| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996209875603316 |
|
|
Titolo |
Mirandum : estudos e seminários |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Barcelona, : Univ |
|
São Paolo, : Univ., 1997- |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Classificazione |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Periodico |
|
|
|
|
|
2. |
Record Nr. |
UNINA9911046704003321 |
|
|
Autore |
Navarro Abel R |
|
|
Titolo |
Evaluación de la Metodología de Inspección y Variabilidad de Resultados en la Inspección de Gases de Vehículos de Categoría L (L3e) |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Elche : , : Universidad Miguel Hernández, , 2024 |
|
©2024 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (124 pages) |
|
|
|
|
|
|
Altri autori (Persone) |
|
SánchezEmilio Velasco |
SempereÓscar Cuadrado |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Motorcycles |
Environmental engineering |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
ÍNDICE -- 1. Introducción -- 2. Antecedentes -- 3. Objetivos -- 3.1 |
|
|
|
|
|
|
|
|
|
|
|
Manual de Procedimientos de Inspección de las Estaciones de I.T.V., v.7.7.0. [2] -- 3.2 Reglamento General de Vehículos (RGV), Art.11.19.[4] -- 3.3 Reglamento CEPE/ONU 40 R [8] -- 3.4 Reglamento CEPE/ONU 47 R [9] -- 3.5 Norma UNE 82501 [10] -- 3.6 Reglamento (UE) 134/2014 [11] -- 3.6.1 DIRECTIVA 2010/48/UE [13] -- 3.7 Reglamento (UE) 901/2014 [15] -- 4. Metodología. Materiales y métodos. -- 4.1 Equipo utilizado -- 4.2 Vehículos ensayados -- 5. Resultados -- 5.1 BMW R 850R. Moto 1. -- 5.2 HONDA CB650R. Moto 2. -- 5.3 DUCATI MTS 1100 S. Moto 3. -- 5.4 GILERA NEXUS 250. Moto 4. -- 5.5 KIMCO K-XCT. Moto 5. -- 5.6 HONDA CBF600N (sin SACE). Moto 6. -- 5.7 HONDA VT600C. Moto 7. -- 5.8 HONDA SHADOW 125. Moto 8. -- 5.9 SUZUKI GLC. Moto 9. -- 5.10 BMW K100 RT. Moto 10. -- 6. Tendencia de la % CO en vol. a ralentí (sin colector). -- 7. Análisis general de los resultados -- 8. Conclusiones -- 9. Trabajos futuros |
|
|
|
|
|
|
Sommario/riassunto |
|
This book evaluates inspection methodologies and variability in gas emission results for motorcycles classified under category L (L3e). It critically analyzes section 5.2 of the Inspection Manual for vehicle testing stations, focusing on emissions measurement techniques and their reliability. The study includes tests on ten motorcycles with varying engine sizes, cylinder numbers, transmission types, and the presence or absence of Advanced Emission Control Systems (SACE). Key findings highlight the influence of probe insertion depth on CO emission readings and recommend standardized exhaust collectors for consistent measurements. The book aims to enhance inspection protocols and emission control systems to comply with European regulations. It is intended for automotive engineers, vehicle inspectors, and policymakers involved in environmental and vehicular standards. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNISA996655264803316 |
|
|
Titolo |
Advances in Cryptology – EUROCRYPT 2025 : 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part V / / edited by Serge Fehr, Pierre-Alain Fouque |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2025.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XX, 486 p. 63 illus., 18 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 15605 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Computer networks - Security measures |
Computer networks |
Application software |
Data protection |
Cryptology |
Mobile and Network Security |
Computer Communication Networks |
Computer and Information Systems Applications |
Security Services |
Xifratge (Informàtica) |
Seguretat informàtica |
Congressos |
Llibres electrònics |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Secure Multiparty Computation II: Multi-key Homomorphic Secret Sharing -- Disincentivize Collusion in Veri able Secret Sharing -- Juggernaut: Efficient Crypto-Agnostic Byzantine Agreement -- MiniCast: Minimizing the Communication Complexity of Reliable Broadcast -- Asymptotically Optimal Early Termination for Dishonest Majority Broadcast -- Efficient Pseudorandom Correlation Generators |
|
|
|
|
|
|
|
|
|
|
|
for Any Finite Field -- Efficient Distributed Randomness Generation from Minimal Assumptions where PArties Speak Sequentially Once -- Simultaneous-Message and Succinct Secure Computation -- Efficient Multiparty Private Simultaneous Messages for Symmetric Functions -- MPC with Publicly Identi able Abort from Pseudorandomness and Homomorphic Encryption -- The Complexity of Memory Checking with Covert Security -- Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions -- Black-Box Constant-Round Secure 2PC with Succinct Communication -- Peeking Into the Future: MPC Resilient to Super-Rushing Adversaries -- Weakly Super-Invertible Matrices and Constant Communication Dishonest Majority MPC -- Honest Majority MPC with Õ(/C/) Communication in Minicrypt. |
|
|
|
|
|
|
Sommario/riassunto |
|
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows: Part I: Secure Multiparty Computation I Part II: Public-Key Cryptography and Key-Exchange Part III: Advanced Cryptographic Schemes Part IV: (Non-)Interactive Proofs and Zero-Knowledge Part V: Secure Multiparty Computation II Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks Part VII: Theoretical Foundations Part VIII: Real-World Cryptography. |
|
|
|
|
|
|
|
| |