| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910271253903321 |
|
|
Autore |
Wollkind David J |
|
|
Titolo |
Comprehensive Applied Mathematical Modeling in the Natural and Engineering Sciences : Theoretical Predictions Compared with Data / / by David J. Wollkind, Bonni J. Dichone |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2017.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XXI, 607 p. 134 illus., 16 illus. in color.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Mathematical models |
Biomathematics |
Mathematical physics |
Mathematical Modeling and Industrial Mathematics |
Mathematical and Computational Biology |
Mathematical Applications in the Physical Sciences |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Introduction -- Part I -- Canonical Projectile Problem: Finding the Escape Velocity of the Earth -- Of Mites and Models -- Canonical Soap Film Problem -- Heat Conduction in a Finite Bar with a Linear Source -- Heat Conduction in a Semi-Infinite Bar -- Initiation of Cellular Slime Mold Aggregation Viewed as an Instability -- Chemical Turning Patterns and Diffusive Instabilities -- Part II -- Governing Equations of Fluid Mechanics -- Boundary Conditions for Fluid Mechanics -- Subsonic Sound Waves Viewed as a Linear Perturbation in an Inviscid Fluid -- Potential Flow Past a Circular Cylinder of a Homogeneous Inviscid Fluid -- Viscous Fluid Flows -- Blasius Flow Past a Flat Plate -- Part III -- Rayleigh-Bernard Natural Convection Problem -- Heat Conduction in a Finite Bar with a Nonlinear Source -- Nonlinear Optical Ring-Cavity Model Driven by a Gas Laser -- Vegetative Flat Dryland Rhombic Pattern Formation Driven by Root Suction -- Part IV -- Calculus Variations Revisited plus the Gamma and Bessel Functions -- Alternate Methods of Solution for Heat and Wave Equation Problems -- |
|
|
|
|
|
|
|
|
|
|
|
|
|
Finite Mathematical Models -- Concluding Capstone Problems. |
|
|
|
|
|
|
Sommario/riassunto |
|
This text demonstrates the process of comprehensive applied mathematical modeling through the introduction of various case studies. The case studies are arranged in increasing order of complexity based on the mathematical methods required to analyze the models. The development of these methods is also included, providing a self-contained presentation. To reinforce and supplement the material introduced, original problem sets are offered involving case studies closely related to the ones presented. With this style, the text’s perspective, scope, and completeness of the subject matter are considered unique. Having grown out of four self-contained courses taught by the authors, this text will be of use in a two-semester sequence for advanced undergraduate and beginning graduate students, requiring rudimentary knowledge of advanced calculus and differential equations, along with a basic understanding of some simple physical and biological scientific principles. . |
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910520068003321 |
|
|
Titolo |
Critical Information Infrastructures Security : 16th International Conference, CRITIS 2021, Lausanne, Switzerland, September 27–29, 2021, Revised Selected Papers / / edited by Dimitri Percia David, Alain Mermoud, Thomas Maillart |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2021.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (241 pages) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 13139 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Software engineering |
Application software |
Computer networks |
Computer crimes |
Data and Information Security |
Software Engineering |
Computer and Information Systems Applications |
Computer Communication Networks |
Computer Crime |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Protection of Cyber-Physical Systems and Industrial Control Systems (ICS) Bank Of Models: Sensor Attack Detection and Isolation in Industrial Control Systems -- Super Detector: An Ensemble Approach for Anomaly Detection in Industrial Control Systems -- Optimal Man-In-The-Middle Covert Attack -- GNSS Positioning Security: Automatic Anomaly Detection on Reference Stations -- C(I)IP Organisation, (Strategic) Management and Legal Aspects -- Model-Based Risk Analysis Approach for Network Vulnerability and Security of the Critical Railway Infrastructure -- A Survey on Applications of Formal Methods in Analysis of SCADA Systems -- The Cost of Incidents in Essential Services: Data from Swedish NIS Reporting -- Human Factor, Security Awareness and Crisis Management for C(I)IP and Critical Services -- Impact Analysis of PLC Performance when Applying Cyber Security Solutions Using Active Information Gathering -- Multi-Categorical Risk Assessment for Urban Critical Infrastructures -- Use-Case Informed Task Analysis for Secure and Usable Design Solutions in Rail -- Studying Neutrality in Cyber-Space: A Comparative Geographical Analysis of Honeypot Responses -- Future, TechWatch & Forecast for C(I)IP and Critical Services -- Tableau: Future-Proof Zoning for OT Networks -- Link Prediction for Cybersecurity Companies and Technologies: Towards a Survivability Score. . |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 16th International Conference on Critical Information Infrastructures Security, CRITIS 2021, which took place in Lausanne, Switzerland, during September 27-29, 2021. The 12 full papers included in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: protection of cyber-physical systems and industrial control systems (ICS); C(I)IP organization, (strategic) management and legal aspects; human factor, security awareness and crisis management for C(I)IP and critical services; and future, TechWatch and forecast for C(I)IP and critical services. |
|
|
|
|
|
|
|
| |