1.4.1:
BN / 1.4.2:
Organic Solid Lubricant / 1.5:
Polytetrafluoroethylene / 1.5.1:
Polythene / 1.5.2:
Nylon / 1.5.3:
Polyformaldehyde / 1.5.4:
Phenol Formaldehyde Resin / 1.5.5:
Epoxide Resin / 1.5.6:
Conclusion / 1.6:
References
Solid Lubrication FeS Film Prepared by Ion Sulfuration / Chapter 2:
The Microstructure of Solid FeS / 2.1:
Surface Morphologies of Solid FeS / 2.1.1:
Phase Structures of Solid FeS / 2.1.2:
TEM Morphologies of Solid FeS / 2.1.3:
Analysis of Electron Diffraction / 2.1.4:
The Formation of Iron Sulfuration Layer / 2.2:
Experimental Methods / 2.2.1:
Surface Morphologies of Sulfuration Layers / 2.2.2:
Composition on the Sulfurized Steel Surface / 2.2.3:
Phase Structure of Sulfide Layer at Different Sulfurizing Time / 2.2.4:
Formation Mechanism of Sulfurized Layer / 2.2.5:
Characterization of Ion Sulfurized Layer / 2.3:
Characterization of Sulfurized Layer on 1045 and 52100 Steels / 2.3.1:
Characterization of Sulfurized Layer on Four Kinds of Steels / 2.3.2:
Tribological Properties of Sulfurized Layers / 2.4:
Tribological Properties of Sulfurized Layers on 1045 and 52100 Steels / 2.4.1:
Tribological Properties of Sulfide Layer on Four Kinds of Steel / 2.4.2:
Influencing Factors of the Microstructures and Tribological Properties on Sulfurized Layers / 2.5:
Effect of the Substrate State on the Sulfide Layer on 1045 Steel / 2.5.1:
Effect of Environment Temperature on the Sulfurized Layer on 52100 Steel / 2.5.2:
Effect of Wear Conditions on the Tribological Behaviors of Sulfurized Layer on 52100 Steel / 2.5.3:
FeS Solid Lubrication Film Prepared by a Two-step Method / Chapter 3:
Radio-frequency (RF) Sputtering + Sulfurizing Combined Treatment / 3.1:
RF Sputtering Technology / 3.1.1:
Process of Preparation / 3.1.2:
Microstructures / 3.1.3:
Tribological Properties / 3.1.4:
Shot-peening + Ion Sulfuration Combined Treatment / 3.2:
Preparation / 3.2.1:
Characterization / 3.2.2:
Tribological Properties of Sulfide Layer / 3.2.3:
Nitriding + Sulfurizing Combined Treatment / 3.3:
1045 Steel Nitriding + Sulfurizing Combined Treatment / 3.3.1:
Gray Cast-iron Nitriding + Sulfurizing Combined Treatment / 3.3.2:
Nitrocarburizing + Sulfurizing Combined Treatment / 3.4:
Thermal Spraying 3Crl3 Steel Coating + Sulfurizing Combined Treatment / 3.5:
Arc Spraying Technology / 3.5.1:
High-velocity Arc Spraying / 3.5.2:
Thermal Spraying FeCrBSi + Sulfurizing Combined Treatment / 3.5.3:
MTG (metal inert-gas) Welding + Sulfurizing Combined Treatment / 3.6.1:
MIG Welding Technology / 3.7.1:
Structures / 3.7.2:
Mechanism of FeS Film Prepared by Different Methods / 3.7.4:
FeS Solid Lubrication Layer Prepared by Other Methods / Chapter 4:
High-velocity Flame Sprayed FeS Coating / 4.1:
High-velocity Flame Spraying Technology / 4.1.1:
Tribological Properties of FeS Coating / 4.1.2:
Lubrication Mechanism of Sprayed FeS Coating / 4.1.5:
Plasma Sprayed FeS and FeS2 Coatings / 4.2:
Plasma Spraying Technique / 4.2.1:
Preparation of FeS (FeS2) Coating / 4.2.2:
Characterization of FeS (FeS2) Coating / 4.2.3:
Tribological Properties of FeS (FeS2) Coating / 4.2.4:
Plasma Sprayed Nano-FeS and FeS-SiC Composite Coating / 4.3:
Plasma Sprayed Nano-FeS Coating / 4.3.1:
Sprayed FeS-SiC Composite Coating / 4.3.2:
Comparison of the Tribological Properties of Ion Sulfurized Layer and Plasma Sprayed FeS Coating / 4.4:
Experimental Method / 4.4.1:
Microstructure and Tribological Properties / 4.4.2:
Sol-gel FeS Coating / 4.5:
FeS Film Prepared by S-ion Implantation / 4.5.1:
Ion Implantation Technology / 4.6.1:
Tribological Properties of Sulfur-implanted Steel / 4.6.2:
Micron-nano MoS2 Solid Lubrication Film / Chapter 5:
MoS2 Film / 5.1:
MoS2 Sputtering Film / 5.1.1:
MoS2 Film Prepared by Two-step Method / 5.1.2:
Thermal Spraying MoS2 Film / 5.1.3:
Bonded MoS2 Film / 5.1.4:
Inorganic Fullerene-like Nano MoS2 Film / 5.1.5:
MoS2/metal Co-deposition / 5.2:
MoS2/Ni Composite Film / 5.2.1:
MoS2/Ti Composite Film / 5.2.2:
MoS2/Au Co-sputtered Film / 5.2.3:
MoS2/Metal Compound Composite Film / 5.3:
MoS2/TiN Composite Film / 5.3.1:
MoS2/Pb2O3 Composite Film / 5.3.2:
MoS2/LaF3 Composite Film / 5.3.3:
MoS2/FeS Multilayer Film / 5.3.4:
MoS2/graphite Sputtered Coating / 5.4:
Micron-nano WS2 Solid Lubrication Film / Chapter 6:
WS2Film / 6.1:
Characterizations of the Synthetic WS2 Film / 6.1.1:
Tribological Properties of the Synthetic WS2 Film / 6.1.2:
WS2/Ag Composite Film / 6.2:
Structures of WS2/Ag Composite Film / 6.2.1:
Tribological Properties of the WS2/Ag Composite Film / 6.2.2:
WS2/MoS2 Multilayer Film / 6.3:
WS2/MoS2 Co-sputtered Film / 6.3.1:
WS2/MoS2 Multilayer Film Prepared by Combined Treatment / 6.3.2:
WS2/CaF2 Composite Coating / 6.4:
Ni-P-(IF-WS2) Composite Film / 6.5:
Micron-nano ZnS Solid Lubrication Film / Chapter 7:
ZnS Film Prepared by High Velocity Arc Spraying + Sulfurizing Treatment / 7.1:
Characterizations / 7.1.1:
Tribe-logical Properties / 7.1.3:
Lubrication Mechanisms of the Zn/ZnS Composite Layer / 7.1.4:
ZnS Film Prepared by Nano-brush Plating + Sulfurizing Treatment / 7.2:
Morphologies / 7.2.1:
Friction Coefficient / 7.2.3:
Worn Morphologies / 7.2.4:
Energy Spectrum Analysis / 7.2.5:
Index / 7.3:
Solid Lubrication Materials / Chapter 1:
Overview of Solid Lubrication / 1.1:
Introduction / 1.1.1:
3.

