LEADER 05300nam 22007095 450 001 9910299902403321 005 20200705013039.0 010 $a3-319-60327-2 024 7 $a10.1007/978-3-319-60327-8 035 $a(CKB)4340000000062757 035 $a(MiAaPQ)EBC4901233 035 $a(DE-He213)978-3-319-60327-8 035 $z(PPN)258861789 035 $a(PPN)203669916 035 $a(EXLCZ)994340000000062757 100 $a20170705d2018 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aInterface Fracture and Delaminations in Composite Materials /$fby Leslie Banks-Sills 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (120 pages) $cillustrations (some color) 225 1 $aSpringerBriefs in Structural Mechanics ,$x2520-8020 311 $a3-319-60326-4 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $a1 Introduction -- References -- Part I Interface Fracture -- 2 Fundamentals of interface fracture mechanics -- 2.1 Stress and displacement field in the neighborhood of an interface crack tip -- 2.2 Interface energy release rate -- 2.3 Fracture criterion -- References -- 3 Calculation of stress intensity factors ? an interface crack -- 3.1 Finite element method -- 3.2 Displacement extrapolation method -- 3.3 M-integral -- 3.4 Virtual crack closure technique -- References -- 4 Testing?interface crack between two isotropic materials -- References -- Part II Delaminations in Composites -- 5 Mathematical treatment of delaminations -- 5.1 The 0o/90o interface -- 5.2 The +45°/ - 45° interface -- 5.3 The +30°/ - 60° and -30°/ + 60° interfaces -- 5.4 An interface between two woven plies -- 5.5 Afterword -- References -- 6 Methods of calculating stress intensity factors? Delaminations -- 6.1 Displacement extrapolation -- 6.2 M-integral -- 6.3 Virtual crack closure technique -- References -- 7 Testing-delamination between two dissimilar plies -- 7.1 Failure of a delamination in a cross-ply -- 7.2 Beam type specimens -- References -- Appendix A. Stress and displacement functions for the flrst term of the asymptotic expan on of an interface crack between two linear elastic, homogeneous and isotropic materials -- Appendix B. Matricesfor different anisotropic material pairs -- B.1 The 0o/90o pair -- B.2 The +45°/ - 45° pair -- B.3 The +30°/ - 60° pair and the -30°/ + 60° pair -- B.4 Multi-directional woven material -- References -- Appendix C. Stress and displacement fiinctions for the first term of the asymptotic expansion of an interface crack between two amsotropic materials?the 0o /90o pair -- References -- Index. . 330 $aPart I of this SpringerBrief presents the problem of a crack between two dissimilar isotropic materials and describes the mathematical background. A fracture criterion is discussed and Methods for calculating fracture parameters such as stress intensity factors using the finite element method and three post-processors are considered. Actual test data and both deterministic and statistical failure curves are presented. In Part II of the book, similar descriptions are given for delaminations in composite laminates. The mathematical treatment of this type of damage including the first term of the asymptotic expansion of the stress and displacement fields is considered. Numerical post-processors for determining stress intensity factors for these cases are reviewed. Two examples of specific laminates are presented: one with a failure curve and the other with a failure surface. Finally, beam specimens used for testing such failures are discussed. iv>. 410 0$aSpringerBriefs in Structural Mechanics ,$x2520-8020 606 $aMechanics 606 $aMechanics, Applied 606 $aCeramics 606 $aGlass 606 $aComposite materials 606 $aComposite materials 606 $aBuildings$xRepair and reconstruction 606 $aBuildings?Repair and reconstruction 606 $aSolid Mechanics$3https://scigraph.springernature.com/ontologies/product-market-codes/T15010 606 $aCeramics, Glass, Composites, Natural Materials$3https://scigraph.springernature.com/ontologies/product-market-codes/Z18000 606 $aBuilding Repair and Maintenance$3https://scigraph.springernature.com/ontologies/product-market-codes/T23055 615 0$aMechanics. 615 0$aMechanics, Applied. 615 0$aCeramics. 615 0$aGlass. 615 0$aComposite materials. 615 0$aComposite materials. 615 0$aBuildings$xRepair and reconstruction. 615 0$aBuildings?Repair and reconstruction. 615 14$aSolid Mechanics. 615 24$aCeramics, Glass, Composites, Natural Materials. 615 24$aBuilding Repair and Maintenance. 