LEADER 03334nam 22006495 450 001 9910298446403321 005 20200706074531.0 010 $a94-017-7414-5 024 7 $a10.1007/978-94-017-7414-7 035 $a(CKB)3710000000501329 035 $a(EBL)4084541 035 $a(SSID)ssj0001583820 035 $a(PQKBManifestationID)16263814 035 $a(PQKBTitleCode)TC0001583820 035 $a(PQKBWorkID)14864205 035 $a(PQKB)10316059 035 $a(DE-He213)978-94-017-7414-7 035 $a(MiAaPQ)EBC4084541 035 $a(PPN)190521317 035 $a(EXLCZ)993710000000501329 100 $a20151105d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aGas Explosion Technology and Biomass Refinery /$fby Hongzhang Chen 205 $a1st ed. 2015. 210 1$aDordrecht :$cSpringer Netherlands :$cImprint: Springer,$d2015. 215 $a1 online resource (374 p.) 300 $aDescription based upon print version of record. 311 $a94-017-7412-9 320 $aIncludes bibliographical references at the end of each chapters. 327 $aIntroduction -- Principles of Gas Explosion Technology -- Unit Operations of Gas Explosion Technology -- Process Development of Gas Explosion Technology -- Characterization and Determinations of Gas-Exploded Materials -- Applications of Gas Explosion Technology in Biomass Refinery -- Conclusion. 330 $aThe book introduces gas explosion technology (GET) and its applications in biomass refineries. In this book an overview of GET is provided, the mechanisms are thoroughly discussed. The chapters also cover the latest processes and equipments of GET, including equipment selection, parameter determination and engineering scaling-up. Last but not least the applications of GET are introduced in details. It is an excellent reference and guidance for scientists engaging in the research of biomass and biotechnology. Professor Hongzhang Chen is the Vice Director and Supervisor of the State Key Laboratory of Biochemical Engineering at the Institute of Process Engineering of the Chinese Academy of Sciences. 606 $aBiology?Technique 606 $aBiochemical engineering 606 $aBiomaterials 606 $aRenewable energy resources 606 $aBiological Techniques$3https://scigraph.springernature.com/ontologies/product-market-codes/L28000 606 $aBiochemical Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/C12029 606 $aBiomaterials$3https://scigraph.springernature.com/ontologies/product-market-codes/Z13000 606 $aRenewable and Green Energy$3https://scigraph.springernature.com/ontologies/product-market-codes/111000 615 0$aBiology?Technique. 615 0$aBiochemical engineering. 615 0$aBiomaterials. 615 0$aRenewable energy resources. 615 14$aBiological Techniques. 615 24$aBiochemical Engineering. 615 24$aBiomaterials. 615 24$aRenewable and Green Energy. 676 $a570 700 $aChen$b Hongzhang$4aut$4http://id.loc.gov/vocabulary/relators/aut$0768759 906 $aBOOK 912 $a9910298446403321 996 $aGas Explosion Technology and Biomass Refinery$92528864 997 $aUNINA LEADER 05698nam 22008655 450 001 9910484729403321 005 20251226200543.0 010 $a3-540-68963-X 024 7 $a10.1007/11961635 035 $a(CKB)1000000000283888 035 $a(SSID)ssj0000318300 035 $a(PQKBManifestationID)11266630 035 $a(PQKBTitleCode)TC0000318300 035 $a(PQKBWorkID)10308464 035 $a(PQKB)11689258 035 $a(DE-He213)978-3-540-68963-8 035 $a(MiAaPQ)EBC3068507 035 $a(PPN)123140161 035 $a(BIP)34164613 035 $a(BIP)13947258 035 $a(EXLCZ)991000000000283888 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Systems Security $eSecond International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings /$fedited by Aditya Bagchi, Vijayalakshmi Atluri 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XVI, 384 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4332 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-68962-1 320 $aIncludes bibliographical references and index. 327 $aInvited Papers -- Privacy in the Electronic Society -- A Data Sharing Agreement Framework -- Password Exhaustion: Predicting the End of Password Usefulness -- Network Monitoring for Security and Forensics -- Data and Application Security -- Fairness Strategy for Multilevel Secure Concurrency Control Protocol -- Optimistic Anonymous Participation in Inter-organizational Workflow Instances -- O2O: Virtual Private Organizations to Manage Security Policy Interoperability -- Privacy Preserving Web-Based Email -- Access Control -- Context-Aware Provisional Access Control -- LRBAC: A Location-Aware Role-Based Access Control Model -- Extending Context Descriptions in Semantics-Aware Access Control -- Specification and Realization of Access Control in SPKI/SDSI -- Key Management and Security in Wireless Networks -- Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack -- An Efficient Key Assignment Scheme for Access Control in a Hierarchy -- Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers -- Secure Data Management in Reactive Sensor Networks -- Threat Analysis, Detection and Recovery -- Security Ontology: Simulating Threats to Corporate Assets -- Two-Stage Credit Card Fraud Detection Using Sequence Alignment -- New Malicious Code Detection Using Variable Length n-grams -- A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes -- Cryptography and Encryption -- An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack -- A Partial Image Encryption Method with Pseudo Random Sequences -- High Capacity Lossless Data Hiding -- An Implementation and Evaluation of Online Disk Encryption for Windows Systems -- Short Papers and Research Reports -- Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract) -- A Survey of Control-Flow Obfuscations -- Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments -- Secure Itineraries Framework for Mobile Agent Systems -- Malafide Intension Based Detection of Privacy Violation in Information System -- Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report) -- Towards a Formal Specification Method for Enterprise Information System Security -- Recent Research on Privacy Preserving Data Mining. 330 $aThis book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006. The 20 revised full papers and five short papers presented together with four invited papers and three ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4332 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aData protection 606 $aComputers and civilization 606 $aElectronic data processing$xManagement 606 $aInformation storage and retrieval systems 606 $aCryptology 606 $aComputer Communication Networks 606 $aData and Information Security 606 $aComputers and Society 606 $aIT Operations 606 $aInformation Storage and Retrieval 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aData protection. 615 0$aComputers and civilization. 615 0$aElectronic data processing$xManagement. 615 0$aInformation storage and retrieval systems. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aData and Information Security. 615 24$aComputers and Society. 615 24$aIT Operations. 615 24$aInformation Storage and Retrieval. 676 $a05.8 701 $aBagchi$b Aditya$01761211 701 $aAtluri$b Vijayalaksmi$01761212 712 12$aICISS (Conference) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484729403321 996 $aInformation systems security$94200515 997 $aUNINA