Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Scale heuristic approaches

In dealing with the SGS terms, Revstedt et al. (1998, 2000) and Revstedt and Fuchs (2002) did not use any model rather, they assumed these terms were just as small as the truncation errors in the numerical computations. This heuristic approach lacks physics and does not deserve copying. A most welcome aspect of LES is that the SGS stresses may be conceived as being isotropic, i.e., insensitive to effects of the larger scales, to the way the turbulence is induced and to the complex and varying boundary conditions of the flow domain. Exactly this... [Pg.161]

This chapter considers the specific physicochemical considerations of various chromatographic modes and provides strategic considerations in HPLC separations as well as heuristic approaches and productivity considerations in scale-up operations. [Pg.5]

IX. SCALING-UP POSSIBILITIES HEURISTIC APPROACHES AND PRODUCTIVITY CONSIDERATIONS... [Pg.72]

IX. Scaling-Up Possibilities Heuristic Approaches and Productivity Considerations 172... [Pg.729]

The time approach relies entirely on independent diffusion-reaction time without reference to distances. The reaction product inherits the time sequence of one of the parents chosen at random however, its residual time to react with another species is scaled inversely relative to its mutual diffusion confident. A heuristic correction is also made for the change of reaction radius (Clifford et al, 1986). [Pg.223]

Remark 1 Note that the borderlines between the three main approaches are not necessarily distinct. For instance, the targets in (ii) can be viewed as heuristics or rales that simplify the combinatorial problem and allow for its decomposition into smaller, more tractable problems (see chapter on heat exchanger network synthesis via decomposition approaches). The optimization approach (iii) can formulate thermodynamic targets, or targets on the attainable region of reaction mechanisms as optimization models, and can either utilize them so as to decompose the large-scale problem or follow a simultaneous approach that treats the full-scale mathematical model. The first... [Pg.232]

However, by examining the adsorption behavior of polypeptides and proteins with comparable porous and nonporous particles in finite baths, packed columns and expanded or fluidized beds, an iterative simulation approach based on the heuristic principles described earlier and along the lines of the flow diagram shown in Fig. 32 can be developed, leading ultimately to the implementation of useful scale-up criteria. Along the way, computer simulations, generated from the analysis of the concentration-time... [Pg.188]

In this chapter we provide a heuristic introduction to scaling procedures that characterize properties of systems close to their critical point. The objective is to provide some general insights and to convey the flavor of the methodology. Much of the treatment of critical phenomena falls into the province of statistical mechanics, well outside the confines of classical thermodynamics. However, certain illuminating aspects that can be discussed without having to resort to statistical approaches will be taken up below. We center the discussion on critical exponents and the Landau theory of critical phenomena. For a proper exposition of the subject the reader is referred to several sources in the literature. ... [Pg.397]

ABSTRACT On the strength of experience with risk analysis methodology in IT-operating enterprises, an approach has to be able to deal with limited resources. This prompts an analyst to perform a heuristic and biased approach, which is typically a questiomiaire structured by a IT security standard. The difficulty is to draw up a limited set of concise IT security related questions, which result in meaningful outcomes for IT risk analysis purposes. In the proposed approach, the Code of Practice ISO/IEC 27002 is used to structure the analysis and to restrict the number of questions. The Code s recommendations are rephrased and a Guttman scale is introduced for an IT security FMEA-like risk analysis approach. For frequency assessments it is assumed that an implemented high-level security measurement resiilts in low frequencies of imdesired events. The paper pictures the adapted IT-FMEA approach and presents the results of a feasibihty study at Switzerland s leading telecom provider. [Pg.1876]


See other pages where Scale heuristic approaches is mentioned: [Pg.137]    [Pg.232]    [Pg.174]    [Pg.175]    [Pg.217]    [Pg.59]    [Pg.99]    [Pg.720]    [Pg.40]    [Pg.231]    [Pg.1369]    [Pg.80]    [Pg.227]    [Pg.152]    [Pg.63]    [Pg.325]    [Pg.13]    [Pg.152]    [Pg.38]    [Pg.173]    [Pg.206]    [Pg.207]    [Pg.360]    [Pg.154]    [Pg.13]    [Pg.260]    [Pg.182]    [Pg.136]    [Pg.212]    [Pg.149]    [Pg.115]    [Pg.418]    [Pg.4]    [Pg.14]    [Pg.1876]    [Pg.733]    [Pg.322]    [Pg.83]    [Pg.101]    [Pg.65]   
See also in sourсe #XX -- [ Pg.172 ]




SEARCH



Heuristics

© 2024 chempedia.info