Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Security windows

Daily usage of the system, including authorizations and security, Windows menu control, error reporting, and communication with other devices (e.g., peripherals) Characterization and handling of materials, including the definition of raw materials, products, and auxiliary material (e.g., packaging)... [Pg.663]

Deliberate fire set in premises overnight Criminal action by person/s unknown Inadequate security arrangements Lack of effective perimeter security/window locks Lack of adequate fire risk assessment... [Pg.301]

Adequacy of workplace security systems, such as door locks, security windows, physical barriers, and restraint systems... [Pg.483]

Windows in airplanes, trains, and schools commonly use polycarbonate. Exotic appHcations include military use, for example in high speed aircraft canopies, where tests have shown polycarbonate to withstand impact with fowl at Mach 2. Polycarbonate is also used for security appHcations as laminates with glass or other materials. Polycarbonate offers unsurpassed projectile-stopping capabiHty, as the material softens upon impact with a bullet, absorbing the projectile s energy. [Pg.285]

Prevention of arson Control access at all times Screen employees and casual labour Lock away flammable substances and keep combustibles away from doors, windows, fences Provide regular fire safety patrols, even where automatic systems are provided Secure particularly storage and unmanned areas... [Pg.196]

These high velocities occur at the bundle entrance and exit areas, in the baffle windows, through pass lanes and in the vicinity of tie rods, which secure the baffles in their proper position. In conjunction with this, the shell side fluid generally will take the path of least resistance and will travel at a greater velocity in the free areas or by-pass lanes, than it will through the bundle proper, where the tubes are on a closely spaced pitch. All factors considered, it appears a formidable task to accurately predict heat transfer characteristics of a shell and tube exchanger. [Pg.28]

The security system can be considered as layers of protection. Physical barriers and deterrents constitute not only the building stmcture itself, made up of walls, doors, windows, floor and a roof, but the yard around the building and probably a perimeter fence or wall. [Pg.48]

Tube and wire frames are used to protect windows, skylights and similar glass areas and constitute a high level of security but may be aesthetically unacceptable. [Pg.48]

Accessible windows are a high security risk. Wherever practicable, storage areas in particular should have no windows. For a variety of reasons, this is not always feasible, and in these cases the following features should be considered ... [Pg.168]

In many cases, it is necessary to complement physical security by the installation of an intruder alarm system in order to achieve the standard of security commensurate to the risk exposure. The scope of protection to be afforded by the alarm system depends on the security risk, but it may embrace fences, windows, doors, roofs, walls, internal areas, yards and external open areas, and vehicles inside and outside buildings. There is a comprehensive range of detection devices, but the choice of detector is critical to ensure that it provides the desired level of protection and is stable in the particular environment. [Pg.168]

Commercial LIMS appeared on the market in the early 1980s. These operated on then state-of-the-art minicomputers such as the 16-bit Hewlett-Packard 1000 and 32-bit Digital VAX system. By the late 1980s, several DOS-based PC LIMS operating on the primitive PC network were available. By the early 1990s, most LIMS started using commercial relational database technology and client/server systems, which operated on UNIX or the new Windows NT platform. The most advanced LIMS utilize server-based architecture to ensure system security and control. [Pg.58]

Administration Building. To reduce the risk from the potential blast that could occur from either gas compression/reaction or feed purification/vaporization, safety film was installed over the windows, a catch system was provided to capture flying window fragments, and overhead fixtures were secured. This reduced the risk ranking for the administration building to IV. [Pg.45]

Unfortunately, most of these applications are designed for their specific tasks only. There is currently no software architecture that integrates them into a network that would enable intelligent interaction between them. This is where the future lies. For example, a sensor could recognize the opening of a window and make the heating control of a radiator shut down. The same information about the window could also be built into a security system that would then check what caused the window to open. An alarm would be set off if the person who opened it is not recognized. [Pg.230]

The ambitious goal of eBuilding is to maximize the comfort of the house owner at a minimum cost level. This will be achieved by using sensors in all sensitive areas, for instance, constant control of the air-conditioning or to cut off cost intensive peaks. Also sensors in smoke-detectors, windows, doors and other appliances will take care of the house security. [Pg.237]

The most common application of MMW systems to security needs is the MMW radiometric imager. Systems of this type are very useful because of their ability to detect a variety of concealed weapons hidden by clothing. Millivision Technologies of South Deerfield, MA has been a leader in this field by developing a family of imagers that operate in the 94 GHz atmospheric window and that use a superheterodyne receiver... [Pg.256]

Chapter 5 of the ASCE Physical Security report addresses the various types of glazing materials and staictural components of window frames and should be referred to for a detailed discussion of the topic. [Pg.66]


See other pages where Security windows is mentioned: [Pg.137]    [Pg.137]    [Pg.377]    [Pg.443]    [Pg.334]    [Pg.335]    [Pg.1233]    [Pg.291]    [Pg.45]    [Pg.129]    [Pg.83]    [Pg.238]    [Pg.159]    [Pg.255]    [Pg.263]    [Pg.21]    [Pg.169]    [Pg.209]    [Pg.130]    [Pg.418]    [Pg.106]    [Pg.117]    [Pg.157]    [Pg.169]    [Pg.190]    [Pg.205]    [Pg.231]    [Pg.591]    [Pg.200]    [Pg.180]    [Pg.505]   
See also in sourсe #XX -- [ Pg.192 ]




SEARCH



© 2024 chempedia.info