Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Database theory

The transaction concept is a major cornerstone of database theory. Transactions are used to describe atomic operations, i.e. operations which are free from interference with operations being performed on behalf of concurrent clients and either an operation must be completed successfully or it must have no effect at all. [Pg.421]

Based on the reported anomalies and information from other sources such as network management, firewalls, etc. countermeasures can be initiated. To initiate and control these countermeasures an appropriate mechanism is required. Continuing the analogy between intrusion detection and database theory, the theory of active databases (see e.g. [899]) is applied. The theory of active databases is built around the concept of active rules. An active rule has the following ECA form ... [Pg.422]

The tables are formally called relations, referring to the mathematical set theory used in the original work on relational databases.1 In database theory, rows are called tuples and columns are called attributes of a tuple. The focus of this book is practical, so the common terms table, row, and column are used. The detail of using the SQL language to perform these operations is left to a later chapter of this book. [Pg.5]

Cha] Chatteijee, N., Kmger, R., Haller, G., Olbricht, W., The Bayesian Approach to an Internally Consistent Thermodynamic Database Theory, Database, and Generation of Phase Diagram ,... [Pg.285]

Several of the reactor physics parameters are both measurable and calculable from more fundamental properties such as the energy-dependent neutron cross sections and atom number densities. An extensive database. Evaluated Nuclear Data Files (ENDF), has been maintained over several decades. There is an interplay between theory and experiment to guide design of a reactor, as in other engineering systems. [Pg.212]

Risk and uncertainty associated with each venture should translate, ia theory, iato a minimum acceptable net return rate for that venture. Whereas this translation is often accompHshed implicitly by an experienced manager, any formal procedure suffers from the lack of an equation relating the NRR to risk, as well as the lack of suitable risk data. A weaker alternative is the selection of a minimum acceptable net return rate averaged for a class of proposed ventures. The needed database, from a collection of previous process ventures, consists of NPV, iavestment, venture life, inflation, process novelty, decision (acceptance or rejection), and result data. [Pg.447]

To overcome the limitations of the database search methods, conformational search methods were developed [95,96,109]. There are many such methods, exploiting different protein representations, objective function tenns, and optimization or enumeration algorithms. The search algorithms include the minimum perturbation method [97], molecular dynamics simulations [92,110,111], genetic algorithms [112], Monte Carlo and simulated annealing [113,114], multiple copy simultaneous search [115-117], self-consistent field optimization [118], and an enumeration based on the graph theory [119]. [Pg.286]

Although the code is based on well-recognized models referenced in the literature, some of the underlying models are based on "older" theory which has since been improved. The code does not treat complex terrain or chemical reactivity other than ammonia and water. The chemical database in the code is a subset of the AIChE s DIPPR database. The user may not modify or supplement the database and a fee is charged for each chemical added to the standard database distributed with the code. The code costs 20,000 and requires a vendor supplied security key in the parallel port before use. [Pg.359]

This book, for the most part, is a stand-alone text. It addresses not only the fundamentals of PSA as a science, but insights on the regulatory framework affecting its development and apidication. In particular, it provides the basic methods of analysis that can be employed, available databases, an excellent set of examples, software resources, chapter summaries that tacilitate comprehension, and problem sets that are very well connected to the theory. While much has been written about probabilistic safety assessment over the last three decades, this is the most comprehensive attempt so far to provide a much needed college level textbook for the education of risk and safety professionals. It also provides a valuable reference for any individual curious enough about the risk and safety sciences to want to become much more informed. [Pg.539]

Although the steps outlined above would in theory be capable of generating a quantitative database, it seems unrealistic to expect the degree of cooperation that would be required across the industry to develop such a resource. A more likely possibility is that large multinationals will support the development of in-house databases, possibly using the same approach as advocated here. [Pg.254]

QCRNA, http //theory.chem.umn.edu/Database/QCRNA. [Pg.405]


See other pages where Database theory is mentioned: [Pg.228]    [Pg.228]    [Pg.230]    [Pg.232]    [Pg.234]    [Pg.246]    [Pg.17]    [Pg.94]    [Pg.943]    [Pg.228]    [Pg.228]    [Pg.230]    [Pg.232]    [Pg.234]    [Pg.246]    [Pg.17]    [Pg.94]    [Pg.943]    [Pg.818]    [Pg.1770]    [Pg.27]    [Pg.396]    [Pg.11]    [Pg.505]    [Pg.661]    [Pg.2311]    [Pg.2578]    [Pg.485]    [Pg.30]    [Pg.52]    [Pg.59]    [Pg.243]    [Pg.254]    [Pg.606]    [Pg.124]    [Pg.140]    [Pg.331]    [Pg.710]    [Pg.282]    [Pg.170]    [Pg.249]    [Pg.379]    [Pg.386]    [Pg.138]    [Pg.171]    [Pg.221]   
See also in sourсe #XX -- [ Pg.228 ]




SEARCH



Basic Database Theory

© 2024 chempedia.info