電子ブック

EB
Heinz Schättler, Urszula Ledzewicz
出版情報: SpringerLink Books - AutoHoldings , Dordrecht : Springer New York, 2012
所蔵情報: loading…
目次情報: 続きを見る
The Calculus of Variations: A Historical Perspective / 1:
The Brachistochrone Problem / 1.1:
The Euler-Lagrange Equation / 1.2:
Surfaces of Revolution of Minimum Area / 1.3:
The Legendre and Jacobi Conditions / 1.4:
The Geometry of Conjugate Points and Envelopes / 1.5:
Fields of Extremals and the Weierstrass Condition / 1.6:
Optimal Solutions for the Minimum Surfaces of Revolution / 1.7:
Optimality of the Cycloids for the Brachistochrone Problem / 1.8:
The Hamilton-Jacobi Equation / 1.9:
From the Calculus of Variations to Optimal Control / 1.10:
Notes / 1.11:
The Pontryagin Maximum Principle: From Necessary Conditions to the Construction of an Optimal Solution / 2:
Linear-Quadratic Optimal Control / 2.1:
Optimal Control Problems / 2.2:
Control Systems / 2.2.1:
The Pontryagin Maximum Principle / 2.2.2:
The Simplest Problem in the Calculus of Variations in Rn / 2.3:
The Linear-Quadratic Regulator Revisited / 2.4:
A Derivation of the Optimal Control from the Maximum Principle / 2.4.1:
Two Scalar Examples: / 2.4.2:
Time-Optimal Control for Linear Time-Invariant Systems / 2.5:
Time-Optimal Control for Planar Linear Time-Invariant Systems: Examples / 2.6:
The Double Integrator / 2.6.1:
A Hyperbolic Saddle / 2.6.2:
An Unstable Node / 2.6.3:
The Harmonic Oscillator / 2.6.4:
Extensions of the Model: Two Examples / 2.7:
An Economic Trading Model / 2.7.1:
The Moon-Landing Problem / 2.7.2:
Singular Controls and Lie Derivatives / 2.8:
Time-Optimal Control for a Single-Input Control-Affine Nonlinear System / 2.8.1:
The Switching Function and Singular Controls / 2.8.2:
Lie Derivatives and the Lie Bracket / 2.8.3:
The Order of a Singular Control and the Legendre-Clebsch Conditions / 2.8.4:
Multi-input Systems and the Goh Condition / 2.8.5:
Time-Optimal Control for Nonlinear Systems in the Plane / 2.9:
Optimal Bang-Bang Controls in the Simple Subcases / 2.9.1:
Fast and Slow Singular Arcs / 2.9.2:
Optimal Bang-Bang Trajectories near a Slow Singular Arc / 2.9.3:
Input Symmetries and Codimension-2 Cases in the Plane / 2.10:
Input Symmetries / 2.10.1:
Saturating Singular Arcs / 2.10.2:
Chattering Arcs: The Fuller Problem / 2.11:
The Fuller Problem as a Time-Optimal Control Problem in R3 / 2.11.1:
Elementary Properties of Extremals / 2.11.2:
Symmetries of Extremals / 2.11.3:
A Synthesis of Invariant Extremals / 2.11.4:
Reachable Sets of Linear Time-Invariant Systems: From Convex Sets to the Bang-Bang Theorem / 2.12:
Elementary Theory of Convex Sets / 3.1:
Weak Convergence in L1(I) / 3.2:
Topological Properties of Reachable Sets / 3.3:
The General Bang-Bang Theorem / 3.4:
Boundary Trajectories and Small-Time Local Controllability / 3.5:
The Bang-Bang Theorem for Compact Polyhedra / 3.6:
The High-Order Maximum Principle: From Approximations of Reachable Sets to High-Order Necessary Conditions for Optimality / 3.7:
Boltyansky Approximating Cones / 4.1:
Proof of the Pontryagin Maximum Principle / 4.2:
Tangent Vectors to the Reachable Set / 4.2.1:
Construction of an Approximating Cone / 4.2.2:
Boundary Trajectories / 4.2.3:
Necessary Conditions for Optimality / 4.2.4:
Control Systems on Manifolds: Definition and Examples / 4.3:
Shortest Paths on a Sphere / 4.3.1:
Control of a Rigid Body / 4.3.2:
Trajectory Planning for Redundant Robotic Manipulators / 4.3.3:
The High-Order Maximum Principle / 4.4:
Embeddings and Point Variations / 4.4.1:
Variational Vector and Covector Fields / 4.4.2:
C1-Extendable Variations / 4.4.3:
Exponential Representations of Flows / 4.4.4:
High-Order Necessary Conditions for Optimality / 4.6:
The Legendre-Clebsch Condition / 4.6.1:
The Kelley Condition / 4.6.2:
The Goh Condition for Multi-input Systems / 4.6.3:
The Method of Characteristics: A Geometric Approach to Sufficient Conditions for a Local Minimum / 4.7:
The Value Function and the Hamilton-Jacobi-Bellman Equation / 5.1:
Parameterized Families of Extremals and the Shadow-Price Lemma / 5.2:
Parameterized Families of Extremals / 5.2.1:
The Shadow-Price Lemma and Solutions to the Hamilton-Jacobi-Bellman Equation / 5.2.2:
The Fuller Problem Revisited / 5.2.3:
Neighboring Extremals and Sufficient Conditions for a Local Minimum / 5.3:
A Canonical Parameterized Family of Extremals / 5.3.1:
Perturbation Feedback Control and Regularity of the Flow F / 5.3.2:
Fold Singularities and Conjugate Points / 5.4:
Classical Envelopes / 5.4.1:
The Hilbert Invariant Integral and Control Envelopes / 5.4.2:
Lyapunov-Schmidt Reduction and the Geometry of Fold Singularities / 5.4.3:
The Geometry of the Flow F and the Graph of the Value Function Vε near a Fold Singular Point / 5.4.4:
Simple Cusp Singularities and Cut-Loci / 5.5:
Synthesis of Optimal Controlled Trajectories: From Local to Global Solutions / 5.6:
Parameterized Families of Broken Extremals / 6.1:
Concatenations of Parameterized Families of Extremals / 6.1.1:
Transversal Crossings / 6.1.2:
Transversal Folds / 6.1.3:
Local Analysis of a Flow of Broken Extremals / 6.1.4:
A Mathematical Model for Tumor Antiangiogenic Treatment / 6.2:
Preliminary Analysis of Extremals / 6.2.1:
Singular Control and Singular Arcs / 6.2.2:
A Family of Broken Extremals with Singular Arcs / 6.2.3:
Analysis of the Corresponding Flow and Value Function / 6.2.4:
Sufficient Conditions for a Global Minimum: Syntheses of Optimal Controlled Trajectories / 6.3:
Control-Affine Systems in Low Dimensions: From Small-Time Reachable Sets to Time-Optimal Syntheses / 6.4:
Basic Topological Properties of Small-Time Reachable Sets / 7.1:
Small-Time Reachable Sets in Dimension 2 / 7.2:
Small-Time Reachable Sets in Dimension 3 / 7.3:
Boundary Trajectories in Dimension 3: Lobry's Example / 7.3.1:
Small-Time Reachable Sets under Codimension-0 Assumptions / 7.3.2:
From Boundary Trajectories in Dimension 4 to Time-Optimal Control in R3 / 7.4:
Boundary Trajectories in Dimension 4 under Codimension-0 Assumptions / 7.4.1:
Construction of a Local Time-Optimal Synthesis to an Equilibrium Point in Dimension 3 / 7.4.2:
The Codimension-1 Case in Dimension 4: Saturating Singular Arcs / 7.5:
A Review of Some Basic Results from Advanced Calculus / 7.6:
Topology and Convergence in Normed Vector Spaces / A.1:
Uniform Convergence and the Banach Space C(K) / A.2:
Differentiable Mappings and the Implicit Function Theorem / A.3:
Regular and Singular Values: Sard's Theorem / A.4:
Ordinary Differential Equations / B:
Existence and Uniqueness of Solutions of Ordinary Differential Equations / B.1:
Dependence of Solutions on Initial Conditions and Parameters / B.2:
An Introduction to Differentiable Manifolds / C:
Embedded Submanifolds of Rk / C.1:
Manifolds: The General Case / C.2:
Tangent and Cotangent Spaces / C.3:
Vector Fields and Lie Brackets / C.4:
Some Facts from Real Analysis / D:
Lebesgue Measure and Lebesgue Measurable Functions in Rn / D.1:
The Lebesgue Integral in Rn / D.2:
Lp-Spaces / D.3:
Solutions to Ordinary Differential Equations with Lebesgue Measurable Right-Hand Sides / D.4:
References
Index
The Calculus of Variations: A Historical Perspective / 1:
The Brachistochrone Problem / 1.1:
The Euler-Lagrange Equation / 1.2:
4.

