Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Signature analysis

Progress in mean of modelisation and inverse problem solving [1] let us hope to dispose soon of these tools for flaws 3D imaging in Non Destructive Control with eddy current sensors. This will achieve a real improvement of the actual methods, mainly based upon signature analysis. But the actual eddy current probes used for steam generators tubes inspection in nuclear industry do not produce the adequate measurements and/or are not modelisable. [Pg.357]

Vibration theory and vibration profile, or signature, analysis are complex subjects that are the topic of many textbooks. The purpose of this section is to provide enough... [Pg.665]

Predictive maintenance utilizing vibration signature analysis is based on the following facts, which form the basis for the methods used to identify and quantify the root causes of failure ... [Pg.668]

Techniques used in vibration analysis are trending, both broadband and narrowband comparative analysis and signature analysis. [Pg.692]

Unlike the two trending techniques, signature analysis provides visual representation of each frequency component generated by a machine-train. With training, plant staff can use vibration signatures to determine the specific maintenance required by plant machinery. [Pg.798]

Most vibration-based predictive maintenance programs use some form of signature analysis in their program. However, the majority of these programs rely on comparative analysis rather than full root-cause techniques. This... [Pg.798]

All vibration monitoring systems have finite limits on the resolution, or ability to graphically display the unique frequency components that make up a machine s vibration signature. The upper limit (Fmax) for signature analysis... [Pg.811]

Figure 11. Wire model of human body used for walk Doppler signature analysis. Figure 11. Wire model of human body used for walk Doppler signature analysis.
Intrusion detection systems (IDS) are used as a computer network security tool and permit to alert an administrator in case of attack. The main goal of IDS is to detect and recognize network attacks in real time. Nowadays there exist different approaches for intrusion detection. It is signature analysis, rule-based method, embedded sensors, neural networks, artificial immune systems [1]—[6] and so on. The most of these IDS can detect the known attacks and have poor ability to detect new attacks. [Pg.367]

Sanches, M.L., C.R. Russell, and C.L. Randolf. 1993. Chemical Weapons Convention (CWC) Signature Analysis. DNA-TR-92-73, AD B171788, Defense Technical Information Center. [Pg.178]

Nevertheless, this last mentioned relationship is clearly well established A specific relationship between the extreme halophiles and the Methanomicrobiales can be demonstrated by a variety of analyses of 16S rRNA sequences - any number of variations on evolutionary distance analysis, parsimony analysis, signature analysis [48,62] and maximum likelihood analysis (G.J. Olsen, personal communication). More importantly, the relationship is also readily given by analysis of 23 S rRNA sequences [62],... [Pg.605]

Rutzky CP, Kaye CJ, Siciliano, MJ, Chao M Kahan BD (1980) Longitudinal karyotype and genetic signature analysis of cultured human colon adenocarcinoma cell Unes LS180 and LS174T. Cancer Research 40 1443-1448. [Pg.300]

Sanches M L, Russell C R, Randolph C L (1993). Chemical Weapons Convention (CWC) Signatures Analysis Technical Analysis. Defense Nuclear Agency, Alexandria, VA, pp. B171-788. [Pg.1645]

Smydi, A. W., Masri, S. F., Caughey, T. K. and Hunter, N. F. Surveillance of intricate mechanical systems on the basis of vibration signature analysis. Journal of Applied Mechanics (ASME) 67(3) (2000), 540-551. [Pg.288]

Vandiver, J. K., Dunwoody, A. B., Campbell, R. B. and Cook, M. F. A mathematical basis for the random decrement vibration signature analysis technique. Journal cf Mechanical Design 104(2) (1982), 307-313. [Pg.289]

Sanches ML, Russell CR, Randolf CL (1993) Chemical weapons convention (CWC) signature analysis. DNA-TR-92-73 (DTIC AD B171788). Defense Technical Information Center, Alexandria, VA. [Pg.176]

A variety of advanced techniques exists for determining the species composition of the fuel, which is vital to improved predictive methods for coal, and especially ash behavior, in boilers. X-ray diffraction, performed on low-temperature ash, is the most widely used technique for qirahtatively identifying the presence of minerals in their crystalline form in concentrations of a few weight percent or greater. Thermal analytical techniques such as differential thermal analysis (DTA) and thermogravi-metric analysis (TGA) have been used as a signature analysis based on changes in physical properties with temperature. [Pg.113]

Gearhart, C. 1999. Applications of wavelet based signature analysis in designing for crashworthiness. In Proceed-ing of the 1999 ASME Design Engineering Technical Conferences, LAs Vegas, Nevada, USA. [Pg.823]

Ropero-Miller, J.D., Stout, P.R., and Bynum, N.D. 2007. Comparison of the novel direct analysis in real time time-of-flight mass spectrometer (AccuTOF-DARTTM) and signature analysis for the identification of constituents of refined illicit cocaine. Microgram J., 5 34-40. [Pg.301]

Electronic Systems by applying the concept of signature analysis (in the present volume). 1986. [Pg.198]

IMPROVING THE SAFETY LEVEL OF PROGRAMMABLE ELECTRONIC SYSTEMS (PES) BY APPLYING THE CONCEPT OF SIGNATURE ANALYSIS... [Pg.199]

The concept of signature analysis Is used here on-line differently from the conventional on-malntenance use Its use should make It possible to achieve a very high capacity of fault detection The advantage of a cheok during operation of the system is to be able to monitor in real time the validity of task sequencing carried out by the application software, in order to obtain systems with a high level of positive safety (fall safety) ... [Pg.199]

The aim of the investigations presented here is to propose an adaptation of the signature analysis concept to systems safety, which is original, cost saving and as universal as possible but for which the improvement of the safety level obtained could be globally assessed. The method proposed must be considered as an on-line tool working in realtime, based upon signature analysis. [Pg.200]


See other pages where Signature analysis is mentioned: [Pg.303]    [Pg.355]    [Pg.662]    [Pg.668]    [Pg.687]    [Pg.693]    [Pg.798]    [Pg.798]    [Pg.811]    [Pg.813]    [Pg.605]    [Pg.488]    [Pg.654]    [Pg.1555]    [Pg.226]    [Pg.737]    [Pg.2251]    [Pg.2252]    [Pg.194]    [Pg.200]   
See also in sourсe #XX -- [ Pg.303 ]




SEARCH



Signature

© 2024 chempedia.info