SiteMap All
- Page ID
- 1580
- Campus Bookshelves
- Bucknell University
- CEEG 445: Environmental Engineering Chemistry (Fall 2020)
- Front Matter
- 1: Chemistry Basics
- 2: Equilibrium
- 3: Thermodynamics
- 4: Activity and Ionic Strength
- 5: Gas Laws
- 6: Acid-Base Chemistry
- 7: Acid
- 8: Solubility and Precipitation
- 9: Complexation
- 10: Redox Chemistry and Electrochemistry
- 11: Atmospheric Chemistry and Air Pollution
- 12: Organic Chemistry Primer
- Back Matter
- CEEG 445: Environmental Engineering Chemistry (Fall 2020)
- Delta College
- CS11 - Informations Systems
- Front Matter
- 1: What is an Information System?
- 2: Information Systems for Strategic Advantage
- 2.1: Does IT Matter?
- 2.2: Business Processes
- 2.3: The People in Information Systems
- 2.4: Information Systems Development
- 3: Information Systems Beyond the Organization
- Back Matter
- CSP31A - C Programming
- Introduction to Programming Concepts - Python
- Front Matter
- 1: Introduction
- 1.1: Why should you learn to write programs?
- 1.2: Creativity and Motivation
- 1.3: Computer Hardware Architecture
- 1.4: Understanding Programming
- 1.5: Words and Sentences
- 1.6: Conversing with Python
- 1.7: Terminology - Interpreter and Compiler
- 1.8: Writing a Program
- 1.9: What is a program?
- 1.10: The Building Blocks of Programs
- 1.11: What could possibly go wrong?
- 1.12: The Learning Journey
- 1.13: Introduction (Exercises)
- 1.14: Introduction (Glossary)
- 2: Variables, Expressions, and Statements
- 2.1: Values and Types
- 2.2: Variables
- 2.3: Variable names and Keywords
- 2.4: Statements
- 2.5: Operators and Operands
- 2.6: Expressions
- 2.7: Order of Operations
- 2.8: Modulus Operator
- 2.9: String Operations
- 2.10: Asking the user for input
- 2.11: Comments
- 2.12: Choosing Mnemonic Variable Names
- 2.13: Debugging
- 2.14: Variables, Expressions, and Statements (Exercises)
- 2.15: Glossary
- 3: Conditional Execution
- 3.1: Boolean Expressions
- 3.2: Logical Operators
- 3.3: Conditional Execution
- 3.4: Alternative Execution
- 3.5: Chained Conditionals
- 3.6: Nested Conditionals
- 3.7: Catching exceptions Using Try and Except
- 3.8: Short-Circuit Evaluation of Logical Expressions
- 3.9: Debugging
- 3.10: Conditional Execution (Exercises)
- 3.11: Conditional Execution (Glossary)
- 4: Functions
- 4.1: Function Calls
- 4.2: Built-in Functions
- 4.3: Type Conversion Functions
- 4.4: Random Numbers
- 4.5: Math Functions
- 4.6: Adding New Functions
- 4.7: Definitions and Uses
- 4.8: Flow of Execution
- 4.9: Parameters and Arguments
- 4.10: Fruitful functions and void functions
- 4.11: Why functions?
- 4.12: Debugging
- 4.13: Functions (Exercises)
- 4.14: Functions (Glossary)
- 5: Iterations
- 5.1: Updating Variables
- 5.2: The while Statement
- 5.3: Infinite Loops
- 5.4: "Infinite loops" and break
- 5.5: Finishing iterations with continue
- 5.6: Definite loops using for
- 5.7: Loop patterns
- 5.8: Counting and Summing Loops
- 5.9: Maximum and Minimum Loops
- 5.10: Debugging
- 5.11: Iterations (Exercises)
- 5.12: Iterations (Glossary)
- 6: Strings
- 6.1: A string is a sequence
- 6.2: Getting the length of a string using len
- 6.3: Traversal through a string with a loop
- 6.4: String Slices
- 6.5: Strings are immutable
- 6.6: Looping and Counting
- 6.7: The in operator
- 6.8: String Comparison
- 6.9: String Methods
- 6.10: Parsing strings
- 6.11: Format operator
- 6.12: Debugging
- 6.13: Strings (Exercises)
- 6.14: Strings (Glossary)
- 7: Files
- 8: Lists
- 8.1: A list is a sequence
- 8.2: Lists are mutable
- 8.3: Traversing a List
- 8.4: List operations
- 8.5: List Slices
- 8.6: List Methods
- 8.7: Deleting Elements
- 8.8: Lists and Functions
- 8.9: Lists and Strings
- 8.10: Parsing lines
- 8.11: Objects and Values
- 8.12: Aliasing
- 8.13: List arguments
- 8.14: Debugging
- 8.15: Lists (Exercises)
- 8.16: Lists (Glossary)
- 9: Dictionaries
- 10: Tuples
- 10.1: Tuples are Immutable
- 10.2: Comparing Tuples
- 10.3: Tuple Assignment
- 10.4: Dictionaries and Tuples
- 10.5: Multiple assignment with dictionaries
- 10.6: The most common words
- 10.7: Using Tuples as Keys in Dictionaries
- 10.8: Sequences: strings, lists, and tuples - Oh My!
