Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Attack, types

Localized, concentration-cell corrosion (differential aeration corrosion), occurring as Tuberculation corrosion Crevice corrosion Under-deposit corrosion Pitting corrosion All forms of localized, concentration-cell corrosion are indirect attack type corrosion mechanisms. They result in severe metal wastage and can also induce other corrosion mechanisms, e.g. Stress corrosion Corrosion fatigue... [Pg.270]

Diabetes is a metabolic disorder where glucose metabolism in the body is impaired. Type 1 diabetes is an early onset disease in which the pancreatic cells lose the function of insulin secretion either by genetic disposition or by a viral attack. Type 2 diabetes is a late onset disease developed due to insufficient insulin secretion or insulin resistance resulting in impaired glucose metabolism. [Pg.367]

The proposed method is universal to different attack types, and it enables to detect the status of remote attacking computer in the real time. The software module allows to promote the efficiency of corporate networks defense systems functioning, using its aggregation with the program complexes of the Intrusion Detection System. [Pg.206]

Table 1 describes main attack types used in KDD data set. [Pg.369]

KDD database consists of 4940210 records where every record describes one TCP/IP connection. Only 20% of records represent normal connections. A connection is by a sequence of TCP packets during a duration whose starting time and ending time are both well defined, and data flow during this duration from a source IP address to a target IP address under some well defined protocol. Each connection is labeled as either normal or attack. In the latter case, the connection should be with exactly one specific attack type. [Pg.370]

Attack Type of normal samples Total samples... [Pg.376]

Let s examine the recognition of attack types (Table 7). Table 8 show the statistic of recognition and detection of attacks depending on attack type. Table 9 shows the common results concerning attack recognition and detection for four categories. As can be seen MLP network can recognize 94,49% attack. [Pg.377]

Table 8. Identification and Recognition Statistics Depending on Attack Type... Table 8. Identification and Recognition Statistics Depending on Attack Type...
Attack by wood-degrading bacteria has now been reported from all parts of the world. It is diflScult when reporting on the occurrence to keep the bacterial decay types separate, because it is not always clear if the reported type falls into any of the three categories of attack. Thus, the attack type should only be reported when there is little doubt. [Pg.169]

In alkaline solutions, the resistance of stainless steels is, in general, quite high. In NaOH solutions of all concentrations up to temperatures of 65 °C, stainless steels are not attacked. Type 304 ( 18% Cr, 10% Ni) and 316 alloys ( 17% Cr, 11% Ni, 2% Mo) resist boiling NaOH up to concentrations of nearly 20%. [Pg.85]

Type I hot corrosion is the transport of sulfur from a sulfur deposit (a molten salt) through an existing oxide layer, where it forms stable sulfides with chromium. As time progresses, chromium fully reacts with sulfur and can no longer move through the oxide layer to provide protection against oxidative attack. Type I hot corrosion occurs from 750 to 950 °C [16]. [Pg.505]

Intergranular penetration of the container waU. Both lead and lithium attack type 304 stainless steel at 1800 F by selective leaching of material from the grain boundaries. [Pg.643]

Does multiple realizability really attack type-identity theory It seems obvious that many innocent properties are multiply realizable. For example, a specific mean kinetic energy of an entity can be realized by infinitely many spatial states of the entity s constituents (Kisfler 1999). This does not affect its being a basic kind. Thus, multiple realizability does not seem to threaten identity-theories per se. The trick is to introduce a distinction between heterogeneous multiple realization and homogeneous multiple realization. The former is bad for the identity-theorist,... [Pg.137]

Attack information primary attack type, secondary attack type (if applicable), instruments used (e.g. explosive, firearms, arson, etc.), combination attack (Y/N)... [Pg.1508]

Attack Type Attack Name Short description... [Pg.238]

A person with type A blood makes antibodies that attack type B blood, forming clumps of type B cells. Similarly, a person with type B blood makes antibodies that attack type A blood, forming clumps of type A cells. However, a person with type A or type B blood does not make antibodies to type O blood. Thus, type O persons are called universal donors. They are not, however, universal acceptors because they produce antibodies to both type A and type B blood. [Pg.942]

It is generally admitted that in photocatalysis, chemical compotmds are initially attacked mainly by either OH radicals or holes. The latter attack type, which is also called single-electron transfer (SET), necessarily occurs at the surface. The former attack type could also take place in the water layers close to the surface when the photocatalyst is exposed to liquid water or humid air. This possibility is based on diverse reasoning [9, 47, 55, 72, 73]. [Pg.337]


See other pages where Attack, types is mentioned: [Pg.1067]    [Pg.230]    [Pg.27]    [Pg.245]    [Pg.369]    [Pg.370]    [Pg.370]    [Pg.169]    [Pg.170]    [Pg.196]    [Pg.196]    [Pg.197]    [Pg.198]    [Pg.198]    [Pg.96]    [Pg.278]    [Pg.685]    [Pg.1100]    [Pg.163]    [Pg.331]    [Pg.1508]    [Pg.1509]    [Pg.1510]    [Pg.236]    [Pg.14]    [Pg.337]   
See also in sourсe #XX -- [ Pg.23 ]




SEARCH



© 2024 chempedia.info