Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Lock-state

The same equation can be derived within a simple Kramers picture [55,80,86] for the escape from a well (locked state), assuming that the pulling force produces a small constant potential bias that reduces a height of a potential barrier. The progressive increase of the force results in a corresponding increase of the escape rate that leads to a creep motion of the atom. However, this behavior is different from what occurs when the atom (or an AFM tip) is driven across the surface and the potential bias is continuously ramped up as the support is moved [87,88]. The consequences of this effect will be discussed in more detail in Section III.B. 2. [Pg.214]

Fig. 5. A Schematic representation of a locking molecular memory. B A locking molecular memory based on photochemical switching and electrochemical locking. C Cyclic voltammograms of the electrochemically inactive open -state 8 and the electrochemically active closed -state 9, which can be reversibly oxidized to the quinoid locked -state 10. Recorded in THF with Bu4NC104 (0.1 M) and a potential scan rate of 100 mV s-1. D Absorbance spectra of the three states of the lockable molecular memory system. C and D are adapted from [25] with permission... Fig. 5. A Schematic representation of a locking molecular memory. B A locking molecular memory based on photochemical switching and electrochemical locking. C Cyclic voltammograms of the electrochemically inactive open -state 8 and the electrochemically active closed -state 9, which can be reversibly oxidized to the quinoid locked -state 10. Recorded in THF with Bu4NC104 (0.1 M) and a potential scan rate of 100 mV s-1. D Absorbance spectra of the three states of the lockable molecular memory system. C and D are adapted from [25] with permission...
The secure electronic data vault allows patients to keep their PHR (personal health record) and other personal documents in a locked state, whereby the... [Pg.345]

The basic idea is to apply the principles of the bank s safety deposit box to an IT solution for safeguarding electronic patient records. For the provision of services for sealed/locked records, the asymmetric cryptography technology, also known as public key cryptography, can be exploited as the base technology for implementation of a system managing the sensitive information in a sealed or locked state, for protection of privacy and for prevention of identity theft in the electronic information age. [Pg.346]

Self-pulsations, i.e. periodic oscillations of the field intensity, appear as a result of a Hopf bifurcation of the stationary locked states. In terms of... [Pg.195]

Although the system has an infinite sequence j = 1,2,3,... of such roots, only n of them represent physically different phase-locked states. [Pg.218]

For the sine circle map, there is a tendency for the winding number (W) to lock in to a rational value P/Q over a range of SI values when K is in the range 0 < K s 1. The density of these mode-locked states in a graph of W versus SI is low for low values of K and increases as K approaches 1. At the value K = 1 (the critical point) the mode-locked states fill up the entire fl axis. The graph of... [Pg.249]

Figure 32 Phase plane portrait showing Arnol d tongues, which come to a point on the A = 0 axis and widen out as K increases. Within the wedge-shaped regions, mode-locked states exist. Above = 1, these wedges overlap, leading to the possibility of chaos in this system. (Adapted from a similar figure in Ref. 75.)... Figure 32 Phase plane portrait showing Arnol d tongues, which come to a point on the A = 0 axis and widen out as K increases. Within the wedge-shaped regions, mode-locked states exist. Above = 1, these wedges overlap, leading to the possibility of chaos in this system. (Adapted from a similar figure in Ref. 75.)...
Unlocking. At the locking state, press UNLOCK button of the remote controller once, at this time, the direction indicator... [Pg.351]

At the core of a DES lies the concept of discrete event and the assumption that the state-space of the system, denoted by /, is a discrete set. For practical reasons, we can furthermore assume that x is composed of a finite number of states. In particular, any DES can move from a state x to a new state x . We say that this motion defines a state transition. In the DES context, the term event conceptualizes the occurrence of an action e that initiates the state transition from X to x . We say that the event e labels the transition from X to x and we write x x For example, the opening of a valve indicates the system s transition from state the valve is closed Xo the state the valve is open that is associated with the initiation of the command open valve (event) as shown in Figure 1. A state that is not associated with the initiation of any event is called a dead-lock state. [Pg.1999]

Remark The concept of dead-lock state has some serious imphcations for the safe operation of a system. If, for example, a system assumes a dead-lock state that corresponds to a hazardous state of the system, there is no control action that can bring the system back to its nominal operation. [Pg.1999]

Hash-based Approaches for Access Control A hash-based access control protocol is discussed in Weis (2003). Here the tag is first in a locked state. When the tag moves to the unlocked state, the reader can access the tag s details. In order to change the state, the tag first transmits a meta ID, which is the hash value of a key. An authorized reader looks up the corresponding key in a backend system and sends it to the tag. The tag verifies the key by hashing it to return the clear text ID and remains only for a short time in an unlocked state which provides time for reader authentication and offers a modest level of access security (Knospe Pohl, 2004 Wong Phan, 2006). [Pg.135]

Notably, the shear strength S = trtan -l-C at right side of the formula above is decided by the normal stress a and two coefficients C and (p. The slippage take places only if t=S, but it doesn t in other cases. rfrom structure control to stress control. [Pg.545]

Figure 42 Molecular structure of internally double-locked state and schematic representation of the self-locking operation in response to the photoisomerization of l,2-di-(4-p3ridyl)ethylene. (Reproduced from Ref. 79. American Chemical Society, 2006.)... Figure 42 Molecular structure of internally double-locked state and schematic representation of the self-locking operation in response to the photoisomerization of l,2-di-(4-p3ridyl)ethylene. (Reproduced from Ref. 79. American Chemical Society, 2006.)...

See other pages where Lock-state is mentioned: [Pg.243]    [Pg.167]    [Pg.169]    [Pg.70]    [Pg.83]    [Pg.325]    [Pg.98]    [Pg.84]    [Pg.126]    [Pg.216]    [Pg.216]    [Pg.216]    [Pg.216]    [Pg.96]    [Pg.244]    [Pg.25]    [Pg.193]    [Pg.218]    [Pg.804]    [Pg.156]    [Pg.245]    [Pg.247]    [Pg.247]    [Pg.251]    [Pg.251]    [Pg.437]    [Pg.1164]    [Pg.708]    [Pg.106]    [Pg.2009]    [Pg.2009]    [Pg.2010]    [Pg.50]    [Pg.50]   
See also in sourсe #XX -- [ Pg.97 ]




SEARCH



© 2024 chempedia.info