- 10.9: Debugging
- 10.10: Tuples (Exercises)
- 10.11: Tuples (Glossary)
- 11: Regular Expressions
- 11.1: Regular Expressions
- 11.2: Character matching in regular expressions
- 11.3: Extracting data using regular expressions
- 11.4: Combining searching and extracting
- 11.5: Escape Character
- 11.06: Bonus section for Unix
- 11.7: Debugging
- 11.8: Regular Expressions (Exercises)
- 11.9: Regular Expressions (Glossary)
- 11.10: Regular Expressions (Summary)
- 12: Networked Programs
- 12.1: HyperText Transfer Protocol - HTTP
- 12.2: The World's Simplest Web Browser
- 12.3: Retrieving an image over HTTP
- 12.4: Retrieving web pages with urllib
- 12.5: Parsing HTML and scraping the web
- 12.6: Parsing HTML using regular expressions
- 12.7: Parsing HTML using BeautifulSoup
- 12.8: Reading binary files using urllib
- 12.9: Networked Programs (Exercises)
- 12.10: Networked Programs (Glossary)
- 13: Python and Web Services
- 13.1: eXtensible Markup Language - XML
- 13.2: Looping through Nodes
- 13.3: JavaScript Object Notation - JSON
- 13.4: Parsing JSON
- 13.5: Application Programming Interfaces
- 13.6: Google geocoding web service
- 13.7: Security and API usage
- 13.8: Python and Web Services (Exercises)
- 13.9: Python and Web Services (Glossary)
- 14: Object-Oriented Programming
- 14.1: Managing Larger Programs
- 14.2: Getting Started
- 14.3: Using Objects
- 14.4: Starting with Programs
- 14.5: Subdividing a Problem - Encapsulation
- 14.6: Our First Python Object
- 14.7: Classes as Types
- 14.8: Many Instances
- 14.9: Object Lifecycle
- 14.10: Inheritance
- 14.11: Object-Oriented Programming (Glossary)
- 14.12: Object-Oriented Programming (Summary)
- 15: Using Databases and SQL
- Front Matter
- 15.1: What is a database?
- 15.2: Database Concepts
- 15.3: Database Browser for SQLite
- 15.4: Creating a database table
- 15.5: Structured Query Language summary
- 15.6: Spidering Twitter using a database
- 15.7: Basic data modeling
- 15.8: Programming with Multiple Tables
- 15.9: Constraints in Database Tables
- 15.10: Retrieve and
- 15.11: Storing the friend relationship
- 15.12: Three Kinds of Keys
- 15.13: Using JOIN to retrieve data
- 15.14: Degugging
- 15.15: Using Databases and SQL (Glossary)
- 15.16: Using Databases and SQL (Summary)
- Back Matter
- 16: Visualizing data
- Back Matter
- Linux - The Penguin Marches On
- Front Matter
- Module 01: Back to the Basics
- A.1: Introduction to Linux
- A.2: Open Source Software
- A.3: Free Software vs Open Source
- A.4: Different FOSS licensing...
- A.5: The GNU Project
- A.6: Unix - What's the Connection?
- A.7: FINALLY - Linux
- A.8: Advantages and Disadvantages of Linux
- A.9: Distro List
- A.10: How is Linux Used?
- B.11: How the Shell and CLI Work
- B.12: CLI - The Good and The Bad
- B.13: Shells: What and Why
- B.14: Doing bash
- B.15: Bash Commands...how to
- B.16: Let's Look at the Basics
- B.17: File Basics: More Later
- B.18: Who is superuser?
- B.19: Leftovers...what else do we need
- C.20: HELP!! Where can I find help in Linux?
- C.21: Linux man pages
- C.22: Man page format
- C.23: Additional Linux System Help Choices
- C.24: Sources of Online Linux Documentation
- C.25: Asynchronous Linux Help Resources
- Module 02: User & Group Administration
- A.1: Users - and how to Acquire Superuser Power
- A.2: Who is the superuser?
