0

dtos as a sustainable design for product recycling

Novel design of a compacted micro-structured air-breathing PEM fuel cell as a power source for mobile phones

Novel design of a compacted micro-structured air-breathing PEM fuel cell as a power source for mobile phones

Môi trường

... 0) and condensation ( m phase < 0) is assumed Where m phase is mass transfer: for evaporation & & & & ( m phase = mevap ) and for condensation ( m phase = mcond ) (kg/s) So that the mass balance ... both gas and liquid phase in the same computational domain, and thus allows for the implementation of phase change inside the gas diffusion layers The model includes the transport of gaseous ... reduces to Darcy’s law, which is, however, based on the relative permeability for the gas phase (KP ) The relative permeability accounts for the reduction in pore space available for one phase due...
  • 18
  • 549
  • 0
towards a rational design for sustainable urban drainage systems understanding (bio)geochemical mechanisms for enhanced heavy metal immobilization in filters

towards a rational design for sustainable urban drainage systems understanding (bio)geochemical mechanisms for enhanced heavy metal immobilization in filters

Tổng hợp

... pollutant EMC’s where higher in urban areas than non-urban areas and that the EMC’s were influenced by event rainfall, cumulative seasonal rainfall, antecedent dry period, drainage area, AADT, land ... can also contribute to transportation mechanisms • Van der Waals forces – weak mass attraction that draws particles and dissolved phases from water and holds to media surface, more effective as ... research aims to utilize a coarser material typically used in filter drains as both a source of adsorption for heavy metals as well as a filtration material Fine granules would not be suitable for...
  • 232
  • 230
  • 0
grey water reuse as a sustainable alternative resouree

grey water reuse as a sustainable alternative resouree

Công nghệ - Môi trường

... QUANTITY The quantity of greywater available for reuse in a household may be estimated from the daily household consumption The consumption for a typical home in WA, Australia and Malaysia are shown ... Grey Water Reuse As A Sustainable Alternative Water Resource The laundry greywater is more contaminated with faecal pathogens from soiled clothing than the bathroom source, though laundry water ... Piping and Conveyance, Surge/Balancing Tanks, Filters, Pump and delivery piping system A separate sanitary plumbing system has to be installed to separate the grey water from the wastewater discharges...
  • 7
  • 369
  • 0
Assessment of pretreatments and enzymatic hydrolysis of wheat straw as a sugar source for bioprocess industry

Assessment of pretreatments and enzymatic hydrolysis of wheat straw as a sugar source for bioprocess industry

Môi trường

... And such a whole suite of accessory enzymes is required for efficient xylan hydrolysis such as α-arabinofuranosidases and α-Larabinases that release arabinan [31], α-glucuronidases that release ... acetic acid Organic solvent such as acetone can be used to precipitate and separate the fractionated biomass The pretreatment has an advantage of operating at low temperature (50 °C) which capital ... endo-glucanase, exo-glucanase and β-glucosidase Endo-and exo-glucanases are commonly referred to as “cellulases” Fungal strains of Trichoderma reesei are used to produce most commercial cellulase...
  • 20
  • 437
  • 0
Tài liệu Module 3: Using a Conceptual Design for Data Requirements docx

Tài liệu Module 3: Using a Conceptual Design for Data Requirements docx

Chứng chỉ quốc tế

... focus on the reasons for gathering and analyzing data, as well as the formulation of this data into use cases Use cases will be the foundation for determining data requirements for the system ... skills and experience necessary to perform a task • Collect artifacts, such as printed documentation and manuals 50 Module 3: Using a Conceptual Design for Data Requirements Analyzing Information ... that an actor must know to perform a function or task Each functional data requirement is directly traceable to an actor and an object within a use case Nonfunctional data requirements A nonfunctional...
  • 20
  • 580
  • 0
Tài liệu Module 5: Creating a Security Design for Physical Resources pdf

Tài liệu Module 5: Creating a Security Design for Physical Resources pdf

Quản trị mạng

... the room and extract an account database from a server by using a boot startup disk or CD The attacker could then perform a brute force attack on the password hashes in the database and access ... as quickly as at an online facility) Additional reading For more information about disaster recovery, see Data Security and Data Availability in the Administrative Authority – Part 2, at: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/ ... internal network If data cables are accessible, attackers can tap into them or attach listening devices that gather network data Not all information is electronic For example, an attacker could read...
  • 24
  • 417
  • 0
Tài liệu Module 6: Creating a Security Design for Computers ppt

