Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Access point

Forty-hour training was required for personnel entering the exclusion zone, and additional supervisory training was required for site supervisors. Site control procedures described in the Site C contractor s SSAHP included maintenance of site control logs at each access point, use of red tape or chainlink fencing to demarcate hot zones, and use of the buddy system in all exclusion and contamination reduction zone areas. Site communications relied almost exclusively on visual sighting of employees the plan did not describe the use of two-way radios. This suggested that all employees in hot zones can be observed continuously from the support zones. [Pg.198]

Provide an access point for FW and facilitate thorough mixing of this water with BW. [Pg.10]

Provide an access point for the injection and intimate mixing of water treatment chemicals into the BW. [Pg.10]

There are many process contaminants that may be inadvertently carried back with the condensate following either the purposeful injection of live steam into, say, an industrial manufacturing process or that can infiltrate the system due to a leaking heating coil, an open surge tank, or similar access point. [Pg.299]

Discourse. Like the Notable Anthologies of Alchemical Writings Published in the Sixteenth and Seventeenth Centuries, It Seeks to Counter the Problem of an Acute Lack of Reliable Primary Texts and to Provide a Convenient and Accessible Point of Entry to the Field. [Pg.3]

The main access and egress to a facility preferably should be from the upwind side, with secondary points at cross wind locations. These locations should also be at a relatively higher elevations that the process areas so that possible spillages will not hinder supplemental emergency aid measures from outside the facility. As a minimum two access point should be provided to each facility. [Pg.101]

Process vessels and equipment should be provided with identification in the field that is legible from approximately 30 meters (100 ft.) away. It should be viewable from the normal access points to the facility or equipment and is of colors contrasting with the surrounding background. The identifications normally consist of the equipment identification number and the common name of the equipment, e g., "V-200, Propane Surge Drum". This is beneficial during routine and emergency periods where the quick identification of process equipment is critical and necessary from a distance. [Pg.245]

As with packaging, the exact form of component composition varies across different component technologies and tools. The key point is that the composition can be done by a different party, and at a different time, from the building of the components themselves. Section 10.7, Component Architecture, discusses a component-port-connector model for describing compositions in a simple way. Ports are the access points in a component where its services can be accessed or where it can access another s services connectors couple ports. The kinds of compositions supported by a particular technology or style can be described by its connector kinds. [Pg.412]

Secure hatches, metering vaults, manholes, and other access points to the facility. [Pg.93]

Any location that has a connection to the SCADA network is a target, especially unmanned or unguarded remote sites. Conduct a physical security survey and inventory access points at each facility that has a connection to the SCADA system. Identify and assess any source of information including remote telephone/ computer network/fiber optic cables that could be tapped radio and microwave links that are exploitable computer terminals that could be accessed and wireless local area network access points. Identify and eliminate single points of failure. The security of the site must be adequate to detect or prevent unauthorized access. Do not allow live network access points at remote, unguarded sites simply for convenience. [Pg.131]

Access points into the containment area for personnel or wheeled-traffic may be provided with ramps over the curbing spanning the width of the access path. [Pg.155]

Development of interdisciplinary interactions by finding simple access points in other disciplines where green chemistry and engineering are applicable ... [Pg.36]

MTT is commercially available in several forms. Enviro-Blend is used as a remediation technology to treat contaminated soils, sludges, and sediment. This mixture also serves as a pollution prevention technology to treat industrial waste streams. Enviro-Blend is distributed exclusively by American Minerals, Inc. The Enviro-Prep System stabilizes the lead in paint and is commercially available through Hoffer s Coatings, Inc. Enviro-Prep Special is another MTT product that is used to stabilize lead contamination in utility access points. [Pg.927]

With the approximations in equation (6.60), x = 8,000 m will be assumed sufficient to begin our determination olDt, especially because that is one of the few access points (a bridge) into this reach of the river. [Pg.171]

Type of Company Phase II/III Access Point 2 Phase IV Access Point 3 Generic Access Point 4 ... [Pg.139]

Let us begin by briefly examining two relatively accessible points on the reaction profile, the reactants and the products. As these points represent ground states on the reaction surface, the treatment is well known. We will see, however, that the same basic principles carry over into generating less accessible points on the reaction profile, such as the reaction transition state. [Pg.103]

In the USA, this plan was directed from 1929-1939 by the Committee on Drug Addiction of the National Research Council (NRC) with financial support from the Rockefeller Foundation. The program consisted of modification of the morphine molecule at all accessible points and also targeted (modified) partial structures of the morphine molecule, such as phenanthrene, hydrogenated phenanthrene, isoquinoline, dibenzofuran, and carbazole. More than 150 derivatives of morphine and more than 300... [Pg.160]