- A.3: su: The Command
- A.4: Other options for administrative privileges
- B.5: Users: Create, Modify, and Delete
- B.6: Users: Create, Modify, and Delete (cont'd)
- B.7: Users: Create, Modify and Delete (cont'd)
- B.8: Users: Create, Modify, and Delete - passwd command
- B.9: Users: Create, Modify, and Delete - etc passwd and etc shadow
- B.10: Users: Create, Modify, and Delete - edit etc passwd file
- C.11: Groups: Create, Modify, and Delete
- C.12: Groups: Create, Modify, and Delete - modify group
- D.13: User and Group Queries
- E.14: User Account Profile Configuration
- E.15: Example: Bash RC file
- E.16: System Wide User Profiles
- Module 03: Permission and Ownership Management
- Module 04: Managing Linux Storage
- A.1: Storage Devices
- A.2: Linux File Systems
- A.3: Inodes
- A.4 Journaling File Systems
- A.5: Linux Virtual File System
- A.6: Partitions and Labels
- A.7: Disk Setup Process - fdisk
- A.8: The dev Directory
- B.9: Logical Volume Management
- C.10: Mounting Linux File Systems
- D.11: File System Management
- E.12: Linux Directory Structure
- F.13: Storage Issues - Find and Fix
- Module 05: File and Directory Management
- A.1: Creating and Editing Text files
- A.2: Creating and Editing Text files - Vim Editor
- A.3: Nano Editor
- A.4: Gedit and more
- B.5: Searching for Files on Linux
- C.6: Working with Files and Directories - cat Command
- C.6.1: Working with Files and Directories - head/tail Commands
- C.6.2: Working with Files and Directories - less/more Command
- C.6.3: Working with Files and Directories - cp/mv Command
- C.6.4: Working with Files and Directories - rm/touch Command
- C.6.5: Working with Files and Directories - ls/rmidir/mkdir Command
- D.7: Handling Text Files - echo/printf
- E.8: File Output Manipulation
- Module 06: Kernel Module Management
- Module 07: Linux Boot Process
- Module 08: How to Manage System Components
- A.1: Localization Options - Configuration
- A.2: Localization - date/timdatectl Command
- A.3: Localization - localectl Command
- B.4: GUI Configuration
- B.5: GUI Desktop Environments
- B.6: Remote Desktop Access
- B.7: Remote Console - SSH/X Forwarding -
- C.8: Managing Linux Services
- D.9: Process Troubleshooting
- D.9.1: Process Troubleshooting - ps command
- D.9.2: Process Troubleshooting - top command
- D.9.3: Process Troubleshooting - lsof command
- D.9.4: Process Troubleshooting - Process Priorities
- D.9.5: Process Troubleshooting - Background / Foreground Processes
- D.9.6: Process Troubleshooting - nohup and kill Commands
- E.10: CPU and Memory Troubleshooting
- Module 09: Managing Linux Devices
- Module 10: Network Management
- A.1: TCP/IP Fundamentals
- B.2: Server Roles in Linux
- C.3: Network Connection
- D.4: Static VS Dynamic IP Addresses
- D.5: DHCP Configuration
- D.6: Name Resolution
- E.7: Cloud Configuration
- E.8: The Cloud and Virtualization
- E.9: Cloud Bootstrapping and Storage
- E.10: Configuring Networks and Virtualization Tools
- F.11: How to Troubleshoot Networking Problems
- F.11.1: Network Troubleshooting Commands - netstat / ss
- F.11.2: Network Troubleshooting Commands - dig / nslookup / host
- F.11.3: Network Troubleshooting Commands - ip / route / nmap
- F.11.4: Network Troubleshooting Commands - wireshark
- F.11.5: Network Troubleshooting Commands - iftop / iperf / mtr
- F.11.6: Network Troubleshooting Commands - arp / whois
- Module 11: Package Management
- Module 12: Linux Systems Security
- A.1: Best Cybersecurity Practices
- A.2: chroot Jail
- A.3: Encryption in Linux
- A.4: Security Best Practices
- B.5: Identity and Access Management
- B.6: Pluggable Authentication Modules
- B.7: TTY Security & PKI
- B.8: OpenSSL / VPN
- B.9: Authentication Issues
- C.10: SELinux Configuration
- C.11: AppArmor
- D.12: Firewall Configuration in Linux
- D.13: Access Control Lists / iptables
- D.14: UFW & firewalld
- D.15: Netfilter / IP Forwarding
- E.16: Linux Logging
- E.17: journalctl & last Commands
- F.18: Backup and Restore in Linux
- F.19: tar / cpio / dd
- F.20: mirrorvg / rsync / scp
- F.21: File Compression
- F.22: Integrity Check & Checksums
- Module 13: Working with Bash Scripts
- A.1: How to Customize the Bash Shell
- A.2: env / alias / PATH / time
- B.3: Fundamentals of Linux Scripts
- B.4: Shell Operators
- B.5: Strings / Arrays / Functions
- C.6: Writing & Running Linux Scripts
- C.7: Shell expansion / Variable Substitution / Command Substitution
- C.8: Positional Parameters / exec Command / source Command
- C.9: Script Permissions / Script Extensions
- D.10: Shell Control Statements
- D.11: Script Loops
- Module 14: Task Automation
- Module 15: Linux Installation
- Ancillary Materials
- Back Matter
- C++ Programming I (McClanahan)
- Front Matter
- 1: Building and Running C++ Code
- 2: C++ Basics
- 3: Program Planning and Design
- 4: Data and Operators
- 4.1: We Begin to Code...