電子ブック

EB
David Kleidermacher, Mike Kleidermacher
出版情報: Elsevier ScienceDirect Books , Burlington : Newnes, 2012
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Acknowledgements
Introduction to Embedded Systems Security / Chapter 1:
What is Security? / 1.1:
What is an Embedded System? / 1.2:
Embedded Security Trends / 1.3:
Embedded Systems Complexity / 1.3.1:
Network Connectivity / 1.3.2:
Reliance on Embedded Systems for Critical Infrastructure / 1.3.3:
Sophisticated Attackers / 1.3.4:
Processor Consolidation / 1.3.5:
Security Policies / 1.4:
Perfect Security / 1.4.1:
Confidentiality, Integrity, and Availability / 1.4.2:
Isolation / 1.4.3:
Information Flow Control / 1.4.4:
Physical Security Policies / 1.4.5:
Apphcation-Specific Policies / 1.4.6:
Security Threats / 1.5:
Case Study: VxWorks Debug Port Vulnerability / 1.5.1:
Wrap-up / 1.6:
Key Points / 1.7:
Bibliography and Notes / 1.8:
Systems Software Considerations / Chapter 2:
The Role of the Operating System / 2.1:
Multiple Independent Levels of Security / 2.2:
Information Flow / 2.2.1:
Data Isolation / 2.2.2:
Damage Limitation / 2.2.3:
Periods Processing / 2.2.4:
Always Invoked / 2.2.5:
Tamper Proof / 2.2.6:
Evaluable / 2.2.7:
Microkernel versus Monolith / 2.3:
Case Study: The Duqu Virus / 2.3.1:
Core Embedded Operating System Security Requirements / 2.4:
Memory Protection / 2.4.1:
Virtual Memory / 2.4.2:
Fault Recovery / 2.4.3:
Guaranteed Resources / 2.4.4:
Virtual Device Drivers / 2.4.5:
Impact of Determinism / 2.4.6:
Secure Scheduling / 2.4.7:
Access Control and Capabilities / 2.5:
Case Study: Secure Web Browser / 2.5.1:
Granularity versus Simplicity of Access Controls / 2.5.2:
Whitelists versus Blacklists / 2.5.3:
Confused Deputy Problem / 2.5.4:
Capabilities versus Access Control Lists / 2.5.5:
Capability Confinement and Revocation / 2.5.6:
Secure Design Using Capabilities / 2.5.7:
Hypervisors and System Virtualization / 2.6:
Introduction to System Virtualization / 2.6.1:
Applications of System Virtualization / 2.6.2:
Environment Sandboxing / 2.6.3:
Virtual Security Appliances / 2.6.4:
Hypervisor Architectures / 2.6.5:
Paravirtualization / 2.6.6:
Leveraging Hardware Assists for Virtualization / 2.6.7:
Hypervisor Security / 2.6.8:
I/O Virtualization / 2.7:
The Need for Shared I/O / 2.7.1:
Emulation / 2.7.2:
Pass-through / 2.7.3:
Shared IOMMU / 2.7.4:
IOMMUs and Virtual Device Drivers / 2.7.5:
Secure I/O Virtualization within Microkernels / 2.7.6:
Remote Management / 2.8:
Security Implications / 2.8.1:
Assuring Integrity of the TCB / 2.9:
Trusted Hardware and Supply Chain / 2.9.1:
Secure Boot / 2.9.2:
Static versus Dynamic Root of Trust / 2.9.3:
Remote Attestation / 2.9.4:
Secure Embedded Software Development / 2.10:
Introduction to PHASE-Principles of High-Assurance Software Engineering / 3.1:
Minimal Implementation / 3.2:
Component Architecture / 3.3:
Runtime Componentization / 3.3.1:
A Note on Processes versus Threads / 3.3.2:
Least Privilege / 3.4:
Secure Development Process / 3.5:
Change Management / 3.5.1:
Peer Reviews / 3.5.2:
Development Tool Security / 3.5.3:
Secure Coding / 3.5.4:
Software Testing and Verification / 3.5.5:
Development Process Efficiency / 3.5.6:
Independent Expert Validation / 3.6:
Common Criteria / 3.6.1:
Case Study: Operating System Protection Profiles / 3.6.2:
Case Study: HAWS-High-Assurance Web Server / 3.7:
Model-Driven Design / 3.7.1:
Introduction to MDD / 3.8.1:
Executable Models / 3.8.2:
Modeling Languages / 3.8.3:
Types of MDD Platforms / 3.8.4:
Case Study: A Digital Pathology Scanner / 3.8.5:
Selecting an MDD Platform / 3.8.6:
Using MDD in Safety-and Security-Critical Systems / 3.8.7:
Embedded Cryptography / 3.9:
Introduction / 4.1:
U.S. Government Cryptographic Guidance / 4.2:
NSA Suite B / 4.2.1:
The One-Time Pad / 4.3:
Cryptographic Synchronization / 4.3.1:
Cryptographic Modes / 4.4:
Output Feedback / 4.4.1:
Cipher Feedback / 4.4.2:
OFB with CFB Protection / 4.4.3:
Traffic Flow Security / 4.4.4:
Counter Mode / 4.4.5:
Block Ciphers / 4.5:
Additional Cryptographic Block Cipher Modes / 4.5.1:
Authenticated Encryption / 4.6:
CCM / 4.6.1:
Galois Counter Mode / 4.6.2:
Public Key Cryptography / 4.7:
RSA / 4.7.1:
Equivalent Key Strength / 4.7.2:
Trapdoor Construction / 4.7.3:
Key Agreement / 4.8:
Man-in-the-Middle Attack on Diffie-Hellman / 4.8.1:
Public Key Authentication / 4.9:
Certificate Types / 4.9.1:
Elliptic Curve Cryptography / 4.10:
Elliptic Curve Digital Signatures / 4.10.1:
Elliptic Curve Anonymous Key Agreement / 4.10.2:
Cryptographic Hashes / 4.11:
Secure Hash Algorithm / 4.11.1:
MMO / 4.11.2:
Message Authentication Codes / 4.12:
Random Number Generation / 4.13:
True Random Number Generation / 4.13.1:
Pseudo-Random Number Generation / 4.13.2:
Key Management for Embedded Systems / 4.14:
Case Study: The Walker Spy Case / 4.14.1:
Key Management-Generalized Model / 4.14.2:
Key Management Case Studies / 4.14.3:
Cryptographic Certifications / 4.15:
FIPS 140-2 Certification / 4.15.1:
NSA Certification / 4.15.2:
Data Protection Protocols for Embedded Systems / 4.16:
Data-in-Motion Protocols / 5.1:
Generalized Model / 5.2.1:
Choosing the Network Layer for Security / 5.2.2:
Ethernet Security Protocols / 5.2.3:
BPsec versus SSL / 5.2.4:
IPsec / 5.2.5:
SSL/TLS / 5.2.6:
Embedded VPN Clients / 5.2.7:
DTLS / 5.2.8:
SSH / 5.2.9:
Custom Network Security Protocols / 5.2.10:
Application of Cryptography within Network Security Protocols / 5 2.11:
Secure Multimedia Protocols / 5.2.12:
Broadcast Security / 5.2.13:
Data-at-Rest Protocols / 5.3:
Choosing the Storage Layer for Security / 5.3.1:
Symmetric Encryption Algorithm Selection / 5.3.2:
Managing the Storage Encryption Key / 5 3 3:
Advanced Threats to Data Encryption Solutions / 5.3.4:
Emerging Applications / 5.4:
Embedded Network Transactions / 6.1:
Anatomy of a Network Transaction / 6.1.1:
State of Insecurity / 6.1.2:
Network-based Transaction Threats / 6 1 3:
Modern Attempts to Improve Network Transaction Security / 6.1.4:
Trustworthy Embedded Transaction Architecture / 6.1.5:
Automotive Security / 6.2:
Vehicular Security Threats and Mitigations / 6.2.1:
Secure Android / 6.3:
Android Security Retrospective / 6.3.1:
Android Device Rooting / 6.3.2:
Mobile Phone Data Protection: A Case Study of Defense-in-Depth / 6.3.3:
Android Sandboxing Approaches / 6.3.4:
Next-Generation Software-Defined Radio / 6.4:
Red-Black Separation / 6.4.1:
Software-Defined Radio Architecture / 6.4.2:
Enter Linux / 6.4.3:
Multi-Domain Radio / 6.4.4:
Index / 6.5:
Foreword
Preface
Acknowledgements
5.

