Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Corruption

Another problem in many NMR spectrometers is that the start of the FID is corrupted due to various instrumental deadtimes that lead to intensity problems in the spectrum. The spectrometer deadtime is made up of a number of sources that can be apportioned to either the probe or the electronics. The loss of the initial part of the FID is manifest in a spectrum as a rolling baseline and the preferential loss of broad components of... [Pg.1471]

Computational issues that are pertinent in MD simulations are time complexity of the force calculations and the accuracy of the particle trajectories including other necessary quantitative measures. These two issues overwhelm computational scientists in several ways. MD simulations are done for long time periods and since numerical integration techniques involve discretization errors and stability restrictions which when not put in check, may corrupt the numerical solutions in such a way that they do not have any meaning and therefore, no useful inferences can be drawn from them. Different strategies such as globally stable numerical integrators and multiple time steps implementations have been used in this respect (see [27, 31]). [Pg.484]

L. magnes, magnet, from magnetic properties of pyrolusite It. manganese, corrupt form of magnesia)... [Pg.59]

These measurements with their inherent errors are the bases for numerous fault detection, control, and operating and design decisions. The random and systematic errors corrupt the decisions, amplifying their uncertainty and, in some cases, resulting in substantially wrong decisions. [Pg.2548]

Understanding the positions of sample and other measurement locations within the equipment is also important. The presence or absence of isolation valves needs to be identified. While isolation valves may be too large for effective sampling, their absence will require that pipe fitters add them such that sample valves can be connected. This must be done in advance of any test. If analysts assume that samples are from a liquid stream when they are vapor or that temperature measurements are within a bed instead of outside it, interpretation of results could be corrupted. Analysts should also develop an understanding of control transmitters and stations. The connection between these two may be difficult to identify at this level in fully computer-controlled units. [Pg.2553]

Sometimes delivery is made electronically using a modem and telephone line. The product may be a software package, a document stored in electronic form, or a facsimile. Protection of the product is still required but takes a different form. You need to protect the product against loss and corruption during transmission. [Pg.484]

Linked to the filing and indexing requirement, this requirement addresses the conditions of storage and also provides the reasons i.e. to prevent loss. On the subject of loss, you will need to consider loss by fire, theft, and unauthorized removal. If using computers you will also need to consider loss through computer viruses and unauthorized access, deletion, or the corruption of files. A booking in/out system should be used for completed records when they are in storage, in order to prevent unauthorized removal. [Pg.498]

Erkaltung,/. cold, catarrh cooling, erkannt, p.a. detected, etc, (see erkennen). erkanfen, t.i. purchase, buy bribe, corrupt, erkennbar, a. knowable, discernible, percepti-blf. recognizable,... [Pg.137]

Verderb, m. waste decay corrosion ruin, verderben, v.t. spoil, damage ruin, corrupt. — v.t. be spoiled, spoil, decay. — verdorben, p.a. spoiled, damaged, foul, rotten, verderblich, a. perishable destructive, injurious. [Pg.478]

It is thought that /ki chimedes had a lower regard for his mechanical work however, this is difficult to validate because few writings about his mechanical devices remain. Aixhiniedcs used mechanics as a tool to think about abstract problems, rather than as a field of study itself. Contemporaries such as Plato frowned upon such a link between geometry and mechanics they considered it as a corruption of the purity of geometry. [Pg.83]

The obvious lesson to be taken away from this amusing example is that how well a net learns the desired associations depends almost entirely on how well the database of facts is defined. Just as Monte Carlo simulations in statistical mechanics may fall short of intended results if they are forced to rely upon poorly coded random number generators, so do backpropagating nets typically fail to ac hieve expected re.sults if the facts they are trained on are statistically corrupt. [Pg.547]

One shortcoming of Schild analysis is an overemphasized use of the control dose-response curve (i.e., the accuracy of every DR value depends on the accuracy of the control EC o value). An alternative method utilizes nonlinear regression of the Gaddum equation (with visualization of the data with a Clark plot [10], named for A. J. Clark). This method, unlike Schild analysis, does not emphasize control pECS0, thereby giving a more balanced estimate of antagonist affinity. This method, first described by Lew and Angus [11], is robust and theoretically more sound than Schild analysis. On the other hand, it is not as visual. Schild analysis is rapid and intuitive, and can be used to detect nonequilibrium steady states in the system that can corrupt... [Pg.113]