- 4.2: Data Types in C++
- 4.3: Identifier Names
- 4.4: Constants and Variables
- 4.5: Data Manipulation
- 4.6: Assignment Operator
- 4.7: L Value and R Value
- 4.8: Sizeof Operator
- 4.9: Arithmetric Operators
- 4.10: Data Type Conversions
- 4.11: Operator Overloading
- 4.12: Unary Positive and Negative Operators
- 4.13: Bitwise Operators
- 5: Common Data Types
- 6: Conditional Execution
- 7: Conditional Loops
- 8: Counting Loops
- 9: Introduction to Arrays
- 10: Functions
- 11: C++ Input and Output
- 12: Pointers
- 13: Object Oriented C++
- 14: Overloading in C++
- 15: Polymorphism
- 16: Inheritance
- 19: Handling Errors
- Back Matter
- Information Systems for Business
- Front Matter
- 1: Introduction to Information Systems?
- 2: Hardware
- 3: Software
- 4: Data and Databases
- 5: Networking and Communication
- 6: Information Systems Security
- 7: Does IT Matter?
- 8: Business Processes
- 9: The People in Information Systems
- 10: Information Systems Development
- 11: Globalization and the Digital Divide
- 12: The Ethical and Legal Implications of Information Systems
- 13: Future Trends in Information Systems
- Back Matter
- C++ Data Structures
- Front Matter
- 1: OOP Concepts
- 2: C++ Pointers
- 3: Dynamic Memory Allocation and Arrays
- 4: Inheritence
- 4.1: The Concept of Inheritance
- 4.2: Why and when to use inheritance?
- 4.3: Implementing inheritance in C++
- 4.4: Modes of Inheritance
- 4.5: Types of Inheritance in C++
- 4.6: Types of Inheritance in C++
- 4.7: Types of Inheritance
- 4.8: Types of Inheritance
- 4.9: Types of Inheritance
- 4.10: Programming Assignment- Inheritance
- 5: Polymorphism
- 6: Abstraction / Encapsulation
- 7: Linked Lists
- 8: Recursion
- 9: Stack Data Structure
- 10: Queues Data Structures
- 11: Hashing
- 12: Heap
- 13: Sorting
- 14: Binary Trees
- Back Matter
- Operating System: The Basics
- 1: The Basics - An Overview
- 2: Operating System Overview
- 3: Processes - What and How
- 4: Threads
- Information Security
- Front Matter
- 1: Information Security Defined
- 2: Authenticate and Identify
- 3: Authorize and Access Control
- 4: Auditing and Accountability
- 5: Cryptography
- 6: Compliance , Laws and Regulations
- 7: Operations Security
- 8: Human Element Security
- 9: Physical Security
- 10: Network Security
- 11: Operating Systems Security
- 12: Mobile, Embedded, and Internet of Things Security
- 13: Application Security
- 14: Assessing Security
- Back Matter
- CS11 - Informations Systems
- Diablo Valley College
- ENGTC168 - Intro To Computer Numerical Control (CNC)
- Front Matter
- 1: Overview Of CNC Machining
- 2: Introduction To G-code Programming
- 3: CNC Control Systems
- 4: CNC Milling Machine Setup For Part Production
- 5: Introduction To Cutting Tool Characteristics
- 6: Post-Processing Part Files For Machining
- 7: 3D Modeling Of Parts And Components (CAD)
- 8: Introduction to Computer Aided Machining (CAM) Software
- 8.1: Graphic user interface and operating environment
- 8.2: Tools menu
- 8.3: Lab - Tool libraries and tool length offsets
- 8.4: Lab - Types of tool paths
- 8.5: Cartesian coordinate systems
- 8.6: Graphic standards and representation methods
- 8.7: Creating part geometry
- 8.8: Creating points, lines, and arcs using CAM software
- 8.9: Lab - Creating tool paths in 2D
- 8.10: Lab - Creating tool paths in 3D
- 8.11: Assembly design workflow
- 8.12: Lab - Additional instructions and operations
- 8.13: Lab - Previewing a tool path
- Back Matter
- ENGTC168 - Intro To Computer Numerical Control (CNC)
- Hawaii Community College
- Ecology and Environment: BIOL 124 at Hawaii Community College
- Front Matter
- 1: Environmental Science
- 2: The Physical World