電子ブック

EB
David Kleidermacher, Mike Kleidermacher
出版情報: Elsevier ScienceDirect Books Complete , Burlington : Newnes, 2012
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Acknowledgements
Introduction to Embedded Systems Security / Chapter 1:
What is Security? / 1.1:
What is an Embedded System? / 1.2:
Embedded Security Trends / 1.3:
Embedded Systems Complexity / 1.3.1:
Network Connectivity / 1.3.2:
Reliance on Embedded Systems for Critical Infrastructure / 1.3.3:
Sophisticated Attackers / 1.3.4:
Processor Consolidation / 1.3.5:
Security Policies / 1.4:
Perfect Security / 1.4.1:
Confidentiality, Integrity, and Availability / 1.4.2:
Isolation / 1.4.3:
Information Flow Control / 1.4.4:
Physical Security Policies / 1.4.5:
Apphcation-Specific Policies / 1.4.6:
Security Threats / 1.5:
Case Study: VxWorks Debug Port Vulnerability / 1.5.1:
Wrap-up / 1.6:
Key Points / 1.7:
Bibliography and Notes / 1.8:
Systems Software Considerations / Chapter 2:
The Role of the Operating System / 2.1:
Multiple Independent Levels of Security / 2.2:
Information Flow / 2.2.1:
Data Isolation / 2.2.2:
Damage Limitation / 2.2.3:
Periods Processing / 2.2.4:
Always Invoked / 2.2.5:
Tamper Proof / 2.2.6:
Evaluable / 2.2.7:
Microkernel versus Monolith / 2.3:
Case Study: The Duqu Virus / 2.3.1:
Core Embedded Operating System Security Requirements / 2.4:
Memory Protection / 2.4.1:
Virtual Memory / 2.4.2:
Fault Recovery / 2.4.3:
Guaranteed Resources / 2.4.4:
Virtual Device Drivers / 2.4.5:
Impact of Determinism / 2.4.6:
Secure Scheduling / 2.4.7:
Access Control and Capabilities / 2.5:
Case Study: Secure Web Browser / 2.5.1:
Granularity versus Simplicity of Access Controls / 2.5.2:
Whitelists versus Blacklists / 2.5.3:
Confused Deputy Problem / 2.5.4:
Capabilities versus Access Control Lists / 2.5.5:
Capability Confinement and Revocation / 2.5.6:
Secure Design Using Capabilities / 2.5.7:
Hypervisors and System Virtualization / 2.6:
Introduction to System Virtualization / 2.6.1:
Applications of System Virtualization / 2.6.2:
Environment Sandboxing / 2.6.3:
Virtual Security Appliances / 2.6.4:
Hypervisor Architectures / 2.6.5:
Paravirtualization / 2.6.6:
Leveraging Hardware Assists for Virtualization / 2.6.7:
Hypervisor Security / 2.6.8:
I/O Virtualization / 2.7:
The Need for Shared I/O / 2.7.1:
Emulation / 2.7.2:
Pass-through / 2.7.3:
Shared IOMMU / 2.7.4:
IOMMUs and Virtual Device Drivers / 2.7.5:
Secure I/O Virtualization within Microkernels / 2.7.6:
Remote Management / 2.8:
Security Implications / 2.8.1:
Assuring Integrity of the TCB / 2.9:
Trusted Hardware and Supply Chain / 2.9.1:
Secure Boot / 2.9.2:
Static versus Dynamic Root of Trust / 2.9.3:
Remote Attestation / 2.9.4:
Secure Embedded Software Development / 2.10:
Introduction to PHASE-Principles of High-Assurance Software Engineering / 3.1:
Minimal Implementation / 3.2:
Component Architecture / 3.3:
Runtime Componentization / 3.3.1:
A Note on Processes versus Threads / 3.3.2:
Least Privilege / 3.4:
Secure Development Process / 3.5:
Change Management / 3.5.1:
Peer Reviews / 3.5.2:
Development Tool Security / 3.5.3:
Secure Coding / 3.5.4:
Software Testing and Verification / 3.5.5:
Development Process Efficiency / 3.5.6:
Independent Expert Validation / 3.6:
Common Criteria / 3.6.1:
Case Study: Operating System Protection Profiles / 3.6.2:
Case Study: HAWS-High-Assurance Web Server / 3.7:
Model-Driven Design / 3.7.1:
Introduction to MDD / 3.8.1:
Executable Models / 3.8.2:
Modeling Languages / 3.8.3:
Types of MDD Platforms / 3.8.4:
Case Study: A Digital Pathology Scanner / 3.8.5:
Selecting an MDD Platform / 3.8.6:
Using MDD in Safety-and Security-Critical Systems / 3.8.7:
Embedded Cryptography / 3.9:
Introduction / 4.1:
U.S. Government Cryptographic Guidance / 4.2:
NSA Suite B / 4.2.1:
The One-Time Pad / 4.3:
Cryptographic Synchronization / 4.3.1:
Cryptographic Modes / 4.4:
Output Feedback / 4.4.1:
Cipher Feedback / 4.4.2:
OFB with CFB Protection / 4.4.3:
Traffic Flow Security / 4.4.4:
Counter Mode / 4.4.5:
Block Ciphers / 4.5:
Additional Cryptographic Block Cipher Modes / 4.5.1:
Authenticated Encryption / 4.6:
CCM / 4.6.1:
Galois Counter Mode / 4.6.2:
Public Key Cryptography / 4.7:
RSA / 4.7.1:
Equivalent Key Strength / 4.7.2:
Trapdoor Construction / 4.7.3:
Key Agreement / 4.8:
Man-in-the-Middle Attack on Diffie-Hellman / 4.8.1:
Public Key Authentication / 4.9:
Certificate Types / 4.9.1:
Elliptic Curve Cryptography / 4.10:
Elliptic Curve Digital Signatures / 4.10.1:
Elliptic Curve Anonymous Key Agreement / 4.10.2:
Cryptographic Hashes / 4.11:
Secure Hash Algorithm / 4.11.1:
MMO / 4.11.2:
Message Authentication Codes / 4.12:
Random Number Generation / 4.13:
True Random Number Generation / 4.13.1:
Pseudo-Random Number Generation / 4.13.2:
Key Management for Embedded Systems / 4.14:
Case Study: The Walker Spy Case / 4.14.1:
Key Management-Generalized Model / 4.14.2:
Key Management Case Studies / 4.14.3:
Cryptographic Certifications / 4.15:
FIPS 140-2 Certification / 4.15.1:
NSA Certification / 4.15.2:
Data Protection Protocols for Embedded Systems / 4.16:
Data-in-Motion Protocols / 5.1:
Generalized Model / 5.2.1:
Choosing the Network Layer for Security / 5.2.2:
Ethernet Security Protocols / 5.2.3:
BPsec versus SSL / 5.2.4:
IPsec / 5.2.5:
SSL/TLS / 5.2.6:
Embedded VPN Clients / 5.2.7:
DTLS / 5.2.8:
SSH / 5.2.9:
Custom Network Security Protocols / 5.2.10:
Application of Cryptography within Network Security Protocols / 5 2.11:
Secure Multimedia Protocols / 5.2.12:
Broadcast Security / 5.2.13:
Data-at-Rest Protocols / 5.3:
Choosing the Storage Layer for Security / 5.3.1:
Symmetric Encryption Algorithm Selection / 5.3.2:
Managing the Storage Encryption Key / 5 3 3:
Advanced Threats to Data Encryption Solutions / 5.3.4:
Emerging Applications / 5.4:
Embedded Network Transactions / 6.1:
Anatomy of a Network Transaction / 6.1.1:
State of Insecurity / 6.1.2:
Network-based Transaction Threats / 6 1 3:
Modern Attempts to Improve Network Transaction Security / 6.1.4:
Trustworthy Embedded Transaction Architecture / 6.1.5:
Automotive Security / 6.2:
Vehicular Security Threats and Mitigations / 6.2.1:
Secure Android / 6.3:
Android Security Retrospective / 6.3.1:
Android Device Rooting / 6.3.2:
Mobile Phone Data Protection: A Case Study of Defense-in-Depth / 6.3.3:
Android Sandboxing Approaches / 6.3.4:
Next-Generation Software-Defined Radio / 6.4:
Red-Black Separation / 6.4.1:
Software-Defined Radio Architecture / 6.4.2:
Enter Linux / 6.4.3:
Multi-Domain Radio / 6.4.4:
Index / 6.5:
Foreword
Preface
Acknowledgements
6.

電子ブック

EB
Zhening Li, Simai He
出版情報: SpringerLink Books - AutoHoldings , Dordrecht : Springer New York, 2012
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
History / 1.1:
Applications / 1.1.1:
Algorithms / 1.1.2:
Contributions / 1.2:
Notations and Models / 1.3:
Objective Functions / 1.3.1:
Constraint Sets / 1.3.2:
Models and Organization / 1.3.3:
Preliminary / 1.4:
Tensor Operations / 1.4.1:
Approximation Algorithms / 1.4.2:
Randomized Algorithms / 1.4.3:
Semidefinite Programming Relaxation and Randomization / 1.4.4:
Polynomial Optimization Over the Euclidean Ball / 2:
Multilinear Form / 2.1:
Computational Complexity / 2.1.1:
Cubic Case / 2.1.2:
General Fixed Degree / 2.1.3:
Homogeneous Form / 2.2:
Link Between Multilinear Form and Homogeneous Form / 2.2.1:
The Odd Degree Case / 2.2.2:
The Even Degree Case / 2.2.3:
Mixed Form / 2.3:
Complexity and a Step-by-Step Adjustment / 2.3.1:
Extended Link Between Multilinear Form and Mixed Form / 2.3.2:
Inhomogeneous Polynomial / 2.4:
Homogenization / 2.4.1:
Multilinear Form Relaxation / 2.4.2:
Adjusting the Homogenizing Components / 2.4.3:
Feasible Solution Assembling / 2.4.4:
Extensions of the Constraint Sets / 3:
Hypercube and Binary Hypercube / 3.1:
Hypercube / 3.1.1:
The Euclidean Sphere / 3.2:
Intersection of Co-centered Ellipsoids / 3.3:
Convex Compact Set / 3.3.1:
Mixture of Binary Hypercube and the Euclidean Sphere / 3.5:
Homogeneous Polynomial Optimization Over the Euclidean Sphere / 3.5.1:
Singular Values of Trilinear Forms / 4.1.1:
Rank-One Approximation of Tensors / 4.1.2:
Eigenvalues and Approximation of Tensors / 4.1.3:
Density Approximation in Quantum Physics / 4.1.4:
Inhomogeneous Polynomial Optimization Over a General Set / 4.2:
Portfolio Selection with Higher Moments / 4.2.1:
Sensor Network Localization / 4.2.2:
Discrete Polynomial Optimization / 4.3:
The Cut-Norm of Tensors / 4.3.1:
Maximum Complete Satisfiability / 4.3.2:
Box-Constrained Diophantine Equation / 4.3.3:
Mixed Integer Programming / 4.4:
Matrix Combinatorial Problem / 4.4.1:
Vector-Valued Maximum Cut / 4.4.2:
Concluding Remarks / 5:
References
Introduction / 1:
History / 1.1:
Applications / 1.1.1:
7.