676 $a620.1181 700 $aBanks-Sills$b Leslie$4aut$4http://id.loc.gov/vocabulary/relators/aut$01064406 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299902403321 996 $aInterface Fracture and Delaminations in Composite Materials$92537871 997 $aUNINA LEADER 05828nam 22005175 450 001 9910999683703321 005 20250426124656.0 010 $a3-031-89350-6 024 7 $a10.1007/978-3-031-89350-6 035 $a(CKB)38641484300041 035 $a(DE-He213)978-3-031-89350-6 035 $a(MiAaPQ)EBC32029703 035 $a(Au-PeEL)EBL32029703 035 $a(OCoLC)1524425401 035 $a(EXLCZ)9938641484300041 100 $a20250426d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRisks and Security of Internet and Systems $e19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings /$fedited by Simon Collart-Dutilleul, Samir Ouchani, Nora Cuppens, Frédéric Cuppens 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (XX, 560 p. 145 illus., 128 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15456 311 08$a3-031-89349-2 327 $a -- Abstracts of Invited Talks. -- Horizontal Attack from Theory to Practice. -- Security for Safety Critical Systems in the Railways. -- Security Network Protocols. -- Q-Auth : Decentralized and Quantum-Secure Authentication Protocol for Vehicular Networks. -- Card-Based Secure Evaluation of Decision Trees. -- FREIDA : A Concrete Tool for Reproducible Evaluation of IDS Using a Data-Driven Approach. -- Identity Management in Cross-Cloud Environments : Towards Self-Sovereign Identities Using Current Solutions. -- Detecting Information Disclosure Vulnerability in Software Architectures Using Alloy. -- Protecting Digital Identity Wallet : A Threat Model in the Age of eIDAS 2.0. -- Small Mistakes with Big Impacts : A Study on Secure Coding Practices in Java Open Source Projects. -- AI-Driven Threat Detection. -- On the Properness of Large Language Models for Malware Detection. -- Automated Attack Tree Generation Using Arti?cial Intelligence & Natural Language Processing. -- Classifying Insider Threat Scenarios Through Explainable Arti?cial Intelligence. -- Automated Risk Assessment of Shell-Based Attacks Using a LLM. -- Information Security Management. -- ECU-KM : An E?cient Key Management for In-Vehicle Networks. -- Injecting Bias into Text Classi?cation Models Using Backdoor Attacks. -- Towards New Models of Information Sharing. -- Distributed and Veri?able Digital Badges. -- European and British Regulatory Perspectives : A Systematic Literature Review on Privacy by Design. -- Enhancing Privacy in Association Rule Mining on Healthcare Data : A CCA- Secure Homomorphic El-Gamal Approach. -- A Study on NLP-Based Semi-Automated Mapping of Cybersecurity Controls on Vulnerabilities. -- Applied Cryptography & Privacy. -- Detecting Obfuscated Android Malware through Categorized Smali N-gram Instructions and Ensemble Learning. -- Investing in Renewable Energy : Securing Solar Panels Marketplace by NFT. -- Enhancing Text Encryption in Cloud Computing Using a Hyper-Chaotic System with Logistic Map. -- Threats Detection & Protection. -- Preventing WebRTC IP Address Leaks. -- Highlighting the Impact of Packed Executable Alterations with Unsupervised Learning. -- Device Fingerprinting Remediation in Android and iOS Apps. -- Towards Operational Intrusion Detection Systems Dedicated to Agriculture : Challenges and Requirements. -- Risk Identi?cation & Management. -- A Safety Kernel for Flexible Level Crossing Management. -- E?cient Identi?cation of UAVs Through Automatic Communication Frame Linking. -- Enterprise Risk Management in SMEs : Insights from West Africa. -- Blockchain & Distributed Ledger Security. -- A Multi-Modal Ontology Integrating Pedestrian Safety in Pod Transfers. -- Modeling and Assessing Coercion Threats in Electronic Voting. -- Rainbow Over Clouds : A Lightweight Pairing-Free Multi-Replica Multi-Cloud Public Auditing Scheme. -- AI for Security Assessment. -- Automated Assessment of the Exploits Using Deep Learning Methods. -- Improving Attack Graph-Based Self-Protecting Systems : A Computational Pipeline for Accuracy-Scalability Trade-O?. -- Relevance of Image-Based Representation for Android Malware Detection. 330 $aThis book constitutes the revised selected papers of the 19th International Conference on Risks and Security of Internet and Systems, CRiSIS 2024, held in Aix-en-Provence, France, during November 26-28, 2024. The 32 full papers and 2 short papers presented here were carefully selected and reviewed from 90 submissions. These papers have been organized in the following topical sections: Security Network Protocols; AI-Driven Threat Detection; Information Security Management; Applied Cryptography & Privacy; Threats Detection & Protection; Risk Identi?cation & Management; Blockchain & Distributed Ledger Security; AI for Security Assessment. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15456 606 $aData protection 606 $aData and Information Security 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.8 702 $aCollart-Dutilleul$b Simon$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aOuchani$b Samir$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCuppens$b Nora$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCuppens$b Fre?de?ric$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910999683703321 996 $aRisks and Security of Internet and Systems$92102247 997 $aUNINA