- 3: Matter, Energy, and Life
- 4: Biomes and the Biosphere
- 5: Community and Population Ecology
- 6: Conventional and Sustainable Energy
- 7: Conservation and Biodiversity
- 8: Environmental Hazards and Human Health
- 9: Water Availability and Use
- 10: Food and Hunger
- 11: Conventional and Sustainable Agriculture
- 12: Environmental Effects of Forestry
- 13: Air Pollution, Climate Change, and Ozone Depletion
- 14: Sustainability - Ethics, Culture, and History
- Page 14.1: The Human Dimensions of Sustainability- History, Culture, Ethics
- Page 14.2: It’s Not Easy Being Green- Anti-Environmental Discourse, Behavior, and Ideology
- Page 14.3: The Industrialization of Nature- A Modern History (1500 to the present)
- Page 14.4: Case Study- Agriculture and the Global Bee Colony Collapse
- Page 14.5: Sustainability Ethics
- Back Matter
- Ecology and Environment: BIOL 124 at Hawaii Community College
- Lumen
- Book: The Missing Link: An Introduction to Web Development (Lumen)
- Front Matter
- About
- Acknowledgments
- Copyright
- Dedication
- Glossary
- Preface
- Section 1 Assessments
- Section 1 Web Development
- Section 2 Assessments
- Section 2 Document Markup
- Section 3 Assessments
- Section 3 Scripting Languages
- Section 4 Assessments
- Section 4 Persistent Data Storage
- Section 5 Tying it Together
- Table of Contents
- The Missing Link
- Untitled Page 01
- Untitled Page 02
- Untitled Page 03
- Untitled Page 04
- Untitled Page 05
- Untitled Page 06
- Back Matter
- Book: The Missing Link: An Introduction to Web Development (Lumen)
- PGCC
- INT 2840: Systems Analysis and Project Management
- Front Matter
- 1: Introduction to Information Systems?
- 1.1: Components of an Information System
- 1.2: The People in Information Systems
- 1.3: Data Asset in Action- Harrah’s Solid Gold CRM for the Service Sector
- 1.4: The Role of Information Systems
- 1.5: Competitive Advantage
- 1.6: Section #1 Summary
- 2: Business Processes
- 3: Information Systems Development
- 4: Software
- 4.1: Introduction
- 4.2: Open Source
- 4.3: Why Open Source?
- 4.4: Examples of Open Source Software
- 4.5: Why Give It Away? The Business of Open Source
- 4.6: Cloud Computing- Hype or Hope?
- 4.7: The Software Cloud- Why Buy When You Can Rent?
- 4.8: SaaS- Not without Risks
- 4.9: The Hardware Cloud- Utility Computing and Its Cousins
- 4.10: Clouds and Tech Industry Impact
- 4.11: Virtualization- Software That Makes One Computer Act Like Many
- 4.12: Make, Buy, or Rent
- 5: Project Management
- 00: Front Matter
- 5.1: Project Management - Past and Present
- 5.2: 2. Project Management Overview
- 5.3: 3. The Project Life Cycle (Phases)
- 5.4: 4. Framework for Project Management
- 5.5: 5. Stakeholder Management
- 5.6: 6. Culture and Project Management
- 5.7: 7. Project Initiation
- 5.8: 8. Overview of Project Planning
- 5.9: 9. Scope Planning
- 5.10: 10. Project Schedule Planning
- 5.11: Scheduling Tools
- 5.12: 11. Resource Planning
- 5.13: 12. Budget Planning
- 5.14: 13. Procurement Management
- 5.15: 14. Quality Planning
- 5.16: 15. Communication Planning
- 5.17: 16. Risk Management Planning
- 5.18: 17. Project Implementation Overview
- 5.19: 18. Project Completion
- 5.20: 19. Celebrate!
- 5.21: Team Formation, Team Management, and Project Leadership
- 5.22: Chapters
- Back Matter
- 6: Proposals
- 7: Teamwork and Leadership
- 8: Facting Finding and Data
- 8.1: Survey Interview Types
- 8.2: Face-to-Face
- 8.3: Telephone
- 8.4: Self-Administered
- 8.5: Interpreting Survey Data
- 8.6: Cautions for Careful Communicators
- 8.7: Endnotes
- 8.8: Surveys and Information Contributors
- 8.9: Survey Definition
- 8.10: How are Surveys Used?