電子ブック

EB
Hubregt J. Visser
出版情報: Wiley Online Library - AutoHoldings Books , Hoboken : Wiley Telecom, 2012
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
List of Abbreviations
Introduction / 1:
The Early History of Antennas / 1.1:
Antennas and Electromagnetic Radiation / 1.2:
Electromagnetic Radiation / 1.2.1:
Short Wire Dipole Radiation / 1.2.2:
The Modern History of Antennas / 1.3:
Frequency Spectrum and Antenna Types / 1.4:
Dipole Antennas / 1.4.1:
Loop Antennas / 1.4.2:
Aperture Antennas / 1.4.3:
Reflector Antennas / 1.4.4:
Array Antennas / 1.4.5:
Modem Antennas / 1.4.6:
Organization of the Book / 1.5:
Problems / 1.6:
References
Antenna System-Level Performance Parameters / 2:
Radiation Pattern / 2.1:
Field Regions / 2.1.1:
Three-Dimensional Radiation Pattern / 2.1.2:
Planar Cuts / 2.1.3:
Power Patterns / 2.1.4:
Directivity and Gain / 2.1.5:
Antenna Beamwidth / 2.1.6:
Antenna Impedance and Bandwidth / 2.2:
Polarization / 2.3:
Elliptical Polarization / 2.3.1:
Circular Polarization / 2.3.2:
Linear Polarization / 2.3.3:
Axial Ratio / 2.3.4:
Antenna Effective Area and Vector Effective Length / 2.4:
Effective Area / 2.4.1:
Vector Effective Length / 2.4.2:
Radio Equation / 2.5:
Radar Equation / 2.6:
Radar Cross-Section / 2.6.1:
Vector Analysis / 2.7:
Addition and Subtraction / 3.1:
Products / 3.2:
Scalar Product or Dot Product / 3.2.1:
Vector Product or Cross Product / 3.2.2:
Triple Product / 3.2.3:
Differentiation / 3.3:
Gradient / 3.3.1:
Divergence / 3.3.2:
Curl / 3.3.3:
Radiated Fields / 3.4:
Maxwell Equations / 4.1:
Vector Potential / 4.2:
Far-Field Approximations / 4.3:
Magnetic Field / 4.3.1:
Electric Field / 4.3.2:
Reciprocity / 4.4:
Lorentz Reciprocity Theorem / 4.4.1:
Antenna Reciprocity / 4.4.2:
Elementary Dipole / 4.5:
Radiation / 5.1.1:
Input Impedance / 5.1.2:
Non-Infinitesimal Dipole Antenna / 5.2:
Printed Monopole and Inverted-F Antennas / 5.2.1:
Application of Theory / 5.3.1:
Planar Monopole Antenna Design / 5.3.2:
Printed UWB Antenna Design / 5.3.3:
Miniature Monopole with Cable Current Suppression / 5.3.4:
Inverted-F Antenna Design / 5.3.5:
General Constant Current Loop / 5.4:
Small Loop Antenna / 6.1.1:
Comparison of Short Dipole and Small Loop Antenna / 6.1.4:
Printed Loop Antenna / 6.2:
Design of a Printed Loop Antenna / 6.2.1:
Magnetic Sources / 6.3:
Uniqueness Theorem / 7.2:
Equivalence Principle / 7.3:
Uniform Distribution in a Rectangular Aperture / 7.4:
Uniform Distribution in a Circular Aperture / 7.6:
Microstrip Antennas / 7.7:
Design of a Linearly Polarized Microstrip Antenna / 7.7.1:
Design of a Circularly Polarized Microstrip Antenna / 7.7.3:
A Linear Array of Non-Isotropic Point-Source Radiators / 7.8:
Array Factor / 8.2:
Side Lobes and Grating Lobes / 8.3:
Side-Lobe Level / 8.3.1:
Grating Lobes / 8.3.2:
Linear Phase Taper / 8.4:
Special Topics / 8.5:
Mutual Coupling / 8.6.1:
Antenna Diversity / 8.6.2:
Sequential Rotation and Phasing / 8.6.3:
Array Antenna Design / 8.7:
Theory / 8.7.1:
A Linear Microstrip Patch Array Antenna / 8.7.2:
Effective Aperture and Directivity / 8.8:
Vector Formulas / Appendix B:
Complex Analysis / Appendix C:
Complex Numbers / C.1:
Use of Complex Variables / C.2:
Physical Constants and Material Parameters / Appendix D:
Two-Port Network Parameters / Appendix E:
Transmission Line Theory / Appendix F:
Distributed Parameters / F.1:
Guided Waves / F.2:
VSWR and Reflection Factor / F.2.1:
Impedance and Relative Impedance / F.2.2:
Input Impedance of a Transmission Line / F.3:
Terminated Lossless Transmission Line / F.4:
Matched Load / F.4.1:
Short Circuit / F.4.2:
Open Circuit / F.4.3:
Imaginary Unit Termination / F.4.4:
Real Termination / F.4.5:
Quarter Wavelength Impedance Transformer / F.5:
Coplanar Waveguide (CPW) / Appendix G:
Index
Preface
Acknowledgements
List of Abbreviations
8.

