LEADER 05698 am 22010933u 450 001 9910136809003321 005 20221206182142.0 010 $a3-319-30070-9 024 7 $a10.1007/978-3-319-30070-2 035 $a(CKB)3710000000627504 035 $a(SSID)ssj0001654249 035 $a(PQKBManifestationID)16433860 035 $a(PQKBTitleCode)TC0001654249 035 $a(PQKBWorkID)14982822 035 $a(PQKB)11402651 035 $a(DE-He213)978-3-319-30070-2 035 $a(MiAaPQ)EBC5588201 035 $a(Au-PeEL)EBL5588201 035 $a(OCoLC)945766733 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/32497 035 $a(PPN)192774581 035 $a(EXLCZ)993710000000627504 100 $a20160322d2016 u| 0 101 0 $aeng 135 $aurm|#|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAnti-fragile ICT Systems$b[electronic resource] /$fby Kjell Jørgen Hole 205 $a1st ed. 2016. 210 $cSpringer Nature$d2016 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XVIII, 151 pages) ;$c44 illustrations, 22 illustrations in colour; digital, PDF file(s) 225 1 $aSimula SpringerBriefs on Computing,$x2512-1677 ;$v1 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-30068-7 320 $aIncludes bibliographical references (pages 141-145) and index. 327 $aPreface -- Part I: The Concept of Anti-Fragility: 1 Introduction -- 2 Achieving Anti-Fragility -- 3 The Need to Build Trust -- 4 Principles Ensuring Anti-Fragility -- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions -- 6 An Anti-Fragile e-Government System -- 7 Anti-Fragile Cloud-Based Telecom Systems -- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading -- 9 Robustness to Malware Reinfections -- 10 Anti-Fragility to Malware Spreading -- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm -- 12 Detecting Anomalies with the CLA -- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work -- About the Author -- References -- Index. 330 $aThis book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix?s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta?s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts. 410 0$aSimula SpringerBriefs on Computing,$x2512-1677 ;$v1 606 $aComputer organization 606 $aComputers 606 $aArtificial intelligence 606 $aComputer simulation 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aSimulation and Modeling$3https://scigraph.springernature.com/ontologies/product-market-codes/I19000 610 $aComputer Systems Organization and Communication Networks 610 $aInformation Systems and Communication Service 610 $aArtificial Intelligence 610 $aSimulation and Modeling 610 $aComputer Engineering and Networks 610 $aDatabase Management System 610 $aComputer Science 610 $aAnomaly detection 610 $aAnti-fragility 610 $aCloud computing 610 $aComplex adaptive systems 610 $aDevOps (Development and Operation) 610 $aDiversity 610 $aLoose coupling 610 $aMalware 610 $aMalware detection 610 $aMicroservices 610 $aModules 610 $aMonitoring 610 $aRedundancy 610 $aRisk analysis 610 $aSoftware architecture 610 $aSoftware design 610 $aSystem dependencies 610 $aTight coupling 610 $aTrust 610 $aWeak links 610 $aComputer networking & communications 610 $aComputer modelling & simulation 615 0$aComputer organization. 615 0$aComputers. 615 0$aArtificial intelligence. 615 0$aComputer simulation. 615 14$aComputer Systems Organization and Communication Networks. 615 24$aInformation Systems and Communication Service. 615 24$aArtificial Intelligence. 615 24$aSimulation and Modeling. 676 $a004.6 700 $aHole$b Kjell Jørgen$4aut$4http://id.loc.gov/vocabulary/relators/aut$0979466 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910136809003321 996 $aAnti-fragile ICT Systems$92233319 997 $aUNINA LEADER 02954nam 2200481 450 001 9910647384203321 005 20230510150923.0 010 $a3-031-20924-9 024 7 $a10.1007/978-3-031-20924-6 035 $a(MiAaPQ)EBC7187360 035 $a(Au-PeEL)EBL7187360 035 $a(CKB)26068922600041 035 $a(DE-He213)978-3-031-20924-6 035 $a(PPN)267812299 035 $a(EXLCZ)9926068922600041 100 $a20230510d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aVapor liquid two phase flow and phase change /$fSarit Kumar Das and Dhiman Chatterjee 205 $a1st ed. 2023. 210 1$aCham, Switzerland :$cSpringer,$d[2023] 210 4$d©2023 215 $a1 online resource (501 pages) 311 08$aPrint version: Das, Sarit Kumar Vapor Liquid Two Phase Flow and Phase Change Cham : Springer International Publishing AG,c2023 9783031209239 327 $aIntroduction to Two Phase Flow - Flow Patterns and Maps -- Two Phase Flow- Pressure Drop and Flow Friction -- Thermodynamics of Phase Change -- Nucleation and Bubble Dynamics -- Cavitation -- Types of Boiling-The Pool Boiling Curve -- Heat Transfer Mechanisms and Correlations in Nucleate Pool Boiling -- Pool Boiling Crisis and Film Boiling -- Flow Boiling Heat Transfer -- Flow Boiling Crisis and Post Dryout Heat Transfer -- Boiling of Mixtures -- Boiling in Mini and Micro Channel -- Condensation: Nusselt Theory and External Condensation -- In-Tube and Dropwise Condensation -- Computational Techniques for Boiling and Condensation -- Equipment for boiling, evaporation and condensation. 330 $aThis comprehensive textbook highlights features of two phase flows and introduces the readers to flow patterns and flow maps. It covers a wide range of fundamental and complex subjects focusing on phase change processes like boiling, condensation or cavitation, and boiling phenomenon starting from pool boiling curves to heat transfer under nucleate boiling, film, and flow boiling. It also discusses themes such as numerical techniques for solving boiling and condensation as well as equipment used in industry for evaporation, boiling, and condensation. It includes pedagogical aspects such as end-of-chapter problems and worked examples to augment learning and self-testing. This book is a valuable addition for students, researchers, and practicing engineers. 606 $aFluid mechanics 606 $aFluid mechanics$xData processing 615 0$aFluid mechanics. 615 0$aFluid mechanics$xData processing. 676 $a620.106 700 $aDas$b Sarit K.$01276966 702 $aChatterjee$b Dhiman 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910647384203321 996 $aVapor Liquid Two Phase Flow and Phase Change$93009671 997 $aUNINA