LEADER 05320nam 2200673 a 450 001 9910142566203321 005 20170815123419.0 010 $a1-280-55608-0 010 $a9786610556083 010 $a0-470-86834-1 010 $a1-60119-550-8 010 $a0-470-86506-7 035 $a(CKB)1000000000328696 035 $a(EBL)274328 035 $a(OCoLC)476018693 035 $a(SSID)ssj0000073000 035 $a(PQKBManifestationID)11116049 035 $a(PQKBTitleCode)TC0000073000 035 $a(PQKBWorkID)10102959 035 $a(PQKB)10319506 035 $a(MiAaPQ)EBC274328 035 $a(EXLCZ)991000000000328696 100 $a20030925d2003 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSolar technologies for buildings$b[electronic resource] /$fUrsula Eicker 210 $aChichester ;$aHoboken, NJ $cWiley$dc2003 215 $a1 online resource (337 p.) 300 $aOriginally published as: Solare Technologien fu?r Geba?ude. Stuttgart : B.G. Teubner, 2001. 311 $a0-471-48637-X 320 $aIncludes bibliographical references (p. 316-319) and index. 327 $aSolar Technologies for Buildings; Contents; Preface; Abbreviations in the text; 1 Solar energy use in buildings; 1.1 Energy consumption of buildings; 1.1.1 Residential buildings; 1.1.2 Office and administrative buildings; 1.1.3 Air conditioning; 1.2 Meeting requirements by active and passive solar energy use; 1.2.1 Active solar energy use for electricity, heating and cooling; 1.2.2 Meeting heating energy requirements by passive solar energy use; 2 Solar irradiance; 2.1 Extraterrestrial solar irradiance; 2.1.1 Power and spectral distribution of solar irradiance; 2.1.2 Sun-Earth geometry 327 $a2.1.2.1 Equator coordinates2.1.2.2 Horizon coordinates; 2.1.2.3 Sun-position diagrams; 2.2 The passage of rays through the atmosphere; 2.3 Statistical production of hourly irradiance data records; 2.3.1 Daily average values from monthly average values; 2.3.2 Hourly average values from daily average values; 2.4 Global irradiance and irradiance on inclined surfaces; 2.4.1 Direct and diffuse irradiance; 2.4.2 Conversion of global irradiance to inclined surfaces; 2.4.2.1 An isotropic diffuse irradiance model; 2.4.2.2 Diffuse irradiance model based on Perez 327 $a2.4.3 Measurement techniques for solar irradiance2.5 Shading; 3 Solar thermal energy; 3.1 Solar-thermal water collectors; 3.1.1 Innovations; 3.1.2 System overview; 3.1.3 Thermal collector types; 3.1.3.1 Swimming pool absorbers; 3.1.3.2 Flat plate collectors; 3.1.3.3 Vacuum tube collectors; 3.1.3.4 Parabolic concentrating collectors; 3.1.4 System engineering for heating drinking-water; 3.1.4.1 The solar circuit and hydraulics; 3.1.4.2 Heat storage; 3.1.4.3 Piping and circulation losses; 3.1.5 System technology for heating support 327 $a3.1.6 Large solar plants for heating drinking water with short-term stores3.1.6.1 Design of large solar plants; 3.1.7 Solar district heating; 3.1.8 Costs and economy; 3.1.9 Operational experiences and relevant standards; 3.1.10 Efficiency calculation of thermal collectors; 3.1.10.1 Temperature distribution of the absorber; 3.1.10.2 Collector efficiency factor F'; 3.1.10.3 Heat dissipation factor F(R); 3.1.10.4 Heat losses of thermal collectors; 3.1.10.5 Optical characteristics of transparent covers and absorber materials; 3.1.11 Storage modelling; 3.2 Solar air collectors 327 $a3.2.1 System engineering3.2.2 Calculation of the available thermal power of solar air collectors; 3.2.2.1 Temperature-dependent material properties of air; 3.2.2.2 Energy balance and collector efficiency factor; 3.2.2.3 Convective heat transfer in air collectors; 3.2.2.4 Thermal efficiency of air collectors; 3.2.3 Design of the air circuit; 3.2.3.1 Collector pressure losses; 3.2.3.2 Air duct systems; 4 Solar cooling; 4.1 Open cycle desiccant cooling; 4.1.1 Introduction to the technology; 4.1.2 Coupling with solar thermal collectors; 4.1.3 Costs 327 $a4.1.4 Physical and technological bases of sorption-supported air-conditioning 330 $aA complete overview of solar technologies relevant to the built environment, including solar thermal energy for heating and cooling, passive solar energy for daylighting and heating supply, and photovoltaics for electricity productionProvides practical examples and calculations to enable component and system simulation e.g. Calculation of U-values, I-V curve parameters and radiance distribution modellingDiscusses the new trends in thermal energy use, including the architectural integration of collector systems, integrated ventilation photovoltaics facades and solar powered abso 606 $aSolar buildings 606 $aSolar air conditioning 606 $aSolar heating 608 $aElectronic books. 615 0$aSolar buildings. 615 0$aSolar air conditioning. 615 0$aSolar heating. 676 $a621.47 676 $a690.8370472 676 $a720.472 700 $aEicker$b Ursula$0771664 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910142566203321 996 $aSolare technologien fu?r geba?ude$91574847 997 $aUNINA LEADER 04722nam 22006975 450 001 9910634034803321 005 20251225202056.0 010 $a3-031-22829-4 024 7 $a10.1007/978-3-031-22829-2 035 $a(MiAaPQ)EBC7152967 035 $a(Au-PeEL)EBL7152967 035 $a(CKB)25610215300041 035 $a(BIP)086286073 035 $a(PPN)268642184 035 $a(DE-He213)978-3-031-22829-2 035 $a(EXLCZ)9925610215300041 100 $a20221206d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity, Privacy, and Applied Cryptography Engineering $e12th International Conference, SPACE 2022, Jaipur, India, December 9?12, 2022, Proceedings /$fedited by Lejla Batina, Stjepan Picek, Mainack Mondal 205 $a1st ed. 2022. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2022. 215 $a1 online resource (346 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13783 311 08$aPrint version: Batina, Lejla Security, Privacy, and Applied Cryptography Engineering Cham : Springer,c2022 9783031228285 327 $aSymmetric Cryptography -- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128 -- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers -- Hardware Implementation of Masked SKINNY SBox with Application to AEAD -- Bias Cancellation of MixColumns -- Big Brother Is Watching You: A Closer Look At Backdoor Construction -- Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs -- KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems -- Protecting the most significant bits in scalar multiplication algorithms -- Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields -- Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view -- Hardware Security and AI -- What Do You See? Transforming Fault Injection Target Characterizations -- Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log -- Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs -- HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation -- How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles -- Network security, Authentication, and Privacy -- SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology -- An analysis of the hardware-friendliness of AMQ data structures for network security -- RemOD: Operational Drift-adaptive Intrusion Detection -- A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement. 330 $aThis book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9?12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13783 606 $aData protection 606 $aComputer engineering 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aComputer Engineering and Networks 606 $aCryptology 606 $aComputer Engineering and Networks 615 0$aData protection. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 14$aData and Information Security. 615 24$aComputer Engineering and Networks. 615 24$aCryptology. 615 24$aComputer Engineering and Networks. 676 $a005.8 676 $a005.8 700 $aBatina$b Lejla$0938799 701 $aPicek$b Stjepan$01272296 701 $aMondal$b Mainack$01272297 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910634034803321 996 $aSecurity, Privacy, and Applied Cryptography Engineering$92996737 997 $aUNINA