Tài liệu Module 6: Creating a Security Design for Computers ppt

Quản trị mạng

... physically attacks a computer’s hard disk, or a process in an organization omits the application of service packs before deployment Additional reading For more information about change management, ... threat models Manage risks Qualitative and quantitative risk analysis Phase Task Details Building Create policies and procedures for: Installing operating systems and software securely Enforcing ... can use the checklist as a basic job aid The phases mentioned on the page are from Microsoft Solutions Framework (MSF) Use this page to emphasize that students must perform threat analysis and...
  • 30
  • 458
  • 0
Tài liệu Instructor Notes Module 3: Using a Conceptual Design for Data Requirements pdf

Tài liệu Instructor Notes Module 3: Using a Conceptual Design for Data Requirements pdf

Chứng chỉ quốc tế

... be able to: • Discuss use cases, data requirements, and requirements validation as they relate to conceptual design for data systems ! To prepare for the activity • Review the activity and anticipate ... Module 3: Using a Conceptual Design for Data Requirements Activities Activity 3.1: Identifying Data-Related Use Cases and Data Requirements In this activity, students will determine data requirements, ... Many students with database backgrounds will want to think and work in the physical data model Remind them that, at this point, the work is still in the conceptual phase THIS PAGE INTENTIONALLY...
  • 4
  • 447
  • 0
Tài liệu Module 7: Creating a Security Design for Accounts pdf

Tài liệu Module 7: Creating a Security Design for Accounts pdf

Quản trị mạng

... accounts and passwords Anyone who can manage an account can change the rights and permissions of the account or disable its use Anyone who can manage a password to an account can, at any time, access ... account passwords for non-System accounts are stored as LSA secrets, which an attacker can extract If the account is a domain account, an attacker who extracts the password from a computer can ... secrets and obtain service account passwords of domain service accounts Mitigate Use local accounts for services Attacker can use brute force to easily break LAN Manager password hashes Avoid Remove...
  • 30
  • 352
  • 0
Tài liệu Module 8: Creating a Security Design for Authentication docx

Tài liệu Module 8: Creating a Security Design for Authentication docx

Quản trị mạng

... Creating a Security Design for Authentication 13 When using LAN Manager and NTLM authentication protocols, consider: Removing LAN Manager password hashes LAN Manager password hashes are sent along ... NTLM or LAN Manager, and then attack the password hashes offline Threat is easily carried out with little skill required Both attacks enable an attacker to obtain a valid user account and password ... with NTLM authentication messages for compatibility with older operating systems Because an attacker can easily crack LAN Manager password hashes, remove them from the account databases if your...
  • 32
  • 397
  • 0
Tài liệu Module 9: Creating a Security Design for Data pptx

Tài liệu Module 9: Creating a Security Design for Data pptx

Quản trị mạng

... the attacker replaces the password of the Administrator account in the local Security Accounts Manager (SAM) database The attacker then logs on to the laptop as Administrator and accesses the data ... that your organization retains data and how you use redundant hardware and hardware replacement schedules to protect against loss of data due to hardware failure Additional reading For more information ... points Data is vulnerable to threats from both external and internal attackers For example: External attacker scenario An external attacker steals a laptop from an employee’s car Using a floppy...
  • 24
  • 340
  • 0
Tài liệu Module 10: Creating a Security Design for Data Transmission docx

Tài liệu Module 10: Creating a Security Design for Data Transmission docx

Quản trị mạng

... infrastructure (PKI) and a Remote Authentication Dial-In User Service (RADIUS) infrastructure Additional reading For more information about data transmission protocols for the application layer, ... the attacker Threats can range from passive monitoring to malicious disruption of traffic For example, an attacker who wants to gain knowledge about data as it is transmitted can passively monitor ... risks to data transmission Design security for data transmission 2 Module 10: Creating a Security Design for Data Transmission Lesson: Determining Threats and Analyzing Risks to Data Transmission...
  • 28
  • 460
  • 0
Tài liệu Module 11: Creating a Security Design for Network Perimeters ppt