- 8.11: Searching for Survey Data
- 8.12: Survey Sample Types- Non-Probability
- 8.13: Survey Sample Types- Probability
- 8.14: Sample Size
- 8.15: Sampling Demonstration
- 8.16: Wording of Survey Questions
- 8.17: Question Order in Surveys
- 9: Information Systems Security
- 10: Supplemental- Logical Models
- 11: Supplemental- Testing
- 12: Supplmental - Horizontal / Vertical Software
- 13: Supplemental - Data Validation
- Back Matter
- INT 2840: Systems Analysis and Project Management
- Remixer University
- University of Arkansas Little Rock
- IFSC 4399 - The Internet of Things (IoT)
- introduction to the Internet of Things
- Introduction to the Raspberry Pi
- Putting the Raspberry Pi on the network, residential version
- Communication with the RPi using VNC and SSH
- Introduction to Linux for the Raspberry Pi-history
- Introduction to Linux for the Raspberry Pi-command line
- The Linux philosophy, Legos and the RPi
- Putting the OS on your Raspberry Pi SD card
- Setup Adafruit IO account for IoT
- Linux commands in the bash environment
- Cyber security
- The pwnagotchi filter? Or Invasion of the pwnagotchi!
- Backup your RPi data using rsync
- Secure shell keys
- Data wrangling
- Setting up a WiFi hotspot using the RPi
- Editors, IDEs, scripts, interpreters, and compiled code
- Setup pitunnel for VNC access
- The Linux crontab, scheduling events
- MCP3008 Raspberry Pi Interfacing
- BME680 sensor setup using I2C
- Setting up the 1-wire interface for the RPi
- Introduction to Control Systems (Iqbal)
- 1: Mathematical Models of Physical Systems
- 1.1: Model Variables and Element Types
- 1.2: First-Order ODE Models
- 1.3: Solving First-Order ODE Models
- 1.4: Second-Order ODE Models
- 1.5: Solving Second-Order ODE models
- 1.6: Obtaining Transfer Function Models
- 1.7: DC Motor Model
- 1.8: Industrial Process Models
- 1.9: State Variable Models
- 1.10: Linearization of Nonlinear Models
- 1: Mathematical Models of Physical Systems
- IFSC 4399 - The Internet of Things (IoT)
- University of California Davis
- Book: Material Balances for Chemical Engineers (Cerro, Higgins, and Whitaker)
- Front Matter
- 1: Introduction to Chemical Engineering
- 2: Single and Multicomponent Systems
- 3: Two-Phase Equilibria
- 4: Systems with Reactions and Separations
- 5: Steady State Reactions
- 6: Transient Reactions
- 7: Material Balances for Complex Systems
- 8: Transient Mass Balances and Reaction Kinetics
- 9: Appendix
- Back Matter
- Book: Material Balances for Chemical Engineers (Cerro, Higgins, and Whitaker)
- University of California San Diego
- Bucknell University
- Bookshelves
- Chemical Engineering
- Supplemental Modules (Chemical Engineering)
- Book: Phase Relations in Reservoir Engineering (Adewumi)
- Front Matter
- 1: Introduction and Purpose
- 2: Phase Diagrams I
- 3: Phase Diagrams II
- 4: Phase Diagrams III
- 5: Phase Diagrams IV
- 6: PT Behavior and Equations of State (EOS) I
- 7: PT Behavior and Equations of State (EOS) II
- 8: PT Behavior and Equations of State III
- 9: Cubic EOS and Their Behavior I
- 10: Cubic EOS and Their Behavior II
- 11: Cubic EOS and Their Behavior III
- 12: Elementary Vapor-Liquid Equilibrium I
- 13: Elementary Vapor-Liquid Equilibrium II
- 14: Thermodynamic Tools I
- 15: Thermodynamic Tools II
- 16: Thermodynamic Tools III
- 17: Vapor-Liquid Equilibrium via EOS
- 18: Properties of Natural Gas and Condensates I
- 19: Properties of Natural Gas and Condensates II
- 20: Engineering Applications I
- 21: Engineering Applications II
- Back Matter
- Book: Distillation Science (Coleman)
- Civil Engineering
- Book: Structural Analysis (Udoeyo)
- Front Matter
- 1: Chapters
- 1.1: Introduction to Structural Analysis
- 1.2: Structural Loads and Loading System
- 1.3: Equilibrium Structures, Support Reactions, Determinacy and Stability of Beams and Frames
- 1.4: Internal Forces in Beams and Frames
- 1.5: Internal Forces in Plane Trusses
- 1.6: Arches and Cables
- 1.7: Deflection of Beams- Geometric Methods
- 1.8: Deflections of Structures- Work-Energy Methods
- 1.9: Influence Lines for Statically Determinate Structures
- 1.10: Force Method of Analysis of Indeterminate Structures
- 1.11: Slope-Deflection Method of Analysis of Indeterminate Structures
- 1.12: Moment Distribution Method of Analysis of Structures
- 1.13: Influence Lines for Statically Indeterminate Structures
- Back Matter
- Book: Building Information - Representation and Management - Fundamentals and Principles (Koutamanis)
- Book: Introduction to Design Equity (Miller)
- Front Matter
- Chapters
- Front Matter
- 1.1: Introduction
- 1.2: Learning to Talk about Racism
- 1.3: Why History Matters to Design Equity
- 1.4: Health Equity and the Built Environment
- 1.5: Transportation Equity
- 1.6: Information Equity
- 1.7: What is Design Thinking and What does it have to do with Equity?
