Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Indirect access

Levy (Chapter 6) has also explored the use of supercomputers to study detailed properties of biological macromolecule that are only Indirectly accessible to experiment, with particular emphasis on solvent effects and on the Interplay between computer simulations and experimental techniques such as NMR, X-ray structures, and vltratlonal spectra. The chapter by Jorgensen (Chapter 12) summarizes recent work on the kinetics of simple reactions In solutions. This kind of calculation provides examples of how simulations can address questions that are hard to address experimentally. For example Jorgensen s simulations predicted the existence of an Intermediate for the reaction of chloride Ion with methyl chloride In DMF which had not been anticipated experimentally, and they Indicate that the weaker solvation of the transition state as compared to reactants for this reaction In aqueous solution Is not due to a decrease In the number of hydrogen bonds, but rather due to a weakening of the hydrogen bonds. [Pg.8]

Interestingly, it appeared possible to enter the 12a-12b vinylidenecarbene-cycloalkyne equilibrium from the cycloalkyne side. This was accomplished by synthesizing the appropriate cage vinyl bromide, 17 then subsequent reaction of 17 with a base provided indirect access to 12b (Scheme 5) [18]. [Pg.39]

In on-line HPLC-NMR coupling, the commonly recorded nuclei are and 19F, because their natural abundances are 99.9 and 100%, respectively. Thus, a direct monitoring of chromatographic separations is possible, as outlined earlier in Chapter 1. Indirect access to the information content of 13C NMR spectra is obtained in the stop-flow mode, where inverse detected 1H, 13C correlation spectra can be recorded. The acquisition of these type of 2D-spectra relies on the fact that a direct proton carbon connectivity via scalar coupling is present. Quartenary carbons without any directly attached protons are not detected. Thus, it is of major interest to record 13C NMR spectra which reveal all possible information within a coupled LC experiment. [Pg.249]

Whatever the selected method (static, monotonous, or dynamic), it gives access to a limited range of timescales. For example it is almost impossible to perform static experiments in times less than 1 s, or dynamic tests at frequencies lower than 10 1 Hz, or tensile tests at strain rates higher than 103 s-1. These timescales are, however, indirectly accessible because the polymers generally obey a time-temperature superposition principle ... [Pg.349]

The above discussion demonstrates the multifaceted nature of spillover. The interphase transport of an activated species onto a surface (and sometimes into the bulk) where it is unable to be formed without the activator can induce a variety of changes on, and reactions with, the surface. All the reactions of atomic hydrogen are found to be induced by spillover exchange, bronze formation, reduction, demethoxylation, and catalytic activation. An activated species is able to gain indirect access to the nonsorbing surface. [Pg.66]

Pharmacists participate in the healthcare system and in its final product. Sometimes they directly access the patient, and other times, they indirectly access the patient through other health professionals (doctors, nurses), providing them with what belongs to us—our knowledge of drugs. Drugs are widely used as resources in all healthcare systems. Our objective would be to achieve a safer and effective medication-use process. [Pg.827]

In the second model, there are explicit entities representing honest users. As shown in Figure 5.16, they have special ports where they communicate with the attacker, i.e., where the attacker can influence them. This is called the model with indirect access. [Pg.113]

Figure 5.16. Model of an active attack, version with indirect access. Figure 5.16. Model of an active attack, version with indirect access.
Privacy requirements. For privacy requirements, which deal with the knowledge of attackers, the model with indirect access must be used. [Pg.115]

Formally, one can see that the equivalence proof cannot be used with privacy requirements If one combines an attacker strategy A2 nd the strategies of the honest users from the model with indirect access into an attacker strategy Aj in the model with direct access, the attacker gains knowledge that only the honest users had in the model with indirect access. [Pg.115]

Restricted attacks. In the model with indirect access, one can model restricted attacks if one needs them. For instance, passive attacks are modeled by honest users that do not react on anything from the outside world, but choose their inputs, e.g., the messages they authenticate, according to some predefined probability distribution. This is unrealistic in most situations. A better example might be that honest users choose some initialization parameters carefully and without influence from outside, but may be influenced later. [Pg.115]

In the current application, the connection-control access point is treated like an access point of an honest user, because it is mentioned in the requirements and the entity that belongs to it, i.e., the switch, is assumed to be correct. Hence the attacker has direct or indirect access to it, precisely as to the access points of the honest users. [Pg.116]

The forces between atoms are, of course, only indirectly accessible to experimental study. What is most commonly measured is the energy change accompanying a transformation, but this quantity introduces the force as a complicated int ral, the constitution of which is seldom clear. The nearest approach to an immediate manifestation is perhaps in the vibration frequency of a diatomic molecule. [Pg.257]

An indirect access to the concentrations of methyl and hydrogen atoms was used by Harris and Weiner [56]. The authors used a quartz probe 3-5 mm from the hot (2600 K) tungsten filament and determined the concentrations of ethylene and ethane formed by self-scavenging reactions (10, 11) of methyl, forming the main loss channels of CH3 at relatively low pressure within the probe (<10mbar) ... [Pg.408]

As shown above, H spin-diffusion may be detected via observation has also been used to follow H spin-diffusion in fluoropolymers [71]. An interesting case of homonuclear spin-diffusion between nuclei has been reported for domain size determination in phosphazene polymers [72]. In general, most researchers still use traditional HTip and T measurements to indirectly access the limits of spin-diffusion in an approximate fashion, as reported in many recent applications of these methods to a variety of semicrystalline polymers, blends, and composites [73-78]. [Pg.380]

The Covenant of the League of Nations provided an indirect access for minorities. Issues that threaten peace, security and friendly relations could be brought to the main bodies of the League. The same is possible under the UN Charter. The General Assembly may discuss any matters under the scope of the Charter and even make recommendations to member states or the Security Council. Minority issues can find their way to the United Nations via these articles 10 and 11. [Pg.145]

Scheme 1.16. Warren s method for indirect access to E-alkenes. Scheme 1.16. Warren s method for indirect access to E-alkenes.
In practice, extensions are rarely that simple. In particular, it is a frequent requirement to extend the fields of a record. For Ada, diis is a major problem, since the language is designed for high performance ececution which implies that indirect access to data (to allow for any additional fields) should not be required. [Pg.198]


See other pages where Indirect access is mentioned: [Pg.55]    [Pg.83]    [Pg.253]    [Pg.223]    [Pg.239]    [Pg.59]    [Pg.88]    [Pg.1170]    [Pg.25]    [Pg.98]    [Pg.100]    [Pg.131]    [Pg.4230]    [Pg.577]    [Pg.114]    [Pg.134]    [Pg.177]    [Pg.31]    [Pg.330]    [Pg.459]    [Pg.790]    [Pg.469]    [Pg.464]    [Pg.1170]    [Pg.117]    [Pg.187]    [Pg.189]    [Pg.35]    [Pg.456]   
See also in sourсe #XX -- [ Pg.113 ]




SEARCH



© 2024 chempedia.info