電子ブック

EB
Brandau, Ottmar Brandau, Plastics Design Library.
出版情報: Elsevier ScienceDirect Books , William Andrew Publishing, 2012
所蔵情報: loading…
目次情報: 続きを見る
Acknowledgments
Editor's Note
Foreword to the Second Edition
PET Beverage Bottles / 1:
From the First Idea to the Finished Bottle / 1.1:
Development Over the Past 25-30 Years / 1.1.1:
Starting Point of a Product Development / 1.1.2:
Design Engineering / 1.1.3:
Determination of Bottle Properties / 1.2:
Top Load / 1.2.1:
Internal Pressure / 1.2.2:
Handling Stability / 1.2.3:
Stress Cracking / 1.2.4:
Barrier / 1.2.5:
Generating the First Design in CAD / 1.3:
The Bottle Design Already Exists / 1.3.1:
Creation of a New Design / 1.3.2:
From Shape to Full-Fledged Design for a Dependable Process / 1.4:
From the Ideal to the Real Preform / 1.4.1:
Bottle Design for a Dependable Process / 1.4.2:
Verification of the 3D Design Through Finite-element Simulation / 1.5:
What is FEM? / 1.5.1:
What FEM Can Do / 1.5.2:
What FEM Cannot Do / 1.5.3:
Selection of the Mold Concept to Meet Customer-specific Criteria / 1.6:
Shell Molds / 1.6.1:
Hot-fill Molds / 1.6.2:
Mold Design and Mold Manufacture / 1.7:
Mold Design / 1.7.1:
Mold Making / 1.7.2:
Mold Trials and Examination of Sample Bottles / 1.8:
Mold Trials on Laboratory Machines / 1.8.1:
Process Finding During Mold Trials / 1.8.2:
Laboratory Tests on Sample Bottles / 1.8.3:
PET Preforms / 2:
Introduction / 2.1:
Manufacture and States of PET / 2.2:
Manufacture of PET / 2.2.1:
Catalysts / 2.2.2:
PET is a Linear Condensation Polymer / 2.2.3:
Crystallization of PET / 2.2.4:
"Extended Chain" or "Oriented" Crystallization / 2.2.5:
Summary / 2.2.6:
Behavior in the Blow Mold 56 2.3.1 Natural stretch Ratio (or Natural Draw Ratio) / 2.3:
Manufacture of PET Preforms / 2.4:
Drying of PET / 2.4.1:
The Theory of Injection Molding of Preforms / 2.4.2:
Preforms for Single- and Two-stage Processing / 2.5:
Two-stage Process Injection Molding / 2.5.1:
Two-stage Process Blow Molding / 2.5.2:
Single-stage Process / 2.5.3:
Hot Runner Controls / 2.5.4:
Gate Mechanism / 2.5.5:
PET and Infrared Radiation / 2.6:
Practical Guide to Injection Molding of Preforms / 3:
Extrusion and Screw Control / 3.1:
Injection Parameters / 3.2:
Injection Pressure / 3.2.1:
Injection Speed and Time / 3.2.2:
Transition Point / 3.2.3:
Hold Time and Pressure / 3.2.4:
Decompression / 3.2.5:
Cooling Time / 3.2.6:
Gating / 3.2.7:
Postmold Cooling Devices / 3.2.8:
Machine Cycle Improvements / 3.2.9:
Optimizing the Injection Settings / 3.3:
Cycle Time Calculations / 3.4:
Challenges in Thin-wall Molding / 3.5:
Acetaldehyde in PET Bottles / 3.6:
AA Creation / 3.6.1:
AA in Water Bottles / 3.6.2:
AA-level Measurements / 3.6.3:
Injection Tooling / 3.7:
Cooling Issues / 3.8:
Antifreeze / 3.8.1:
Water Flow Balance / 3.8.2:
Tool Wear Issues / 3.9:
Closures for PET Bottles / 4:
Closure History / 4.1:
Closure Functions / 4.1.2:
Different Neck Finishes for Various Applications / 4.2:
Neck Finishes for CSD Bottles / 4.2.1:
Neck Finishes for Still Water Bottles / 4.2.2:
Neck Finishes for Hot-filled Products / 4.2.3:
Necks for Custom Bottles / 4.2.4:
Closure Types / 4.3:
One-piece Closures / 4.3.1:
Two-piece Closures / 4.3.2:
Sports Closures / 4.3.3:
Closures and Shelf Life / 4.3.4:
Multilayer Liners / 4.3.5:
Tamper-evident Bands / 4.4:
Construction Methods / 4.4.1:
Pilfer-proof Rings and Their Construction / 4.4.2:
Resins / 4.5:
Polypropylene / 4.5.1:
High-density Polyethylene / 4.5.2:
Manufacturing Methods / 4.6:
Injection Molding / 4.6.1:
Compression Molding / 4.6.2:
Comparison of TM-CM / 4.6.3:
Economic Guidelines / 4.7:
Test Procedures / 4.8:
Proper Application Test / 4.8.1:
Top-load Vent Test / 4.8.2:
Cold Removal Torque Test / 4.8.3:
Ambient Removal Torque Test / 4.8.4:
Cycle Test at Elevated Temperature / 4.8.5:
Vent/Flow Performance Test / 4.8.6:
Strip Torque Test / 4.8.7:
Carbonation Retention Non-top Load / 4.8.8:
Carbonation Retention at Elevated Temperature / 4.8.9:
Carbonation Retention with Top Load / 4.8.10:
Plastic Ball Impact Test / 4.8.11:
Drop Test / 4.8.12:
General IM Process Parameters for CSD Closures / 4.9:
Injection Time / 4.9.1:
Hold Time / 4.9.2:
Mold Closing and Opening Times / 4.9.3:
Ejection Time and Mold Opening Stroke / 4.9.5:
Plasticizing / 4.9.6:
Delay Times / 4.9.7:
Air Blast / 4.9.8:
Lightweigbing of Bottles and Caps / 4.10:
Lighter Necks / 4.10.1:
Lighter Caps / 4.10.2:
Specific Resins for Closure Production / Appendix A:
Index
Acknowledgments
Editor's Note
Foreword to the Second Edition
9.

電子ブック