It has the effect of subtracting v from the state vector. Thus, starting from an initial state n°, both reactions together cause the state vector to move over a discrete chain of lattice points lying on a straight line between two boundaries of the physical octant. The accessible points are... [Pg.167]

First suppose that the representation (1.5) is unique, in the sense that for given n° each accessible point n is represented by a single set of values p. Then (1.5) maps the accessible sublattice onto the integral value lattice in the space with coordinates p. Each lattice point in the accessible part of this space corresponds to one and only one state of the mixture. Each reactive collision corresponds to a unit step parallel to one of the coordinate axes f. [Pg.168]

The retina extends forward to the sclera as a globe-shaped wineglass almost external to the skull. That part of the sclera devoid of retina is the pars planar, which is used as an access point for injection or for close delivery to the iris and ciliary body (ICB). When stripped from its basement membrane and opened out, the collapsed retina is a circular disk approximately 42 mm in diameter and 0.5 mm in thickness. The organization of the retina is based on a three-neuron chain (photoreceptor cell-bipolar cell-ganglion cell) and accompanying cells (horizontal, amacrine, and Muller cells)... [Pg.485]

But he didn t want to damage Garudin s desk terminal according to Tatyana it was the access point for Garudin s private elevator and the only way into the basement levels without chancing the entrance point through the sewers a second time. And according to Tatyana s information, the desk was about the only decent piece of furniture in the office. [Pg.150]

The use of authentication checks at physical access points in order to establish that the machine-readable codes on tokens and PINs are assigned to the same individual. [Pg.107]

Initially, safety was the only critical issue to be looked at (safety-driven visions), but increased connectivity and interaction with higher layers of overall systems of systems (e.g., traffic/transport) and more access points (e.g., for diagnosis and maintenance, error correction and upgrading) enforce a more security-driven approach Security has severe safety impact ... [Pg.165]

Data enrichment is presented at the lower left comer of Figure 1. Data enrichment occurs when heterogeneous contextual information is entered in the event database. The same object can be represented by heterogeneous information depending on the data source. For example, the Windows NT event log can give us a host name, the network intrusion detection system a host IP address, and the wireless access point a MAC address, this for the same machine. The data enrichment functions attempt to complete and reconcile heterogeneous information entered in the database. [Pg.354]

Logs represent host by three different keys, a host name, a host IP address, and a host MAC address. The name is either fully qualified or a simple machine name, depending on the information source. This type of information is often provided by host-based information sources, or by devices configured to do on-the-fly reverse DNS mapping. An IP address is often provided by network-based IDS sensors and other network equipments. Finally, MAC addresses are provided by low-level networking devices such as wireless access points and switches, when specific network or wireless attacks are detected. All three keys are frequently found in event logs. [Pg.359]

X is a port access protocol for protecting networks via authentication, extremely useful in the wireless environment due to the nature of the medium. When a wireless device is authenticated via 802.1 x for network access, a virtual port is opened on the access point allowing for communication. [Pg.511]

Teens also cited ease of access of prescription medications as a major factor. Specifically, the majority stated that parents medicine cabinets, and/or medicine cabinets in the homes of friends, are major access points. Some individuals obtain prescription drugs for abuse by doctor shopping, by which the individuals continually switch physicians to get new prescriptions so that they can obtain enough medication to feed their addiction. Individuals may also illegally purchase medications from legitimate patients who... [Pg.17]

In both experiments a surprising degree of penetration of the polymerizable monomers into a difficultly accessible point was achieved. In the crevice experiment the thickness of the deposited polymer at the bottom of the crevice in all runs was more than 50% that deposited on the outer surface, except where the angle of opening was only 1° of arc. [Pg.673]


See other pages where Access point is mentioned: [Pg.55]    [Pg.58]    [Pg.61]    [Pg.204]    [Pg.36]    [Pg.25]    [Pg.908]    [Pg.202]    [Pg.190]    [Pg.191]    [Pg.195]    [Pg.197]    [Pg.200]    [Pg.207]    [Pg.218]    [Pg.590]    [Pg.29]    [Pg.354]    [Pg.264]    [Pg.95]    [Pg.65]    [Pg.319]    [Pg.510]   
See also in sourсe #XX -- [ Pg.41 ]

See also in sourсe #XX -- [ Pg.135 ]




SEARCH



© 2024 chempedia.info