Tài liệu Module 11: Creating a Security Design for Network Perimeters ppt

Quản trị mạng

... explain how a Land attack and a SYN flood attack (or SYN-ACK attack) can prevent users from retrieving their e-mail Use the Internet to locate information about how Land and SYN-ACK attacks affect ... are assessments for each lesson, located on the Student Materials compact disc You can use them as pre-assessments to help students identify areas of difficulty, or you can use them as post-assessments ... source address on each new packet that is sent to generate additional traffic and deny legitimate traffic An attacker could use a SYN-ACK attack against the router, firewall, or Web server at Northwind...
  • 24
  • 535
  • 0
Tài liệu Báo cáo khoa học: Mammalian Gup1, a homolog of Saccharomyces cerevisiae glycerol uptake/transporter 1, acts as a negative regulator for N-terminal palmitoylation of Sonic hedgehog doc

Tài liệu Báo cáo khoa học: Mammalian Gup1, a homolog of Saccharomyces cerevisiae glycerol uptake/transporter 1, acts as a negative regulator for N-terminal palmitoylation of Sonic hedgehog doc

Báo cáo khoa học

... 5¢-CACACTACACTGGGAAGCAGAGACTCCAGC-3¢ and 5¢-AGCTGGCCCAGCAGCCATACACAGTTAAAG3¢ The cDNA was subcloned into the EcoRV site of pBluescript SK(+) (Stratagene, La Jolla, CA, USA) and sequenced using an automated ... buffer, and the eluted samples were subjected to western blot analysis as described above The authors thank Drs Masato Yasui, Sadakazu Aiso and Masaaki Matsuoka for support; Dr Andrew P McMahon for ... 5¢-AA GCTTCCGGAGGCTGCTAGAGAC-3¢ and 5¢-GGATC CAAGAACTGTGTATGTCTG-3¢ The 1.6-kbp fulllength Skn cDNA, whose termination codon was changed to a BamHI site, was inserted between the SalI and the BamHI...
  • 14
  • 499
  • 0
Tài liệu Báo cáo khoa học: Peroxiredoxin II functions as a signal terminator for H2O2-activated phospholipase D1 doc

Tài liệu Báo cáo khoa học: Peroxiredoxin II functions as a signal terminator for H2O2-activated phospholipase D1 doc

Báo cáo khoa học

... mm NaCl, and · protease inhibitor cocktail at 37 °C for 20 The lysate was spun down at 50 000 g for 15 The supernatant was mixed with pre-equilibrated anti-HA affinity matrix and rocked at °C for ... Valencia, CA, USA), and rocked at °C for h The lysate ⁄ Ni ⁄ nitrilotriacetate bead mixture was transferred to a poly prep chromatography column and the agarose packed The column was washed twice ... ·) Rabbit antibody to PrxII and an Alexa-647-labeled goat antirabbit IgG secondary were used to visualize PrxII Mouse monoclonal antibody to HA and an Alexa 488-labeled goat anti-mouse secondary...
  • 9
  • 401
  • 0
Tài liệu BÁO CÁO

Tài liệu BÁO CÁO " LIPID PRODUCTION FROM MICROALGAE AS A PROMISING CANDIDATE FOR BIODIESEL PRODUCTION " ppt

Báo cáo khoa học

... extracted The effect of drying temperature was investigated in this study Gas chromatography analysis Sample was dissolved in ethyl acetate and 0.5 µL of this was injected into a Shimadzu GC-1 7A ... that increasing CO2 concentration of up to 1% of air will increase lipid produced by algae was given in Table As shown in this table, cell concentration obtained after 20 days incubation was ... medium and the cultivation continued for and 17 days at which time the cells were harvested and the lipid content as well as lipid productivity was measured Other conditions of incubation such as...
  • 5
  • 396
  • 1
Tài liệu BÁO CÁO

Tài liệu BÁO CÁO " LIPID PRODUCTION FROM MICROALGAE AS A PROMISING CANDIDATE FOR BIODIESEL PRODUCTION " docx

Báo cáo khoa học

... extracted The effect of drying temperature was investigated in this study Gas chromatography analysis Sample was dissolved in ethyl acetate and 0.5 µL of this was injected into a Shimadzu GC-1 7A ... that increasing CO2 concentration of up to 1% of air will increase lipid produced by algae was given in Table As shown in this table, cell concentration obtained after 20 days incubation was ... medium and the cultivation continued for and 17 days at which time the cells were harvested and the lipid content as well as lipid productivity was measured Other conditions of incubation such as...
  • 5
  • 345
  • 0
Báo cáo khoa học: The modulation of metal bio-availability as a therapeutic strategy for the treatment of Alzheimer’s disease pptx