- 1.8: Discipline-Specific Professional Design Processes and Equity
- Back Matter
- Back Matter
- Book: All Things Flow - Fluid Mechanics for the Natural Sciences (Smyth)
- Front Matter
- 1: Introduction
- 2: Review of Elementary Linear Algebra
- 3: Cartesian Vectors and Tensors
- 4: Tensor Calculus
- 5: Fluid Kinematics
- 6: Fluid Dynamics
- 6.1: The Leibniz rule
- 6.2: Mass conservation
- 6.3: Momentum conservation
- 6.4: Energy conservation in a Newtonian fluid
- 6.5: The temperature (heat) equation
- 6.6: Equations of state
- 6.7: The advection-diffusion equation for a scalar concentration
- 6.8: Summary: the equations of motion
- 6.9: Boundary conditions
- 6.10: Solution methods
- 7: Vortices
- 8: Waves
- 9: Nonlinear, Hydrostatic Flow Over Topography
- 10: Postface
- 11: Exercises
- 12: Appendix A- Taylor Series Expansions
- 13: Appendix B- Torque and the Moment of Inertia
- 14: Appendix C- Isotropic Tensors
- 15: Appendix D- The Leva-Cevita Alternating Tensor
- 16: Appendix E- Vector Identities
- 17: Appendix F- The Cauchy Stress Tensor
- 18: Appendix G- Boussinesq Approximation
- 19: Appendix H- Bernoulli's Equation
- 20: Appendix I- Vector Operations in Curvilinear Coordinates
- 21: Appendix J- The Stokes Drift
- Back Matter
- Book: Fluid Mechanics (Bar-Meir)
- Front Matter
- 1: Introduction to Fluids
- 2: Review of Thermodynamics
- 3: Review of Mechanics
- 4: Fluids Statics
- 4.1: Introduction
- 4.2: The Hydrostatic Equation
- 4.3: Pressure and Density in a Gravitational Field
- 4.4: Fluid in an Accelerated System
- 4.5: Fluid Forces on Surfaces
- 4.6: Buoyancy and Stability
- 4.7: Rayleigh–Taylor Instability
- 4.8: Qualitative questions
- 5: The Control Volume and Mass Conservation
- 6: Momentum Conservation for Control Volume
- 7: Energy Conservation
- 7.1: The First Law of Thermodynamics
- 7.2: Limitation of Integral Approach
- 7.3 Approximation of Energy Equation
- 7.4: Energy Equation in Accelerated System
- 7.5: Examples of Integral Energy Conservation
- 7.6: Qualitative Questions
- 8: Differential Analysis
- 9: Dimensional Analysis
- 10: Inviscid Flow or Potential Flow
- 11: Compressible Flow One Dimensional
- 11.1 What is Compressible Flow?
- 11.2 Why Compressible Flow is Important?
- 11.3 Speed of Sound
- 11.4 Isentropic Flow
- 11.5 Normal Shock
- 11.6 Qualitative questions
- 11.7 Isothermal Flow
- 11.7: Fanno Flow
- 11.8: The Table for Fanno Flow
- 11.9: Rayleigh Flow
- 12: Compressible Flow 2–Dimensional
- 12.1: Introduction
- 12.2: Oblique Shock
- 12.2.1: Solution of Mach Angle
- 12.2.2: When No Oblique Shock Exist or the case of \(D>0\)
- 12.2.2.1: Large deflection angle for given, \(M_1\)
- 12.2.2.2: The case of \(D\geq 0\) or \(0 \geq\delta\)
- 12.2.2.3: Upstream Mach Number, \(M_1\), and Shock Angle, \(\theta\)
- 12.2.2.4: Given Two Angles, \(\delta\) and \(\theta\)
- 12.2.2.5: Flow in a Semi–2D Shape
- 12.2.2.6: Close and Far Views of the Oblique Shock
- 12.2.2.7: Maximum Value of Oblique shock
- 12.2.2.8: Oblique Shock Examples
- 12.2.3: Application of Oblique Shock
- 12.3: Prandtl-Meyer Function
- 12.4: The Maximum Turning Angle
- 12.5: The Working Equations for the Prandtl-Meyer Function
- 12.6: d'Alembert's Paradox
- 12.7: Flat Body with an Angle of Attack
- 12.8: Examples For Prandtl–Meyer Function
- 12.9: Combination of the Oblique Shock and Isentropic Expansion
- 13: Multi–Phase Flow
- Back Matter
- Book: Slurry Transport (Miedema)
- Front Matter
- 1: Introduction
- 2: Dimensionless Numbers and Other Parameters
- 3: Pressure Losses with Homogeneous Liquid Flow
- 3.1: Pipe Wall Shear Stress
