Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Site vulnerability

It is helpful in the discussion to describe silicate structures using the Q nomenclature, where Q represents [SiOJ tetrahedra and the superscript n the number of Q units in the second coordination sphere. Thus, isolated [SiO ] " are represented as Q and those fully connected to other Q units as Q. In general, minerals based on Q , Q and units are decomposed by acids. Such minerals are those containing isolated silicate ions, the orthosilicates, SiO (Q ) the pyrosilicates, Si O " (Q ) ring and chain silicates, (SiOg) (Q ). Certain sheet and three-dimensional silicates can also yield gels with acids if they contain sites vulnerable to acid attack. This occurs with aluminosilicates provided the Al/Si ratio is at least 2 3 when attack occurs at A1 sites, with scission of the network (Murata, 1943). [Pg.114]

At the point this was written in 2004, there are no national security regulations (Box 3.2), although a change in Administrations could alter this picture. Nevertheless, members of the American Chemistry Council and the Synthetic Organic Chemicals Manufacturing Association have completed site vulnerability assessments, and are implementing security improvements at their plants. This year, the industry has worked to synchronize efforts in facility and IT security, and to take... [Pg.69]

Currently, however, only a fraction of the chemical processing and storage facilities in the United States are members of the trade groups spearheading these efforts. At this point, it s safe to say that most chemical plants haven t even done site vulnerability assessments. They re behind the curve, says Richard Sem, a 34-year security veteran and former senior Pinkerton executive who now mns his own consulting firm in Plainfield, IL. Atlanta-based consultant Sal De Pasquale, who helped develop one of the most widely used site vulnerability assessment methods, puts it bluntly At most chemical plants handling hazardous materials today, existing security simply could not stand up to a guy with a six shooter and a bomb. ... [Pg.70]

Neville was in a situation that many companies may find themselves in today. It had completed a site vulnerability assessment that found weaknesses in perimeter security, with unlocked gates in need of repair along the rail line that runs through the plant site. [Pg.70]

The best part about the site vulnerability analyses developed for chemical plants, Sem says, is that, while addressing terror risks, they also force companies to look at issues that are far more likely to occur workplace violence and theft of trade secrets. Companies shouldn t get so hung up on terror that they ignore internal risks. Given the wide range of threats today, it would be impossible for companies to prevent all possible scenarios. You can t put a dome over a chemical plant, but you can take reasonable steps to keep it safe, Sem says. [Pg.75]

Enaminones are compounds containing the system N—C=C—C=0. They are mono enamines of 1,3-diketones (vinylogous amides) or enamines of 3-keto esters (vinylogous urethanes). Their unique properties and the versatility of their applications in organic synthesis follow from the system Na Cb=Cc—Cd=Oe, which is tridentate (sites a, c, and e) toward electrophiles and bidentate (sites b and d) toward nucleophiles. This makes possible a wide variety of reactions, but with such a multiplicity of sites vulnerable to attack, reactions are sometimes unpredictable and can be unexpectedly complex. [Pg.209]

Chemical facility security is rarely treated separately from general security concerns. At both national and institutional levels, there are no plans for security of chemical facilities and storage sites. Vulnerability assessments are rare, and hidden dangers are poorly understood. In the absence of a specialized security strategy, generic security measures are applied to chemical laboratory facilities. [Pg.11]

Finally, the parties to the CWC have also periodically considered whether an attack against a chemical facility by a non-state actor (i.e., terrorists) constitutes a chemical weapon attack . In order to address snch concerns, the physical and human security at chemical facilities have received inaeased attention in recent years. Some states have also taken steps to restrict the availability of open-source information that describes plant site vulnerabilities to possible attack or unauthorized access. [Pg.7]

Alternatives to Chlorine Gas in Circuit Board Manufacturing Photocircuits Corporation, in Glen Cove, NY, manufactures printed circuit boards for use in computers, cars, phones, and many other products. The facility formerly used chlorine gas in the copper etching process used to make circuit boards, but switched to sodium chlorate. This change reduced hazards to employees and eliminated an off-site vulnerability zone that encompassed 21,000 people. [Pg.29]

Sites vulnerable to river flooding are those located on river coastal regions or in general in river basins. [Pg.13]

Resmethrin was the first synthetic pyrethroid insecticide that possessed insecticidal activity approaching the potency of pyrethrin I. In resmethrin, the furan ring replaced the cyclopentenone ring of pyrethrin I, and the benzene ring replaced the diene side chain of pyrethrin I. The success of resmethrin (four isomers, two cis-and two trans-) led to the synthesis of a form that was less toxic to mammals, bioresmethrin (lR-tra s isomer). Unfortunately, bioresmethrin per se was not more photostable than were the earlier synthetic pyrethroids, because both the furan ring and isobutenyl side chain were sites vulnerable to degradation. [Pg.6]

