LEADER 01115cam0-2200349---450- 001 990004570190403321 005 20150720160256.0 035 $a000457019 035 $aFED01000457019 035 $a(Aleph)000457019FED01 035 $a000457019 100 $a19990604d1848----km-y0itay50------ba 101 0 $ager 102 $aAT 105 $ac-------001ey 200 1 $aMilitärische Korrespondenz des Prinzen Eugen von Savoyen$eaus österreichischen Original-Quellen$fherausgegeben von F. Heller F. Heller 210 $aWien$cC. Gerold$d1848 215 $a2 v.$cill.$d24 cm 327 1 $a1.: 1694-1702$a2.: 1703-1705 600 0$aSavoia, Eugenio di$jLettere e carteggi 610 0 $aSavoia$aStoria$aSec. 17.-18. 676 $a943.603092 676 $a944.48 700 1$aSavoia,$bEugenio di$f<1663-1736> 702 1$aHeller von Hellwald,$bFriedrich Jakob$f<1798-1864> 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004570190403321 952 $aSG 900/B 208 (1)$bR.Bibl. 9045/4721a$fFLFBC 952 $aSG 900/B 208 (2)$bBIBL.9045$fFLFBC 959 $aFLFBC 997 $aUNINA LEADER 05488nam 2200697 a 450 001 9910781898403321 005 20200520144314.0 010 $a1-283-25808-0 010 $a9786613258083 010 $a1-118-14929-7 010 $a1-118-14927-0 035 $a(CKB)2550000000051538 035 $a(EBL)818785 035 $a(OCoLC)759040871 035 $a(SSID)ssj0000630365 035 $a(PQKBManifestationID)12226456 035 $a(PQKBTitleCode)TC0000630365 035 $a(PQKBWorkID)10744967 035 $a(PQKB)11789453 035 $a(Au-PeEL)EBL818785 035 $a(CaPaEBR)ebr10494487 035 $a(CaONFJC)MIL325808 035 $a(CaSebORM)9781118004692 035 $a(MiAaPQ)EBC818785 035 $a(EXLCZ)992550000000051538 100 $a20111010d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aMortgage-backed securities$b[electronic resource] $eproducts, structuring, and analytical techniques /$fFrank J. Fabozzi, Anand K. Bhattacharya, William S. Berliner 205 $a2nd ed. 210 $aHoboken, N.J. $cWiley$d2011 215 $a1 online resource (354 p.) 225 1 $aFrank J. Fabozzi series 300 $aIncludes index. 311 $a1-118-00469-8 320 $aIncludes bibliographical references and index. 327 $aMortgage-Backed Securities: Products, Structuring, and Analytical Techniques; Contents; Preface; About the Authors; Part One: Introduction to Mortgage and MBS Markets; Chapter 1: Overview of Mortgages and the Consumer Mortgage Market; Overview of Mortgages; Mortgage Loan Mechanics; Risks Associated with Mortgages and Mortgage Products; Concepts Presented in this Chapter; Chapter 2: Overview of the Mortgage-Backed Securities Market; Creating Different Types of MBS; MBS Trading; The Role of the MBS Markets in Generating Consumer Lending Rates; Cash Flow Structuring 327 $aConcepts Presented in this ChapterPart Two: Prepayment and Default Metrics and Behavior; Chapter 3: Measurement of Prepayments and Defaults; Prepayment Terminology; Calculating Prepayment Speeds; Delinquency, Default, and Loss Terminology; Concepts Presented in this Chapter; Chapter 4: Prepayments and Factors Influencing the Return of Principal; Prepayment Fundamentals; Factors Influencing Prepayment Speeds; Defaults and ""Involuntary"" Prepayments; Concepts Presented in this Chapter; Part Three: Structuring; Chapter 5: Introduction to MBS Structuring Techniques 327 $aUnderlying Logic in Structuring Cash FlowsStructuring Different Mortgage Products; Fundamentals of Structuring CMOs; Chapter 6: Fundamental MBS Structuring Techniques: Divisions of Principal; Time Tranching; Planned Amortization Classes (PACs) and the PAC-Support Structure; Targeted Amortization Class Bonds; Z-Bonds and Accretion-Directed Tranches; A Simple Structuring Example; Concepts Presented in this Chapter; Chapter 7: Fundamental MBS Structuring Techniques: Divisions of Interest; Coupon Stripping and Boosting; Floater-Inverse Floater Combinations; Two-Tiered Index Bonds (TTIBs) 327 $aExcess Servicing IOsConcepts Presented in this Chapter; Chapter 8: Structuring Private-Label CMOs; Private-Label Credit Enhancement; Private-Label Senior Structuring Variations; Governing Documents; Concepts Presented in this Chapter; Chapter 9: The Structuring of Mortgage ABS Deals; Fundamentals of ABS Structures; Credit Enhancement for Mortgage ABS Deals; Factors Influencing the Credit Structure of Deals; Additional Structuring Issues and Developments; Concepts Presented in this Chapter; Part Four: Valuation and Analysis; Chapter 10: Techniques for Valuing MBS 327 $aStatic Cash Flow Yield AnalysisZ-Spread; Valuation Using Monte Carlo Simulation and OAS Analysis; Total Return Analysis; Concepts Presented in this Chapter; Chapter 11: Measuring MBS Interest Rate Risk; Duration; Convexity; Yield Curve Risk; Other Risk Measures; Concepts Presented in this Chapter; Chapter 12: Evaluating Senior MBS and CMOs; Yield and Spread Matrices; Monte Carlo and OAS Analysis; Total Return Analysis; Evaluating Inverse Floaters; Concepts Presented in this Chapter; Chapter 13: Analysis of Nonagency MBS; Factors Impacting Returns from Nonagency MBS 327 $aUnderstanding the Evolution of Credit Performance within a Transaction 330 $aAn up-to-date look at the latest innovations in mortgage-backed securities Since the last edition of Mortgage-Backed Securities was published over three years ago, much has changed in the structured credit market. Frank Fabozzi, Anand Bhattacharya, and William Berliner all have many years of experience working in the fixed-income securitization markets, and have witnessed many cycles of change in the mortgage and MBS sectors. And now, with the Second Edition of Mortgage-Backed Securities, they share their knowledge on many of the products and structuring innovations that have t 410 0$aFrank J. Fabozzi series. 606 $aMortgage-backed securities 615 0$aMortgage-backed securities. 676 $a332.6323 676 $a332.63232 700 $aFabozzi$b Frank J$0109596 701 $aBhattacharya$b Anand K$01517409 701 $aBerliner$b William S$01517410 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910781898403321 996 $aMortgage-backed securities$93754479 997 $aUNINA LEADER 05019nam 2200685 a 450 001 9910814983903321 005 20240516092004.0 010 $a9786613620606 010 $a9781523109869 010 $a1523109866 010 $a9781118259696 010 $a1118259696 010 $a9781118260050 010 $a1118260058 010 $a9781280590771 010 $a1280590777 010 $a9781118259689 010 $a1118259688 035 $a(CKB)2670000000174732 035 $a(StDuBDS)AH21630584 035 $a(SSID)ssj0000634295 035 $a(PQKBManifestationID)11382907 035 $a(PQKBTitleCode)TC0000634295 035 $a(PQKBWorkID)10640604 035 $a(PQKB)11494991 035 $a(MiAaPQ)EBC827145 035 $a(Au-PeEL)EBL827145 035 $a(CaPaEBR)ebr10558104 035 $a(CaONFJC)MIL362060 035 $a(OCoLC)784136711 035 $a(Perlego)1001670 035 $a(EXLCZ)992670000000174732 100 $a20111007d2012 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aDistillation control $ean engineering perspective /$fCecil L. Smith 205 $a1st ed. 210 $aHoboken, N.J. $cJohn Wiley & Sons$dc2012 215 $a1 online resource (xi, 332 p. )$cill 300 $aFormerly CIP.$5Uk 311 08$a9780470381946 311 08$a0470381949 320 $aIncludes bibliographical references and index. 327 $aMachine generated contents note: Chapter 1. Principles 1.1 Separation Processes 1.2 Total Material Balance 1.3 Reflux and Boilup Ratios 1.4 Total Material Balance Around Condenser 1.5 Total Material Balance Around Reboiler 1.6 Component Material Balances 1.7 Energy and the Separation Factor 1.8 Multicomponent Distillation 1.9 Stage-by-Stage Separation Model 1.10 Formulation of the Control Problem 1.11 Tower Internals 1.12 Flooding 1.13 Tray Hydraulics 1.14 Inverse Response in Bottoms Level 1.15 Composition Dynamics Chapter 2. Composition Control 2.1 Product Specifications 2.2 Columns in Series 2.3 Composition Analyzers 2.4 Temperature 2.5 Distillate Composition Control, Constant Boilup 2.6 Distillate Composition Control, Constant Bottoms Flow 2.7 Operating Lines 2.8 Temperature Profiles 2.9 Feed Composition Disturbances 2.10 Bottoms Composition Control 2.11 Propagation of Variance in Level Control Configurations 2.12 Level Control in Direct Material Balance Configurations Chapter 3. Pressure Control and Condensers 3.1 Pressure Control 3.2 Once-Through Heat Transfer Processes 3.3 Water-Cooled Condensers 3.4 Flooded Condensers 3.5 Air-Cooled Condensers 3.6 Partial Condensers 3.7 Atmospheric Towers 3.8 Vacuum Towers 3.9 Floating Pressure / Pressure Minimization Chapter 4. Reboilers and Feed Preheaters 4.1 Types of Reboilers 4.2 Steam-Heated Reboilers 4.3 Hot Oil 4.4 Fired Heaters 4.5 Feed Preheater 4.6 Economizer Chapter 5. Applying Feedforward 5.1 Feed Flow and Composition 5.2 Internal Reflux Control 5.3 Extreme Feedforward 5.4 Feedforward for Bottoms Level 5.5 Feedforward for Column Pressure 5.6 Product Compositions Chapter 6. Unit Optimization 6.1 Energy and Separation 6.2 Optimization of a Column 6.3 Constraints in Distillation Columns 6.4 Control Configurations for Single Constraint 6.5 Control Configurations for Multiple Constraints Chapter 7. Double-End Composition Control 7.1 Defining the Problem. 