Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Identification scheme

Before quantitative evaluation, the events must be coded with an unique ideniitier. A systematic and orderly identification scheme minimizes the possibility of ambiguity or multiple identifier for the same event. [Pg.111]

Gooch [4] has reported general deformulation schemes for solid paints and coatings, liquid paints, solid plastics, liquid plastic specimens, solid and liquid adhesives, in which preliminary examination (by OM, SEM, EDXRA) is followed by separation of the individual components and their subsequent identification (Scheme 2.9). Gooch employs different deformulation schemes for solid and liquid specimens, but essentially identical approaches for plastics, paints, adhesives and inks (Scheme 2.10). [Pg.42]

FIGURE 26.20 Panel-seam identification scheme. (Adapted from U.S. EPA, Requirements for Hazardous Waste Landfill Design, Construction, and Closure, EPA/625/4-89/022, U.S. Environmental Protection Agency, Cincinnati, OH, August 1989.)... [Pg.1126]

Panels must be properly identified to know where they lit in the facility. Figure 26.20 depicts the panel-seam identification scheme used for this purpose. This numbering scheme also assures a high-quality installation, since seam numbers are used to inventory all samples cut from the FML panel during installation. The samples cut from the panels are tested to ensure that the installation is of high quality. Quality assurance and the panel-seam identification scheme are discussed in more detail in Chapter 7. [Pg.1126]

The U ,s0 ) is calculated using Eq. (55). The pressure distribution in the vapor layer can be obtained by solving Eqs. (86) and (87). In this procedure, the thickness of the vapor layer (8( )) and the extent of the layer ( b) are obtained through a vapor-layer identification scheme based on the particle and droplet level-set function. Fig. 22 illustrates the details of the scheme. [Pg.54]

Radioactive Taggants Addition of small amounts of radioactive isotopes to expls during the manufg process appears to be particularly attractive at first glance, as it provides a mechanism for both identification of the expl materials from the postdetonation debris, and a simple detection mechanism. There axe a large number of radioisotopes, so an identification scheme could certainly be developed that would provide sufficient unique code species, although there would be some limitations of availability and cost. [Pg.503]

Figure 4 Tiered oil spill source identification scheme using molecular chemistry. The increasing level of source specificity required (down the diagram) is provided by global distributions of n-alkanes (level 1), PAH and biomarker distribution patterns (level 2), and isomeric and other diagnostic marker ratios (level 3), respectively (reproduced by permission of Nordtest from Revision of the Nordtest Methodology for Oil Spill Identification, 2002, 110). Figure 4 Tiered oil spill source identification scheme using molecular chemistry. The increasing level of source specificity required (down the diagram) is provided by global distributions of n-alkanes (level 1), PAH and biomarker distribution patterns (level 2), and isomeric and other diagnostic marker ratios (level 3), respectively (reproduced by permission of Nordtest from Revision of the Nordtest Methodology for Oil Spill Identification, 2002, 110).
The goat of the signal processing is the parameter determination of the state of mixedness (i.e. Bodenstein number, mean residence time, etc.). The identiflcation of the model parameters is done by using an off-line identification scheme. The identification can take place either in the time or in the frequency domain. Since the convolution in the time domain becomes a multiplication in the frequency domain, it is advantageous to execute the identification in the frequency domain to save computational costs. Additionally, the presentation of the results in the frequency domain offers new insights. [Pg.580]

Identification schemes only serve to authenticate a person or a device. In contrast to authentication schemes, this person or device does not want to transmit a particular message. Thus, identification schemes can mainly be used where certain people are to be granted physical access to buildings or areas A small computer that they carry with them, e.g., on a smartcard, can carry out such an identification protocol. However, in situations where more digital communication follows after the original identification, all the following messages have to be authenticated, too. [Pg.8]

From every authentication scheme (mere authentication or signatures), a corresponding identification scheme can be constructed for instance, authenticated messages I am now.here,. .. , with a time stamp, can be sent. The reverse... [Pg.8]

Poin95 David Pointcheval A New Identification Scheme Based on the Perceptrons Problem Eurocrypt 95, LNCS 921, Springer-Verlag, Berlin 1995, 319-328. [Pg.383]

EPDM (monomer name), 75 Shore A (as-cured hardness). However, this type of identification scheme is insufficient to guarantee reliable service performance in critical applications. See Figure 7-3. [Pg.159]

No universal parts classification exists, which means that a method of reconciling parts identification schemes used at different facilities needs to be developed. A photo-image approach, an index mapping scheme, or other methods can resolve this, but such has yet to be defined. [Pg.57]

In general, simple observation and feel alone are insufficient to reveal the chemical nature of a three-dimensional plastic object. Identification schemes have been developed based on simple tests including the behaviour of polymers on impact, in liquids (flotation and dissolution) or in a flame. Such tests provide a rough, qualitative assessment of simple homopolymers but are not effective at identifying copolymers or polymer blends (Braun 1996 Cloutier and Prud homme, 1993). [Pg.120]

The MOF X identification scheme was developed by O.M. Yaghi. The magnitude of X roughly indicates the order in which these metal-organic frameworks were originally synthesized. [Pg.349]

A systematic identification scheme, based on paper chromatography and t.l.c., acidic and enzymic hydrolysis, and the reaction of carbohydrates with several location reagents, has been applied to the analysis of oligosaccharides present in the urine and faeces of sick children and in the diets they are fed. The identity and origin of these oligosaccharides is described and their relevance to the diagnosis and treatment of children with suspected disorders of carbohydrate metabolism is discussed. [Pg.239]

To overcome the low throughput characteristic of Edman degradation, amino acid composition analysis was implemented in the protein identification scheme. This method is based on the chromatographic analysis of free amino acids obtained after acid hydrolysis [13, 14, 15]. Amino acid analysis can achieve high throughput protein identification, however, there is a decrease in the confidence of identification [16, 17, 18]. A combination of amino acid analysis and Edman degradation, limited to 3-5 cycles to obtain a short sequence tag, was used to increase the confidence in protein identification [19, 20, 21]. [Pg.94]


See other pages where Identification scheme is mentioned: [Pg.8]    [Pg.129]    [Pg.59]    [Pg.749]    [Pg.835]    [Pg.513]    [Pg.132]    [Pg.133]    [Pg.138]    [Pg.70]    [Pg.371]    [Pg.371]    [Pg.86]    [Pg.133]    [Pg.102]    [Pg.8]    [Pg.8]    [Pg.9]    [Pg.22]    [Pg.375]    [Pg.546]    [Pg.547]    [Pg.7]    [Pg.110]    [Pg.504]    [Pg.346]    [Pg.324]    [Pg.1407]    [Pg.646]    [Pg.208]   
See also in sourсe #XX -- [ Pg.8 ]

See also in sourсe #XX -- [ Pg.6 , Pg.6 , Pg.14 , Pg.15 ]




SEARCH



A Recursive Scheme for Gross Error Identification and Estimation

Hazard identification scheme

Identification Numbers and Check Digit Schemes

Scheme, for the identification

Target identification scheme

© 2024 chempedia.info