Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Degree of multiple attack

A. oryzae a-amylase has about the same degree of multiple attack as human salivary a-amylase, i.e. an average of three hydrolytic cleavages per chain encounter. A. oryzae a-amylase is the only common a-amylase known to hydrolyze the cyclic a-(l- 4)-l inked maltodextrins to any extent.25,26 A kinetic analysis revealed that the catalytic constant, k2, increased significantly from 3.3 to 270 to 3270min-1 for cyclomaltohexaose, cyclomaltoheptaose and cyclomalto-octaose, respectively, while the Km was 4.7 M, 10.2 M and 2.4 M, respectively.26... [Pg.244]

Also, the bond second from the reducing end (bond 10) is believed to be readily split.The high yields of maltose may be obtained by a preferential attack on bond 10, or by a degree of multiple attack. Calculations of theoretical yields to be expected on the basis of preferential attack on bond 10 are in fairly good agreement with experiment, whereas those based on multiple attack predict more maltose than is actually formed. [Pg.318]

To decide upon the action patterns of these enzymes, a new method for the calculation of the degree of multiple attack, based on a concept established by J. F. Rohyt and D. French Arch, Biochem. Biophys., 1967, 122, 8), was employed. It was shown that the degree of multiple attack was represented by... [Pg.443]

The electrochemical process of corrosion is complex, and the corrosion rate depends on myriad physical and chemical parameters. Different degrees of corrosive attack are often observed at different locations on the same part seemingly exposed to the same corrosive environment. Figure 7.6 shows typical uniform general corrosion on a steel tube. Most areas show relatively imiform corrosion, while an unusually severe corrosive attack at one location has penetrated through the tube thickness. Multiple corrosion mechanisms can be activated therefore, different failure modes predominate in accelerated and natural tests. This might require the use of different corrosion models in corrosion rate calculation and introduce different confidence levels in... [Pg.254]

As mentioned earlier, Cx enzymes exist in multiple forms in most cellulase systems. As a rule they vary in the degree of randomness of their attack on CM-cellulose, and they may be distinguished by plotting... [Pg.204]

Because of their free electron pairs or electron shell vacancies heteroatoms are particularly susceptible to attack by catalyst. Since heteroatom-containing groups react both by polycondensation and polyaddition mechanisms, they are especially readily catalyzed. The polymerization of rings with heteroatoms (lactams, lactones, trioxane, etc.) can also be easily initiated. On the same basis, however, deactivation of the chain can also occur frequently in these substances therefore, only low degrees of polymerization can be obtained. On the other hand, the activation of cycloalkanes in polymerization reactions proceeds with difficulty. The following discussion will therefore concentrate on the polymerization of rings and monomers with multiple bonds. [Pg.567]

Detection of Data Integrity Attacks. An arbitrary RTU is set to a malicious state leading to sensor messages in transfer being corrupted. For each received SCADA sensor message on an MTU, the same datum is requested from q different replica locations. With the multiple received messages, the receiver can check for their SCADA payload equality. Simulations use a replication degree of k = Z, i.e., three copies of each DHT key/value pair exist in the network. [Pg.171]


See other pages where Degree of multiple attack is mentioned: [Pg.31]    [Pg.320]    [Pg.338]    [Pg.2334]    [Pg.478]    [Pg.497]    [Pg.444]    [Pg.331]    [Pg.31]    [Pg.320]    [Pg.338]    [Pg.2334]    [Pg.478]    [Pg.497]    [Pg.444]    [Pg.331]    [Pg.371]    [Pg.278]    [Pg.37]    [Pg.214]    [Pg.186]    [Pg.175]    [Pg.243]    [Pg.256]    [Pg.618]    [Pg.303]    [Pg.339]    [Pg.37]    [Pg.449]    [Pg.670]    [Pg.91]    [Pg.617]    [Pg.193]    [Pg.205]    [Pg.37]    [Pg.395]    [Pg.130]    [Pg.1541]    [Pg.289]    [Pg.148]    [Pg.221]    [Pg.46]    [Pg.91]    [Pg.1408]    [Pg.19]    [Pg.622]    [Pg.31]   
See also in sourсe #XX -- [ Pg.29 ]




SEARCH



Multiple attack

© 2024 chempedia.info