EB
Brandau, Ottmar Brandau, Plastics Design Library.
出版情報: Elsevier ScienceDirect Books Complete , William Andrew Publishing, 2012
所蔵情報: loading…
目次情報: 続きを見る
Acknowledgments
Editor's Note
Foreword to the Second Edition
PET Beverage Bottles / 1:
From the First Idea to the Finished Bottle / 1.1:
Development Over the Past 25-30 Years / 1.1.1:
Starting Point of a Product Development / 1.1.2:
Design Engineering / 1.1.3:
Determination of Bottle Properties / 1.2:
Top Load / 1.2.1:
Internal Pressure / 1.2.2:
Handling Stability / 1.2.3:
Stress Cracking / 1.2.4:
Barrier / 1.2.5:
Generating the First Design in CAD / 1.3:
The Bottle Design Already Exists / 1.3.1:
Creation of a New Design / 1.3.2:
From Shape to Full-Fledged Design for a Dependable Process / 1.4:
From the Ideal to the Real Preform / 1.4.1:
Bottle Design for a Dependable Process / 1.4.2:
Verification of the 3D Design Through Finite-element Simulation / 1.5:
What is FEM? / 1.5.1:
What FEM Can Do / 1.5.2:
What FEM Cannot Do / 1.5.3:
Selection of the Mold Concept to Meet Customer-specific Criteria / 1.6:
Shell Molds / 1.6.1:
Hot-fill Molds / 1.6.2:
Mold Design and Mold Manufacture / 1.7:
Mold Design / 1.7.1:
Mold Making / 1.7.2:
Mold Trials and Examination of Sample Bottles / 1.8:
Mold Trials on Laboratory Machines / 1.8.1:
Process Finding During Mold Trials / 1.8.2:
Laboratory Tests on Sample Bottles / 1.8.3:
PET Preforms / 2:
Introduction / 2.1:
Manufacture and States of PET / 2.2:
Manufacture of PET / 2.2.1:
Catalysts / 2.2.2:
PET is a Linear Condensation Polymer / 2.2.3:
Crystallization of PET / 2.2.4:
"Extended Chain" or "Oriented" Crystallization / 2.2.5:
Summary / 2.2.6:
Behavior in the Blow Mold 56 2.3.1 Natural stretch Ratio (or Natural Draw Ratio) / 2.3:
Manufacture of PET Preforms / 2.4:
Drying of PET / 2.4.1:
The Theory of Injection Molding of Preforms / 2.4.2:
Preforms for Single- and Two-stage Processing / 2.5:
Two-stage Process Injection Molding / 2.5.1:
Two-stage Process Blow Molding / 2.5.2:
Single-stage Process / 2.5.3:
Hot Runner Controls / 2.5.4:
Gate Mechanism / 2.5.5:
PET and Infrared Radiation / 2.6:
Practical Guide to Injection Molding of Preforms / 3:
Extrusion and Screw Control / 3.1:
Injection Parameters / 3.2:
Injection Pressure / 3.2.1:
Injection Speed and Time / 3.2.2:
Transition Point / 3.2.3:
Hold Time and Pressure / 3.2.4:
Decompression / 3.2.5:
Cooling Time / 3.2.6:
Gating / 3.2.7:
Postmold Cooling Devices / 3.2.8:
Machine Cycle Improvements / 3.2.9:
Optimizing the Injection Settings / 3.3:
Cycle Time Calculations / 3.4:
Challenges in Thin-wall Molding / 3.5:
Acetaldehyde in PET Bottles / 3.6:
AA Creation / 3.6.1:
AA in Water Bottles / 3.6.2:
AA-level Measurements / 3.6.3:
Injection Tooling / 3.7:
Cooling Issues / 3.8:
Antifreeze / 3.8.1:
Water Flow Balance / 3.8.2:
Tool Wear Issues / 3.9:
Closures for PET Bottles / 4:
Closure History / 4.1:
Closure Functions / 4.1.2:
Different Neck Finishes for Various Applications / 4.2:
Neck Finishes for CSD Bottles / 4.2.1:
Neck Finishes for Still Water Bottles / 4.2.2:
Neck Finishes for Hot-filled Products / 4.2.3:
Necks for Custom Bottles / 4.2.4:
Closure Types / 4.3:
One-piece Closures / 4.3.1:
Two-piece Closures / 4.3.2:
Sports Closures / 4.3.3:
Closures and Shelf Life / 4.3.4:
Multilayer Liners / 4.3.5:
Tamper-evident Bands / 4.4:
Construction Methods / 4.4.1:
Pilfer-proof Rings and Their Construction / 4.4.2:
Resins / 4.5:
Polypropylene / 4.5.1:
High-density Polyethylene / 4.5.2:
Manufacturing Methods / 4.6:
Injection Molding / 4.6.1:
Compression Molding / 4.6.2:
Comparison of TM-CM / 4.6.3:
Economic Guidelines / 4.7:
Test Procedures / 4.8:
Proper Application Test / 4.8.1:
Top-load Vent Test / 4.8.2:
Cold Removal Torque Test / 4.8.3:
Ambient Removal Torque Test / 4.8.4:
Cycle Test at Elevated Temperature / 4.8.5:
Vent/Flow Performance Test / 4.8.6:
Strip Torque Test / 4.8.7:
Carbonation Retention Non-top Load / 4.8.8:
Carbonation Retention at Elevated Temperature / 4.8.9:
Carbonation Retention with Top Load / 4.8.10:
Plastic Ball Impact Test / 4.8.11:
Drop Test / 4.8.12:
General IM Process Parameters for CSD Closures / 4.9:
Injection Time / 4.9.1:
Hold Time / 4.9.2:
Mold Closing and Opening Times / 4.9.3:
Ejection Time and Mold Opening Stroke / 4.9.5:
Plasticizing / 4.9.6:
Delay Times / 4.9.7:
Air Blast / 4.9.8:
Lightweigbing of Bottles and Caps / 4.10:
Lighter Necks / 4.10.1:
Lighter Caps / 4.10.2:
Specific Resins for Closure Production / Appendix A:
Index
Acknowledgments
Editor's Note
Foreword to the Second Edition
10.