Traditionally, documentation has been maintained on hardcopy paper systems. However, soft copy computer records are permitted provided it can be assured that the records can be maintained without corruption. More sophisticated systems that are used to create electronic records and electronic signature must be capable of... [Pg.24]

So far, we considered image deconvolution assuming that the PSF was perfectly known. In practice, this is rarely the case. For instance, when the PSF is measured by a calibration procedure, it is corrupted by some level of noise. Moreover, if the observing conditions change, the calibrated PSF can mismatch the actual PSF. It may even be the case that the PSF cannot be properly calibrated at all, because it is varying too rapidly, or because there is no time or no means to do such a calibration. What can we do to cope with that ... [Pg.416]

In the following, an example from Chapter 4 will be used to demonstrate the concept of statistical ruggedness, by applying the chosen fitting model to data purposely corrupted by the Monte Carlo technique. The data are normalized TLC peak heights from densitometer scans. (See Section 4.2) ... [Pg.164]

An example of mechanism (1) is given in Section 1.1.2 Essentially, numerical artifacts are due to computational operations that result in a number, the last digits of which were corrupted by numerical overflow or truncation. The following general rules can be set up for simple operations ... [Pg.170]

It is sown in corruption it is raised in incorruption. It is sown in dishonour it is raised in glory. .. It is sown a natural body it is raised a spiritual body (I Corinthians 15 42-44). [Pg.76]

In his Warning Franckenberg argued that disputes with the Papists had led to the corruption of reason. Splitting hairs had led Lutherans away from the inner truth and since the Protestants were themselves... [Pg.102]

Given a space G, let g (x) be the closest model in G to the real function, fix). As it is shown in Appendbc 1, if /e G and the L°° error measure [Eq. (4)] is used, the real function is also the best function in G, g = f, independently of the statistics of the noise and as long as the noise is symmetrically bounded. In contrast, for the measure [Eq. (3)], the real function is not the best model in G if the noise is not zero-mean. This is a very important observation considering the fact that in many applications (e.g., process control), the data are corrupted by non-zero-mean (load) disturbances, in which cases, the error measure will fail to retrieve the real function even with infinite data. On the other hand, as it is also explained in Appendix 1, if f G (which is the most probable case), closeness of the real and best functions, fix) and g (x), respectively, is guaranteed only in the metric that is used in the definition of lig). That is, if lig) is given by Eq. (3), g ix) can be close to fix) only in the L -sense and similarly for the L definition of lig). As is clear,... [Pg.178]

Fig. 10. Evolution of learning for Example 1 data corrupted with noise. Fig. 10. Evolution of learning for Example 1 data corrupted with noise.
As indicated before, the maximum entropy approach does not process the measurements themselves. Instead, it reconstructs the data by repeatedly taking revised trial data (e.g. a spectrum or chromatogram), which are artificially corrupted with measurement noise and blur. This corrupted trial spectrum is thereafter compared with the measured spectrum by a x -test. From all accepted spectra the maximum entropy approach selects that spectrum, f with minimal structure (which is equivalent to maximum entropy). The maximum entropy approach applied for noise elimination consists of the following steps ... [Pg.560]


See other pages where Corruption is mentioned: [Pg.2549]    [Pg.118]    [Pg.132]    [Pg.339]    [Pg.161]    [Pg.73]    [Pg.95]    [Pg.352]    [Pg.165]    [Pg.331]    [Pg.480]    [Pg.789]    [Pg.547]    [Pg.63]    [Pg.926]    [Pg.400]    [Pg.420]    [Pg.39]    [Pg.327]    [Pg.377]    [Pg.16]    [Pg.60]    [Pg.75]    [Pg.82]    [Pg.161]    [Pg.163]    [Pg.165]    [Pg.242]    [Pg.601]    [Pg.630]   
See also in sourсe #XX -- [ Pg.293 , Pg.362 , Pg.368 ]

See also in sourсe #XX -- [ Pg.60 ]

See also in sourсe #XX -- [ Pg.2 , Pg.109 ]

See also in sourсe #XX -- [ Pg.8 , Pg.45 , Pg.47 , Pg.51 , Pg.52 , Pg.62 , Pg.63 , Pg.66 , Pg.147 , Pg.148 , Pg.150 , Pg.151 , Pg.157 , Pg.181 , Pg.252 ]




SEARCH



Communities Corruption

Corrupted

Corrupted data

Corruption, China

Data corruption

Error, fraud and corruption

Foreign Corrupt Practices Act

Generation and corruption

Tracking Error, Fraud, and Corruption

© 2024 chempedia.info