Societal Lower Pyramid of Sacrifice sites Vulnerability the... [Pg.22]

Reduction in sites vulnerable to peroxide and radical attack... [Pg.297]

Minimization of impingement risks focuses on site-specific analyses of potentially vulnerable species and selection of engineering designs which, within acceptable cost limits, keep impingement deaths low. [Pg.477]

Groundwater is vulnerable to pollution by chemicals carried by rainwater, leaching from waste sites or from waste water carrying industrial or agricultural effluent. Treatment of drinking water may remove some, but not all, of these contaminants. Some polycarbonate or metal water pipes that are lined with epoxy resin lacquers may release bisphenol A. [Pg.15]

Allows site-specific inputs to the calculation of vulnerability zones and provides release scenarios Calculations are based on site-specific planning factors such as wind speed, stabihty class, and chemical toxicity. [Pg.273]

The incidence of aircraft impacts may be significantly higher in certain areas (e g., in the vicinity or airports). The aircraft crash hazard is site specific and tlie failure is strongly dependent on the kinetic energy of tlie aircraft. Two types of data are needed to analyze for aircraft impact the aircraft crash rate in tlie site vicinity (per unit area per year) and tlie effective target area of tlie vulnerable item. Crash rates for different categories of aircraft can be obtained from state and national autliorities (e.g., FAA). The proximity of the site to airfields must be taken into account because crashes are much more frequent witliin a radius of approximately 3 miles. [Pg.199]

The first step in minimizing accidents in a chemical phuit is to evaluate the facility for potential fires, explosions, and vulnerability to other liazards, particularly those of a chemical miture. This calls for a detailed study of plant site and layout, materials, processes, operations, equipment, and training, plus an effective loss prevention program. The technical nature of industry requires detailed data and a broad range of experience. Tliis complex task, today becoming the most important in plant design, is facilitated by the safety codes, standiu ds, and practice information available. The technical approach to evaluating die consequences of hazards is discussed later in tliis cliapter and in Part V (Chapters 20 and 21). [Pg.484]

The outstanding virtue of zinc-rich paints is simplicity in application. No special equipment is required and the operation can, of course, be carried out on site, large or small structures being equally suitable for treatment. While there is some evidence that the zinc-rich paints will reduce iron oxides remaining on the steel surface, proper surface preparation is as important here as with traditional paints if the best results are to be achieved. The main use of zinc-rich paints is to protect structural steel-work, ships hulls, and vulnerable parts of car bodies, and to repair damage to other zinc coatings. [Pg.491]

A final aspect of process analytical chemistry is the vulnerability of the sensitive detector components to the harsh conditions sometimes encountered in process sampling. It may be possible to physically separate sensitive components, especially the electronics, from the sampling site. Fiber optics... [Pg.93]

Pokora MJ, Richfield EK, Cory-Slechta DA. 1996. Preferential vulnerability of nucleus accumbens dopamine binding sites to low-level lead exposure time course of effects and interactions with chronic dopamine agonist treatments. JNeurochem 67 1540-1550. [Pg.564]

With these features in mind, we envisioned a new family of macrocyclic ligands for olefin polymerization catalysis (Fig. 9) [131, 132], We utilized macrocycles as the ligand framework and installed the catalytic metal center in the core of the macrocycles. Appropriate intra-annular binding sites are introduced into cyclophane framework that not only match the coordination geometry of a chosen metal but also provide the appropriate electronic donation to metal center. The cyclophane framework would provide a microenvironment to shield the catalytic center from all angles, but leaving two cis coordination sites open in the front one for monomer coordination and the other for the growing polymer chain. This could potentially protect the catalytic center and prevent it from decomposition or vulnerable side reactions. [Pg.207]

Hence, Casey s scheme calls for an empty coordination site on the metal in addition to the complexed carbene. Recently, Casey demonstrated that carbonyls of (CO)5W=CPh2 are vulnerable to exchange processes under relatively mild reaction conditions (29) ... [Pg.452]


See other pages where Site vulnerability is mentioned: [Pg.190]    [Pg.648]    [Pg.30]    [Pg.1302]    [Pg.273]    [Pg.65]    [Pg.13]    [Pg.190]    [Pg.648]    [Pg.30]    [Pg.1302]    [Pg.273]    [Pg.65]    [Pg.13]    [Pg.260]    [Pg.439]    [Pg.197]    [Pg.884]    [Pg.420]    [Pg.196]    [Pg.391]    [Pg.33]    [Pg.121]    [Pg.146]    [Pg.178]    [Pg.281]    [Pg.289]    [Pg.290]    [Pg.35]    [Pg.88]    [Pg.304]    [Pg.137]    [Pg.225]    [Pg.152]   
See also in sourсe #XX -- [ Pg.26 , Pg.31 ]




SEARCH



Site vulnerability analysis

Vulnerability

© 2024 chempedia.info