Advances in Modeling and Management of Urban Water Networks |
Autore | Creaco Enrico |
Pubbl/distr/stampa | Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021 |
Descrizione fisica | 1 electronic resource (290 p.) |
Soggetto topico | History of engineering & technology |
Soggetto non controllato |
drainage network
climate change rehabilitation optimization SWMM drainage networks flooding multi-objective optimization water network partition genetic algorithm hydraulic water quality actions asset management ANN prediction performance water utility water system NSGA-II GIS modeling leakage management urban water network management valve closing algorithm web 2.0 total suspended solids in-situ erosion sedimentation pressure pipe sewage water distribution systems pipe bursts hydraulic transients real-time control machine learning sediment transport model numerical simulation advection-dispersion equation water distribution networks transmission mains pump as turbine energy recovery hydropower multi-objective water consumption chaos theory local approximation Kelowna gene expression programming trapezoidal stretch transition stretch culvert open channel hydraulic factors sewer design stochastic sewer modelling wastewater quality household discharge reduced water consumption flow regime transition finite volume methods numerical oscillations numerical viscosity Preissmann slot model hydraulic simulation water demand emergency scenario intermittent water supply water management WaterGEMS software pressure control leakage reduction strategies water distribution system modeling urban drainage system modeling emergency scenarios leakage demand energy sediment transport |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910557142503321 |
Creaco Enrico
![]() |
||
Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Sacramental Theology: Theory and Practice from Multiple Perspectives: Theory and Practice from Multiple Perspectives |
Autore | Morrill Bruce |
Pubbl/distr/stampa | MDPI - Multidisciplinary Digital Publishing Institute, 2019 |
Descrizione fisica | 1 electronic resource (154 p.) |
Soggetto non controllato |
liturgy
Holy Spirit symbol Antoine Vergote laity revelation theological ethics sacrament sacramental universe E.O. Wilson pansacramentalism ecological grace coloniality Jean-Yves Lacoste liturgical theology ontology climate change critical realism Second Vatican Council baptism sacrament of penance spirituality disaffiliation hermeneutics history of Catholicism in the United States mystagogy post-colonial theory ekstasis Emmanuel Falque drones Jean-Luc Marion sacramentality Eucharist psychoanalysis phenomenology lived religion ecology frequent communion Roman Catholic Church communal ontology moral theology pandemonium tremendum creation chaos theory agency interreligious studies social structures John Zizioulas theology decoloniality Synod on the Youth vocation interreligious confession Pneumatology ritual theory Epic of Evolution social theory apophaticism Margaret Archer Catholic guilt sacramental theology |
ISBN | 3-03921-719-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Sacramental Theology |
Record Nr. | UNINA-9910367744903321 |
Morrill Bruce
![]() |
||
MDPI - Multidisciplinary Digital Publishing Institute, 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Side Channel Attacks / Seokhie Hong |
Autore | Hong Seokhie |
Pubbl/distr/stampa | Basel, Switzerland : , : MDPI, , 2019 |
Descrizione fisica | 1 electronic resource (258 p.) |
Soggetto non controllato |
binary Huff curve
FPGA post quantum cryptography data loss side-channel cache attacks rsa cryptosystem first-order analysis chaotic circuit integrity ad libraries power-analysis attack single trace analysis side-channel authentication provable security ad lib cache misses cache side-channel attack leakage model NTRU graph AES hardware security recovery of secret exponent by triangular trace analysis side-channel attacks information leakage data outsourcing CPLD scatter-gather implementation modular exponentiation lattice-based cryptography elliptic curve cryptography Gaussian sampling post-quantum cryptography reliability unified point addition ad networks graph similarity mobile ads physically unclonable function tweakable block cipher Merkle (hash) tree machine-learning classification side channel attack online authentication side channel analysis financial IC card side-channel attack re-keying cloud computing cryptographic keys chaos theory horizontal collision correlation analysis countermeasure embedded system security cache attack single-trace attack software development kit (SDK) CDT sampling key bit-dependent attack side-channel analysis second-order analysis constant-time cryptographic algorithm android package (APK) challenge-response authentication |
ISBN |
9783039210015
3039210017 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910346673703321 |
Hong Seokhie
![]() |
||
Basel, Switzerland : , : MDPI, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|