Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Identity security

Assess each computer system to determine whether or not it can influence the strength, identity, security, purity, or quality of a drug product. The assessment should be conducted in accordance with a defined process and the outcome of each assessment recorded. [Pg.346]

Attenuator "A" attenuates the laser-beam power to the appropriate level which is allowed by the MCT detector (<0,5 mW). The optical signal scattered back from the target is collected by the same telescope that was transmittin the laser beam. This weak optical signal is introduced into the laser by the same mirrors and the same "S" beamsplitter, that were used in the transmission process. Inside the laser cavity this low intensity radiation is amplified in the same cavity mode in which the laser is operating. For this reason the mode of the received radiation is identical with local beam mode. This identity secures the best mixiflg efficiency for the heterodyne detection. This mode identity is the reason that we called our system self aligning The lens in front of the detector serves to fit the spot size of the local and amplified (received) beams to the detector size. [Pg.243]

The inclusion of forced migration as a security issue was also part of the conceptual debate in the late 1980s and early 1990s between Realist scholars and their critics on the fundamental question of what is security. For most of the Cold War period the broad consensus within Security Studies was that it should limit itself to the study of the threat, use, and control of military force (Walt 1991 212). In the post-Cold War era, economic, environmental, and identity security concerns were posited as of similar importance to the defence of state sovereignty and territorial integrity. Refugees and asylum seekers were proposed as potential threats to aU these new types of insecurity. [Pg.218]

It should be pointed out, that one of the existing negative points with bad economical and social consequences is the appearance of false and counterfeit securities, documents, notes as well as traveling cards, identity cards and etc. Each year the number of confiscated counterfeit notes is increased on 10%. [Pg.911]

A convenient form of apparatus, particularly for large classes, is shown in Fig. 84 it is identical with that used for the determination of the equivalent weight of metals by hydrogen evolution. A and H are glass tubes connected together by the rubber tubing J and securely fastened to the board B. The tube A is... [Pg.459]

Identifying inspection and test status is not just a matter of tying a label on a product. The status should be denoted by an authorized signature, stamp, mark, or other identity which is applied by the person making the accept/reject decision and which is secure... [Pg.428]

The relationship between 20 and reserpine (1) is close like reserpine, intermediate 20 possesses the linear chain of all five rings and all six stereocenters. With the exception of the 3,4,5-tri-methoxybenzoate grouping, 20 differs from reserpine (1) in one very important respect the orientation of the ring C methine hydrogen at C-3 in 20 with respect to the molecular plane is opposite to that found in reserpine. Intermediate 20 is a reserpate stereoisomer, epimeric at position 3, and its identity was secured by comparison of its infrared spectrum with that of a sample of (-)-methyl-O-acetyl-isoreserpate, a derivative of reserpine itself.9 Intermediate 20 is produced by the addition of hydride to the more accessible convex face of 19, and it rests comfortably in a conformation that allows all of the large groups attached to the D/E ring skeleton to be equatorially disposed. [Pg.61]

At 26, Frankland had attained a considerable degree of professional success and seemed outwardly secure. The need for total secrecy about his father s identity had left its mark, though. He was excruciatingly shy and was a poor speaker who later had to be dragged into accepting public office. Throughout his life, he sought social acceptance, financial security—and personal obscurity. [Pg.48]

The involvement in Project Monarch was not simply sexual. According to O Brien, the MPD would trigger a Dissociative Identity Disorder or DID. Mind control experts knew this could lead to an extraordinary high pain threshold, a heightened visual acuity and a compartmentalization of her memory which would allow for retention of detailed messages and data that she would not ordinarily comprehend. These memory compartments are what clinicians would refer to as personalities. This would allow O Brien and others like her to perform a variety of sexual and diplomatic tasks for the puppet masters in the CIA, DIA, NS A, or any of the other security agencies in the alphabet soup of government security acronyms. [Pg.11]

This scheme is introduced in [4, 8], and also used in [7]. It differs from the basic scheme in the preprocessing and hiding operations. A secure hash function is applied to the signature before embedding, in order to reduce its size. The locations of the embedded CLBs are also fingerprinted with the identity of the user in order to trace back the origin of mis-appropriation. Additional hiding operations are also put in. [Pg.9]