7.2 Options for Composition Control 7.3 Relative Gain 7.4 Relative Gains from Open Loop Sensitivities 7.5 Relative Gains for Other Configurations 7.6 Ratios for Manipulated Variables 7.7 Effect of Operating Objectives 7.8 Model Predictive Control Chapter 8. Complex Towers 8.1 Heat Integration 8.2 Side Heater / Side Cooler 8.3 Sidestreams 8.4 Withdrawing a Liquid Sidestream 8.5 Withdrawing a vapor sidestream 8.6 Composition Control in Sidestream Towers. 330 $a"This book approaches the subject from a process engineering perspective, specifically, to use the steady-state simulation of the column as the primary source of the parameters required to develop, to analyze, and to troubleshoot a column control configuration. For an operating column, the first action must be to confirm that the separation currently provided by the column is consistent with design expectations (using control sophistication to solve process problems is a loser). The objective is to choose the control configuration that properly reflects the column design parameters (number of stages; feed stage location, etc), the materials being separated (relative volatility), the operating requirements for the column (reflux ratios, product purities, etc)"--$cProvided by publisher. 606 $aDistillation 615 0$aDistillation. 676 $a660/.28425 686 $aTEC009010$2bisacsh 700 $aSmith$b Cecil L$0209864 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910814983903321 996 $aDistillation control$94019309 997 $aUNINA LEADER 03530nam 22008415 450 001 9910633995903321 005 20251225202214.0 024 7 $a10.1007/978-981-19-8285-9 035 $a(CKB)5590000001022474 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/94987 035 $a(MiAaPQ)EBC7156583 035 $a(Au-PeEL)EBL7156583 035 $a(OCoLC)1369654101 035 $a(oapen)doab94987 035 $a(DE-He213)978-981-19-8285-9 035 $a(EXLCZ)995590000001022474 100 $a20221209d2022 u| 0 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security $e19th China Annual Conference, CNCERT 2022, Beijing, China, August 16?17, 2022, Revised Selected Papers /$fedited by Wei Lu, Yuqing Zhang, Weiping Wen, Hanbing Yan, Chao Li 205 $a1st ed. 2022. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2022. 215 $a1 electronic resource (239 p.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1699 311 08$a9789811982842 311 08$a9811982848 311 08$a9789811982859 311 08$a9811982856 327 $aData Security -- Anomaly Detection -- Cryptocurrency -- Information Security -- Vulnerabilities -- Mobile Internet -- Threat Intelligence -- Text Recognition. 330 $aThis open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1699 606 $aData protection 606 $aComputer engineering 606 $aComputer networks 606 $aArtificial intelligence 606 $aComputers$xLaw and legislation 606 $aInformation technology$xLaw and legislation 606 $aComputer networks$xSecurity measures 606 $aData and Information Security 606 $aComputer Engineering and Networks 606 $aComputer Engineering and Networks 606 $aArtificial Intelligence 606 $aLegal Aspects of Computing 606 $aMobile and Network Security 615 0$aData protection. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aArtificial intelligence. 615 0$aComputers$xLaw and legislation. 615 0$aInformation technology$xLaw and legislation. 615 0$aComputer networks$xSecurity measures. 615 14$aData and Information Security. 615 24$aComputer Engineering and Networks. 615 24$aComputer Engineering and Networks. 615 24$aArtificial Intelligence. 615 24$aLegal Aspects of Computing. 615 24$aMobile and Network Security. 676 $a005.8 700 $aLu$b Wei$0955719 701 $aZhang$b Yuqing$01208913 701 $aWen$b Weiping$01214835 701 $aYan$b Hanbing$01214836 701 $aLi$b Chao$01214837 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910633995903321 996 $aCyber Security$92805021 997 $aUNINA