| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910465323203321 |
|
|
Titolo |
Powder metallurgy technology and equipment : selected topics / / edited by G.S. Upadhyaya |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Zurich-Durnten ; ; Enfield, New Hampshire : , : Trans Tech Publications, , [2012] |
|
©2012 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (186 p.) |
|
|
|
|
|
|
Collana |
|
Materials science foundations, , 1422-3597 ; ; volume 73 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Powder metallurgy |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Powder Metallurgy Technology and Equipment: Selected Topics; Dedicated to My Friend; The Editor; Preface; Table of Contents; Table of Contents; Powder Metallurgy Technology : An Introductory Overview; Advanced Screening to Produce High Performance Powder Metals; Pneumatic Transport of Bulk Powder: Design and Equipment; Powder Metallurgy Compaction Press Selection: Risks and Opportunities; Capabilities of Conventional and Advanced Powder Compacting Presses; New Press Type EP with Electrical Servo Drive System; Industrial Furnaces in Powder Metallurgy and their Process Technological Background |
Powder Injection Moulding: Process and Equipment Debinding Equipment for Powder Metal Injection Molded (MIM) Parts; Sintering Equipment for Powder Metal Injection Molded (MIM) Parts; High Temperature Mechanical Properties Measurements of Sintered Products by Impulse Excitation Technique; An Integrated Approach to optimize the Interaction of Powder Concepts, Tooling and Compaction Aspects in PM Component Manufacturing; Organisations of the Contributors; Index; Authors Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Powder metallurgy is one of the leading processes used for forming engineering components. The technology, as developed at the beginning of the 20th century, has since advanced significantly from |
|
|
|
|
|
|
|
|
|
|
|
|
|
both the materials and energy-conservation points of view. Novel, and automated, equipment has played a significant role in enhancing the growth of the powder metallurgy industry. The present work includes, in addition to the editor's introductory paper, eleven invited papers from organizations of international repute. In brief, the book presents expert assessments from the major metal-powder and powd |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910851986503321 |
|
|
Titolo |
ICT Systems Security and Privacy Protection : 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers / / edited by Norbert Meyer, Anna Grocholewska-Czuryło |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2024.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIII, 378 p. 100 illus., 79 illus. in color.) |
|
|
|
|
|
|
Collana |
|
IFIP Advances in Information and Communication Technology, , 1868-422X ; ; 679 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Computer engineering |
Computer networks |
Computers |
Cryptography |
Data encryption (Computer science) |
Data and Information Security |
Computer Engineering and Networks |
Computing Milieux |
Computer Communication Networks |
Cryptology |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Web Content Integrity Tamper-proof websites beyond HTTPS -- Privacy-Preserving Clustering for Multi-Dimensional Data Randomization under LDP -- Hierarchical Model-Based Cybersecurity Risk Assessment During System Design -- The Influence of Privacy Concerns on Cryptocurrency Acceptance -- Automated Enrichment of Logical Attack Graphs via Formal Ontologies -- Detecting Web Bots via Mouse Dynamics and Communication Metadata -- Practical Single-Round Secure Wildcard Pattern Matching -- Efficient non-interactive anonymous communication -- PointPuff An Ed25519 Optimization Implementation -- Detecting web tracking at the network layer -- What’s inside a node? Malicious IPFS nodes under the magnifying glass -- Quantum-secure Communication for Trusted Edge Computing with IoT Devices -- Evaluation of a Red Team Automation Tool in live Cyber Defence Exercises -- Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe -- An Accurate and Real-time Detection Method for Concealed Slow HTTP DoS in Backbone Network -- Towards An Information Privacy Competency Model for the Usage of Mobile Applications -- SecPassInput: Towards Secure Memory and Password Handling in Web Applications -- Bl0ck Paralyzing 802.11 connections through Block Ack frames -- Enhancing the ACME Protocol to Automate the Management of All X 509 Web Certificates -- MADONNA Browser-Based MAlicious Domain Detection through Optimized Neural Network with Feature Analysis -- Cyber Key Terrain Identification Using Adjusted PageRank Centrality -- Machine Learning Metrics for Network Datasets Evaluation -- Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools -- Real-time Platform Identification of VPN Video Streaming Based on Side-Channel Attack -- Toward the Establishment of Evaluating URL Embedding Methods using Intrinsic Evaluator viaMalicious URLs Detection -- Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 38th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2023, held in Poznan, Poland, in June 2023. The 26 full papers included in this book were carefully reviewed and selected from 84 submissions. They focus on topics such as access control and authentication; applied cryptography; mobile security; side-channel attacks; trust management, digital forensics; industry networks security, etc. . |
|
|
|
|
|
|
|
| |