Axisonitrile-1 (1) and axisothiocyanate-1 (2) were the first pair of NC/NCS compounds isolated from Axinella cannabina, see Introduction [1]. That both compounds possessed a new skeleton was evident, when 1 was reduced (Li/EtNH2) to axane (6). Other transformations involving the exocyclic methylene which survived selective reduction (Na/NH3) of 1, coupled with evaluation of the lHNMR data, supported its gross structure. Confirmation of 2 was secured when 1 was heated with sulfur and the resultant purified product found to be identical to the natural product. [Pg.50]

Evidence for a free radical pathway in the foregoing cycloalkyl bromide reactions was secured by San Filippo and coworkers, who found that cis and iraws-4-r-butylcydohexyl bromide afford nearly identical product mixtures with MesSnLi, MesSnNa and MesSnK under a given set of conditions (Table 7)45. Of the various combinations examined, that of di-bromide and Me3SnLi appeared to be most favorable to S/v2 displacement. [Pg.220]

Detection A countermeasures strategy that is intended to identify an adversary attempting to commit a security event or other criminal activity in order to provide real-time observation as well as postincident analysis of the activities and identity of the adversary. [Pg.105]

GC cannot be used to directly identify the molecular species present. It is, however, possible to infer their identity by comparison with known standards. One method involves running the standard alone and comparing the retention time with that of the unknown compound. The same retention time is likely to be caused by the same compound. A more secure method is to analyze the unknown sample, and then to add a known amount of the standard. If the standard corresponds to one of the components of the mixture, a subsequent analysis will then show a corresponding increase in peak area. [Pg.145]

In support of this mechanism, it was shown that allyl alcohol on treatment with Fe(CO)j is isomerized to propionaldehyde. The identical isomerization of allyl alcohol has been demonstrated (23) to proceed by HCo(CO)4 catalysis and evidence secured for a similar 1,3 or allylic hydrogen shift [Eq. (11)]. [Pg.31]

The operator s first point of contact is the customer. After providing proof of identity, essential questions must be asked such as what are the arrangements with stewards, security and emergency services Are the police and near neighbours aware of the display Where is the nearest telephone and emergency exit Are there any first-aid or other facilities ... [Pg.147]

The nomenclature of a science ought to be distinguished for its clearness and simplimty but it is by no means easy to seoure these conditions in a science like chemistry, where the rapid progress of discovery necessitates the continual addition of new and the frequent alteration of old namea The chemical name of a substance should not only identity and indi-vidualise that substance, but it should also express the composition and constitution of the body, if a compound, to which it is applied. The first of these conditions is readily attained but the second is much more difficult to secure, inasmuch as our ideas of the constitution of chemical compounds—the mode in which they are built up as it were— require firequent modification. On this account all attempts to frame a perfectly consistent system of chemical nomenclature have hitherto been only partially successful. [Pg.15]

Callahan, William 2006. History, Identity, and Security Producing and Consuming Nationalism in China Critical Asian Studies 38 2, 179-208. [Pg.223]

The requirements for hardware validation are identical to those of any other equipment in use, comprising the OQ/IQ/PQ cycle, except that in the PQ, it is the test of software used. The software validation comprises functional testing, in which defined inputs produce outputs that meet expectations or specifications a thorough examination of source codes, database designs, programming standards, control methods, and support documentation or a quality-assurance program that includes alternate plans, contingency practices, record retrieval, and security practices... [Pg.46]

Past experience has shown that for a divinatory plant to enlist the attention of the outside world two steps are usually necessary. First, it should be correctly and securely identified. Second, its chemistry should be convincingly worked out. Richard Evans Schultes settled the identity of ololiuhqui in the definitive paper published in 1941. OH It is the seed of a species of Convolvulaccne Rivea corymbosa (L.) Hall. hi. [Pg.290]


See other pages where Identity security is mentioned: [Pg.312]    [Pg.476]    [Pg.221]    [Pg.223]    [Pg.312]    [Pg.476]    [Pg.221]    [Pg.223]    [Pg.88]    [Pg.743]    [Pg.180]    [Pg.143]    [Pg.480]    [Pg.1073]    [Pg.462]    [Pg.7]    [Pg.114]    [Pg.204]    [Pg.12]    [Pg.136]    [Pg.290]    [Pg.108]    [Pg.415]    [Pg.116]    [Pg.155]    [Pg.231]    [Pg.308]    [Pg.350]    [Pg.168]    [Pg.215]    [Pg.170]    [Pg.359]    [Pg.378]   
See also in sourсe #XX -- [ Pg.268 , Pg.275 ]




SEARCH



© 2024 chempedia.info