電子ブック

EB
Carol Peters, Martin Braschler
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
The Growth of the Digital Universe / 1.1:
The Terminology / 1.2:
A Brief History / 1.3:
Enabling Technologies and Standards / 1.3.1:
Publicly-Funded Research Initiatives / 1.3.2:
Conferences and Evaluation Campaigns / 1.3.3:
Commercial Products / 1.3.4:
The Current Research Challenges / 1.4:
References
Within-Language Information Retrieval / 2:
The Retrieval Problem and Its Consequences / 2.1:
Implementation of a Within-Language Information Retrieval System / 2.3:
Indexing Phase / 2.4:
Pre-processing (Step 1) / 2.4.1:
Language Identification (Step 2) / 2.4.2:
Document Formation (Step 3) / 2.4.3:
Segmentation, Tokenisation, Parsing (Step 4) / 2.4.4:
Feature Normalisation (Step 5) / 2.4.5:
Enrichment (Step 6) / 2.4.6:
Matching Phase / 2.5:
'Bag of Words' Paradigm / 2.5.1:
Inverted Index / 2.5.2:
Basic Matching Algorithm / 2.5.3:
Vector Space Model / 2.5.4:
The tf.idf-Cosine Weighting Scheme / 2.5.5:
Relevance Feedback / 2.5.6:
Probabilistic Weighting Schemes / 2.5.7:
Ranking Using Language Models / 2.5.8:
Off-Page Information: Page Rank / 2.5.9:
Summary and Future Directions / 2.6:
Suggested Reading / 2.7:
Cross-Language Information Retrieval / 3:
Implementation of Cross-Language Information Retrieval / 3.1:
Query Translation and Document Translation / 3.2.1:
No Translation / 3.2.2:
Different Types of Translation Resources / 3.2.3:
Term Ambiguity / 3.2.4:
Translation Approaches for Cross-Language Information Retrieval / 3.3:
Machine-Readable Dictionaries / 3.3.1:
Statistical Approaches / 3.3.2:
Pre-translation and Post-translation Query Expansion / 3.3.3:
Machine Translation / 3.3.4:
Combination Approaches / 3.3.5:
Handling Many Languages / 3.4:
CLIR Flows / 3.4.1:
Merging Across Languages / 3.4.2:
Document Translation / 3.4.3:
Indirect Translation / 3.4.4:
Interaction and User Interfaces / 3.5:
Information Seeking and User Interaction / 4.1:
Users' Information Needs and Search Tasks / 4.2:
Users' Language Skills and Cultural Differences / 4.3:
Supporting Multilingual User Interaction / 4.4:
Query Formulation and Translation / 4.4.1:
Document Selection and Examination / 4.4.2:
Query Reformulation / 4.4.3:
Browsing and Visualisation / 4.4.4:
Designing Multilingual Search User Interfaces / 4.5:
User-Centred Design / 4.5.1:
Internationalisation and Localisation / 4.5.2:
Case Study: CLIR in Google's Web Search / 4.5.3:
Evaluation for Multilingual Information Retrieval Systems / 4.6:
System-Oriented Evaluation / 5.1:
The Cranfield Tradition / 5.2.1:
Evaluation Campaigns / 5.2.2:
Building a Test Collection / 5.2.3:
Promoting Research into Multilingual and Multimedia System Development via Evaluation / 5.2.4:
Alternative Methodologies for Test Collection Construction / 5.2.5:
Performance Measures / 5.2.6:
Statistical Significance Testing / 5.2.7:
System Effectiveness and User Satisfaction / 5.2.8:
User-Oriented Evaluation / 5.3:
Experimental Design / 5.3.1:
Evaluating Interactive CLIR Systems at CLEF / 5.3.2:
Alternative Performance Measures / 5.3.3:
Evaluating Your Own System / 5.4:
Applications of Multilingual Information Access / 5.5:
Beyond Multilingual Textual Document Retrieval / 6.1:
Image Retrieval / 6.2.1:
Speech Retrieval / 6.2.2:
Video Retrieval / 6.2.3:
Question Answering / 6.2.4:
Multilingual Information Access in Practice / 6.3:
Web Search / 6.3.1:
Digital Libraries and Cultural Heritage / 6.3.2:
Medicine and Healthcare / 6.3.3:
Government and Law / 6.3.4:
Business and Commerce / 6.3.5:
Summing Up / 6.4:
Glossary of Acronyms
Index
Introduction / 1:
The Growth of the Digital Universe / 1.1:
The Terminology / 1.2:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