Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Other Attacks

Steels and austenitic stainless steels are susceptible to molten zinc, copper, lead and other metals. Molten mercury, zinc and lead attack aluminum and copper alloys. Mercury, zinc, silver and others attack nickel alloys. Other low-melting-point metals that can attack common constructional materials include tin, cadmium, lithium, indium, sodium and gallium. [Pg.895]

There exists other evidence for this mechanism. Other attacking species can be NOCl, H2N02, and at high acidities even NO" ". Nucleophiles (e.g., Cl , SCN , thiourea) catalyze the reaction by converting the HONO to a better electrophile (e.g., HNO2 + Cr + H+ NOCl + HzO). ... [Pg.817]

Damage is usually caused by a blockage of the water-conducting tissues of the stem, starving the leaves of water. Wilts can persist in the soil for several years, entering plants through wounds. Commonly associated with eelworm attack. Some wilts, e.g., of China asters and peas, are host-specific, while others attack a wide range of plants. [Pg.341]

The robot and robotics have been subject of countless publications. It is difficult, however, to obtain a clear picture of their acceptability some see the robot as an indispensible technological tool for the 21st century others attack it as a cause of unemployment. The development of robotics has been much less rapid than experts had expected early in the 1980s. What are the reasons for this slow-down prohibitive costs, technological difficulties or organizational obstacles ... [Pg.166]

Persistent concern about having other attacks... [Pg.408]

In an enzyme the metal atom (or other attacking group) can be put into a geometric or electronic state so as to enhance its acidity (e.g., zinc in carbonic anhydrase). The energization is connected to the fold of the protein and thus fold changes, small in character, can modulate the... [Pg.99]

The attack of the nucleophile that forms anionic adducts (or zwitterionic adducts, with neutral nucleophiles) parallels the other attacks of nucleophiles on derivatives bearing unsaturated (sp2) carbon atoms, such as alkenes or aromatic substrates, which are both activated by electron-withdrawing groups. The formation of a anionic (or zwitterionic) complexes between nitroaromatic derivatives and nucleophiles is a well-known step in nucleophilic aromatic substitution reactions155,210. [Pg.409]

On the basis of this mass of transient and semipermanent identifications, with various degrees of compartmentalization, each of us believes in something he calls his ego or self. He may assume that this elf is a property of his soul and will live forever. He may vigorously defend this self against slights or other attacks. But what is this ego, this "real" self ... [Pg.126]

Opiate narcotics are used to treat migraines only in extreme cases because of their addictive potential. They also appear to be less effective than some of the other attack-abortive migraine treatments, and they take longer to start working. [Pg.68]

A late transition state is expected for the first step of the reaction, since it leads to the formation of an unstable species. An experimental manifestation of this was observed by Hoz and Livneh in the acid-catalyzed addition of MeOH to 35. The reaction was found to be general acid-catalyzed with a Bronsted a value of 0.98. In the second step of the reaction, the cyclobutyl cation is trapped by a nucleophile which usually enters the molecule cis to the proton or to any other attacking electrophile. Since this phenomenon was observed with a variety of substituents at the bridgehead position as well as with a spectrum of electrophiles, a 1,3 steric hindrance to the approaching nucleophiles is not likely. An alternative explanation of this phenomenon is that the cyclobutyl cation is obtained in a bent structure with the equatorial side more exposed to nucleophilic attack. [Pg.1151]

Nematodes are soil-dwelling, microscopic worms. Some nematodes perform helpful tasks, such as breaking down organic matter others attack plant roots and cause diseaselike... [Pg.97]

One thing to keep in mind is to never threaten a mugger or any other attacker. Use on him whatever you have. In most cases he would run. But if your weapon seems puny or if he has a longer reach, you might not be able to do as much damage to him as if you take him unawares. [Pg.3]

In the version that involves two molecules of aluminium alkoxide, one attacks the carbonyl carbon, while the other attacks the carbonyl oxygen. Otherwise, this pathway is similar to the one illustrated previously. [Pg.336]

When two donors are meta to each other, attack at the position between them is extremely difficult because of steric hindrance. [Pg.142]

Chemical degradation refers to the breakdown of polymer molecules, either through short-term attack by contaminants, such as oxygen and iron, or through longer-term attack to the molecular backbone by processes such as hydrolysis. The latter is caused by the intrinsic instability of molecules even in the absence of oxygen or other attacking species. In other words, polymer chemical stability is mainly controlled by oxidation-reduction reactions and hydrolysis. [Pg.135]

Information exchange processes in a communication infrastructure can be modeled as transactions that have to fulfill the ACID properties. If a transaction does not properly proceed and finish, the ACID properties provide a direct categorization of the related anomaly. Based on this categorization, appropriate and effective countermeasures can be applied. A direct violation of the atomicity property, for example, corresponds to a denial-of-service attack, as the transaction is not completed and therefore the requested service is not provided. A buffer overflow represents a violation of consistency, and a race condition a violation of isolation. Other attacks can be classified accordingly. The corresponding anomalies can be detected by comparing protocol and process runs with the given specifications, which are represented by extended finite state machines. [Pg.421]

Indomethacin and colchicine have equivalent efficacy in the treatment of acute gout. Colchicine is now more likely to be used chronically to prevent other attacks. Indomethacin is more—-not less— likely to precipitate sudden gastrointestinal bleeding and acute renal failure. In the dose used to treat acute gout, colchicine frequently causes significant diarrhea. The answer is (B). [Pg.329]

Stage in a safe location upwind and uphill. Avoid fumes, smoke, mists, and liquids. Look for other attackers or hazards. [Pg.59]

Studies based on the use of an antivitamin, deoxypyri-doxine, have established that the daily requirement of the vitamin ranges between 1 and 2 mg in the human adult. A normal diet has been reported to provide 1-1.5 mg daily of the vitamin. Food appears to be the only source of the vitamin because most of the vitamin produced by the bacterial flora of the intestine is excreted in the feces, possibly after oxidation to 4-pyridoxic acid. The ingested vitamin is rapidly and completely absorbed, but the exact site of the absorption is not known. Although both pyridoxine and pyridoxamine can be excreted as such and are therefore normal constituents of human urine, part of the vitamin is oxidized to the 4-pyridoxic acid before excretion in the urine. Mammalian tissues contain at least two enzymes capable of oxidizing pyridoxine. Both enzymes seem to be flavoproteins. One attacks pyridoxine, the other attacks pyridoxine phosphate. The pyridoxine phosphate oxidase of liver has been purified 65 times. Although the enzyme was shown to act on pyridoxamine phosphate, pyridoxamine phosphate was oxidized only when the pH of the incubation mixture was raised to 10. Pyridoxine phosphate oxidase has no effect on pyridoxamine phosphate at physiological pH. [Pg.297]


See other pages where Other Attacks is mentioned: [Pg.79]    [Pg.450]    [Pg.33]    [Pg.120]    [Pg.538]    [Pg.34]    [Pg.89]    [Pg.196]    [Pg.182]    [Pg.1227]    [Pg.1227]    [Pg.3]    [Pg.236]    [Pg.264]    [Pg.84]    [Pg.1959]    [Pg.70]    [Pg.88]    [Pg.16]    [Pg.656]    [Pg.290]    [Pg.299]    [Pg.314]    [Pg.29]    [Pg.72]    [Pg.141]   


SEARCH



Attack by Organisms Other than SRB

Nucleophilic Attack Other Than at the Metal Atom

Nucleophilic Attack at Other Atoms

Nucleophilic Attack on Other Atoms

Other Electrophilic Attack at Nitrogen

Other forms of attack

Releases Other than Attack

© 2024 chempedia.info