- 3.2: The Darcy-Weisbach Friction Factor
- 3.3: The Equivalent Liquid Model
- 3.4: Approximation of the Darcy-Weisbach Friction Factor
- 3.5: The Friction Velocity or Shear Velocity u*
- 3.6: The Thickness of the Viscous Sub Layer δv
- 3.7: The Smallest Eddies
- 3.8: The Relative or Apparent Viscosity
- 3.9: Nomenclature
- 4: The Terminal Settling Velocity of Particles
- 5: Initiation of Motion and Sediment Transport
- 6: Slurry Transport, a Historical Overview
- 6.1: Introduction
- 6.2: Early History
- 6.3: Empirical and Semi-Empirical Models
- 6.4: The Durand and Condolios (1952) School
- 6.5: The Newitt et al. (1955) Model
- 6.6: Silin, Kobernik and Asaulenko (1958) and (1962)
- 6.7: Graf et al. (1970) and Robinson (1971)
- 6.8: Yagi et al. (1972)
- 6.9: A.D. Thomas (1976) and (1979)
- 6.10: The Turian and Yuan (1977) Fit Model
- 6.11: Kazanskij (1978) and (1980)
- 6.12: The IHC-MTI (1998) Model for the Limit Deposit Velocity
- 6.13: Conclusions and Discussion Empirical and Semi-Empirical Models
- 6.14: Nomenclature Early History and Empirical and Semi-Empirical Models
- 6.15: Physical Models
- 6.16: The Wasp et al. (1963) Model
- 6.17: The Wilson-GIW (1979) Models
- 6.18: The Fuhrboter (1961) Model
- 6.19: The Jufin and Lopatin (1966) Model
- 6.20: Charles (1970) and Babcock (1970)
- 6.21: The Doron et al. (1987) and Doron and Barnea (1993) Model
- 6.22: The SRC Model
- 6.23: The Kaushal and Tomita (2002B) Model
- 6.24: The Matousek (2010), (2011) Model
- 6.25: Talmon (2011) and (2013) Homogeneous Regime
- 6.26: Conclusions and Discussion Physical Models
- 6.27: The Limit Deposit Velocity (LDV)
- 6.28: Inclined Pipes
- 6.29: Starting Points DHLLDV Framework
- 7: The Delft Head Loss and Limit Deposit Velocity Framework
- 7.1: Introduction
- 7.2: Flow Regimes and Scenario’s
- 7.3: A Head Loss Model for Fixed Bed Slurry Transport
- 7.4: A Head Loss Model for Sliding Bed Slurry Transport
- 7.5: A Head Loss Model for Heterogeneous Slurry Transport
- 7.6: A Head Loss Model for Homogeneous Slurry Transport
- 7.7: The Sliding Flow Regime
- 7.8: The Limit Deposit Velocity
- 7.9: The Slip Velocity
- 7.10: The Concentration Distribution
- 7.11: The Transition Heterogeneous vs. Homogeneous in Detail
- 7.12: The Bed Height
- 7.13: Influence of the Particle Size Distribution
- 7.14: Inclined Pipes
- 8: Usage of the DHLLDV Framework
- 8.1: Introduction
- 8.2: Default Equations Used In This Book
- 8.3: The Influence of Fines
- 8.4: The Fixed or Stationary Bed Regime
- 8.5: The Sliding Bed Regime
- 8.6: The Heterogeneous Transport Regime
- 8.7: The Homogeneous Transport Regime
- 8.8: The Transition Heterogeneous Regime - Homogeneous Regime
- 8.9: The Sliding Flow Regime
- 8.10: The Resulting Erhg Constant Spatial Volumetric Concentration Curve
- 8.11: Determining the Limit Deposit Velocity
- 8.12: Constructing the Transport Concentration Curves
- 8.13: The Bed Height
- 8.14: The Concentration Distribution
- 8.15: Graded Sands and Gravels
- 8.16: Inclined Pipes
- 8.17: Conclusions and Discussion
- 8.18: Nomenclature DHLLDV Framework
- 9: Comparison of the DHLLDV Framework with Other Models
- 10: Application of the Theory on a Cutter Suction Dredge
- 10.1: Head Loss Equation
- 10.2: The Limit Deposit Velocity
- 10.3: The Resulting Head Loss versus Mixture Flow Graph
- 10.4: The Relative Excess Hydraulic Gradient of Pump and Pipeline
- 10.5: A Segmented Pipeline System
- 10.6: Conclusions and Discussion
- 10.7: Nomenclature Application of the Theory on a Cutter Suction Dredge
- 11: Appendices
- Book: Structural Analysis (Udoeyo)
- Chemical Engineering