Báo cáo khoa học: The modulation of metal bio-availability as a therapeutic strategy for the treatment of Alzheimer’s disease pptx

Báo cáo khoa học

... Modulation of metal availability for treating AD P J Crouch et al research attention as potential therapeutic targets Plaques and NFTs, however, cannot be regarded as ‘upstream’ causative factors ... hyperphosphorylation occurs because of an imbalance in the activity of tau kinases and phosphatases [3] One particular tau kinase pertinent to metal dyshomeostasis in AD is glycogen synthase kinase-3 ... metal dyshomeostasis in all aspects is clear In the AD affected brain, metal dyshomeostasis is evident in the form of a substantial increase in the levels of extracellular metals and a decrease...
  • 9
  • 634
  • 0
Báo cáo khoa học: Zinc-binding property of the major yolk protein in the sea urchin ) implications of its role as a zinc transporter for gametogenesis ppt

Báo cáo khoa học: Zinc-binding property of the major yolk protein in the sea urchin ) implications of its role as a zinc transporter for gametogenesis ppt

Báo cáo khoa học

... was stored at ) 80 °C for analysis for metals Paraffin sections lm thick were prepared and stained with hematoxylin and eosin The gonadal maturity of each animal was classified into five stages according ... substrate for localization of the labeled MYP Statistical analysis Data were expressed as the mean ± SEM Statistical analysis was performed using instat software (GraphPad Software) The normality ... using a Bio-Rad protein assay (Bio-Rad, Hercules, CA, USA) with bovine c-globulin as a standard Thyroglobulin (669 kDa), catalase (232 kDa), BSA (67 kDa) and chymotrypsinogen (25 kDa) were used for...
  • 14
  • 442
  • 0
Báo cáo khoa học: Structure, epitope mapping, and docking simulation of a gibberellin mimic peptide as a peptidyl mimotope for a hydrophobic ligand pot

Báo cáo khoa học: Structure, epitope mapping, and docking simulation of a gibberellin mimic peptide as a peptidyl mimotope for a hydrophobic ligand pot

Báo cáo khoa học

... peptide-antibody recognition 11 Murata T, Fushinobu S, Nakajima M, Asami O, Sassa T, Wakagi T & Yamaguchi I (2002) Crystal structure of the liganded anti-gibberellin A4 antibody 4-B8(8) ⁄ E9 Fab fragment ... restraints, and eight dihedral angle restraints Fifty conformations that give low conformation energy and that give no distance and dihedral angle violations greater than ˚ ˚ 0.5 A and A, respectively, ... stage, the same protocol was applied by adding hydrogen bond restraints and dihedral angle restraints Additional NOE constraints were added in each round of calculations, and restraints that...
  • 11
  • 565
  • 0

Xem thêm

Tìm thêm: hệ việt nam nhật bản và sức hấp dẫn của tiếng nhật tại việt nam xác định các nguyên tắc biên soạn khảo sát các chuẩn giảng dạy tiếng nhật từ góc độ lí thuyết và thực tiễn khảo sát chương trình đào tạo gắn với các giáo trình cụ thể xác định thời lượng học về mặt lí thuyết và thực tế điều tra đối với đối tượng giảng viên và đối tượng quản lí điều tra với đối tượng sinh viên học tiếng nhật không chuyên ngữ1 khảo sát các chương trình đào tạo theo những bộ giáo trình tiêu biểu nội dung cụ thể cho từng kĩ năng ở từng cấp độ xác định mức độ đáp ứng về văn hoá và chuyên môn trong ct mở máy động cơ rôto dây quấn các đặc tính của động cơ điện không đồng bộ đặc tuyến hiệu suất h fi p2 đặc tuyến tốc độ rôto n fi p2 đặc tuyến dòng điện stato i1 fi p2 động cơ điện không đồng bộ một pha sự cần thiết phải đầu tư xây dựng nhà máy phần 3 giới thiệu nguyên liệu từ bảng 3 1 ta thấy ngoài hai thành phần chủ yếu và chiếm tỷ lệ cao nhất là tinh bột và cacbonhydrat trong hạt gạo tẻ còn chứa đường cellulose hemicellulose chỉ tiêu chất lượng theo chất lượng phẩm chất sản phẩm khô từ gạo của bộ y tế năm 2008