01731nam 2200493 450 991070700260332120160420142400.0(CKB)5470000002461467(OCoLC)947003405(EXLCZ)99547000000246146720160420j201506 ua 0engurcn|||||||||txtrdacontentcrdamediacrrdacarrierComparison of models for ball bearing dynamic capacity and life /Pradeep K. Gupta, Fred B. Oswald and Erwin V. ZaretskyCleveland, Ohio :National Aeronautics and Space Administration, Glenn Research Center,June 2015.1 online resource (iii, 27 pages) color illustrationsNASA/TM ;2015-218745Title from title screen (viewed on April 20, 2016)."June 2015.""An erratum was added to this report March 2016."Includes bibliographical references (pages 26-27).Ball bearingsnasatElastic propertiesnasatFatigue lifenasatLoads (forces)nasatPrediction analysis techniquesnasatBall bearings.Elastic properties.Fatigue life.Loads (forces)Prediction analysis techniques.Gupta Pradeep K.1409483Oswald Fred B.Zaretsky Erwin V.NASA Glenn Research Center,GPOGPOBOOK9910707002603321Comparison of models for ball bearing dynamic capacity and life3496010UNINA02235nam0 22004813i 450 VAN027942420240709102502.273N978303137019920240709d2023 |0itac50 baengCH|||| |||||Design Methods for Reducing Failure Probabilities with Examples from Electrical EngineeringDoctoral Thesis accepted by Technische Universität Darmstadt, GermanyMona FuhrländerChamSpringer2023xxii, 153 p.ill.24 cm001VAN01041932001 Springer thesesrecognizing outstanding Ph.D. research210 BerlinSpringer2010-Adaptive Newton-Monte Carlo methodKW:KDesign and Optimization of Electrotechnical DevicesKW:KGaussian process regressionKW:KHermite BOBYQAKW:KHermite Least Squares OptimizationKW:KHybrid Monte Carlo MethodKW:KManufacturing UncertaintiesKW:KMaxwell’s equationsKW:KMixed Gradient OptimizationKW:KModeling Electromagnetic PhenomenaKW:KMulti-objective Yield OptimizationKW:KPermanent Magnet Synchronous MachineKW:KRobust Design OptimizationKW:KStochastic CollocationKW:KUncertainty QuantificationKW:KYield OptimizationKW:KCHChamVANL001889FuhrländerMonaVANV2319971425292Springer <editore>VANV108073650ITSOL20240719RICAhttps://doi.org/10.1007/978-3-031-37019-9E-book – Accesso al full-text attraverso riconoscimento IP di Ateneo, proxy e/o ShibbolethBIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICAIT-CE0120VAN08NVAN0279424BIBLIOTECA DEL DIPARTIMENTO DI MATEMATICA E FISICA08CONS e-Book 9411 08eMF9411 20240715 Design Methods for Reducing Failure Probabilities with Examples from Electrical Engineering3555502UNICAMPANIA04283nam 22006135 450 991025498410332120251116161828.03-319-41187-X10.1007/978-3-319-41187-3(CKB)3710000000873014(DE-He213)978-3-319-41187-3(MiAaPQ)EBC5577829(PPN)195513584(EXLCZ)99371000000087301420160923d2016 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierIntroduction to Cyberdeception /by Neil C. Rowe, Julian Rrushi1st ed. 2016.Cham :Springer International Publishing :Imprint: Springer,2016.1 online resource (XIV, 334 p. 61 illus., 49 illus. in color.) 3-319-41185-3 Includes bibliographical references.Introduction -- Psychology of Deception -- Professional Deception -- Deception Methods for Defense -- Deception Methods for Offense -- Delays -- Fakes -- Defensive Camouflage -- False Excuses -- Defensive Social Engineering -- Measuring Deception -- Planning Cyberspace Deception -- Software Engineering of Deceptive Software and Systems -- Decoy I/O Devices -- Deception for the Electrical Power Industry -- Law and Ethics for Software Deception. .This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list. Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems. .Computer securityComputer networksApplication softwareData encryption (Computer science)Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer security.Computer networks.Application software.Data encryption (Computer science)Systems and Data Security.Computer Communication Networks.Information Systems Applications (incl. Internet).Cryptology.005.8Rowe Neil C.authttp://id.loc.gov/vocabulary/relators/aut753105Rrushi Julianauthttp://id.loc.gov/vocabulary/relators/autMiAaPQMiAaPQMiAaPQBOOK9910254984103321Introduction to Cyberdeception2184077UNINA