... 0) and condensation ( m phase < 0) is assumed Where m phase is mass transfer: for evaporation & & & & ( m phase = mevap ) and for condensation ( m phase = mcond ) (kg/s) So that the mass balance ... both gas and liquid phase in the same computational domain, and thus allows for the implementation of phase change inside the gas diffusion layers The model includes the transport of gaseous ... reduces to Darcy’s law, which is, however, based on the relative permeability for the gas phase (KP ) The relative permeability accounts for the reduction in pore space available for one phase due...
Ngày tải lên: 05/09/2013, 14:58
... pollutant EMC’s where higher in urban areas than non-urban areas and that the EMC’s were influenced by event rainfall, cumulative seasonal rainfall, antecedent dry period, drainage area, AADT, land ... can also contribute to transportation mechanisms • Van der Waals forces – weak mass attraction that draws particles and dissolved phases from water and holds to media surface, more effective as ... research aims to utilize a coarser material typically used in filter drains as both a source of adsorption for heavy metals as well as a filtration material Fine granules would not be suitable for...
Ngày tải lên: 22/12/2014, 17:08
grey water reuse as a sustainable alternative resouree
... QUANTITY The quantity of greywater available for reuse in a household may be estimated from the daily household consumption The consumption for a typical home in WA, Australia and Malaysia are shown ... Grey Water Reuse As A Sustainable Alternative Water Resource The laundry greywater is more contaminated with faecal pathogens from soiled clothing than the bathroom source, though laundry water ... Piping and Conveyance, Surge/Balancing Tanks, Filters, Pump and delivery piping system A separate sanitary plumbing system has to be installed to separate the grey water from the wastewater discharges...
Ngày tải lên: 25/04/2013, 08:20
Assessment of pretreatments and enzymatic hydrolysis of wheat straw as a sugar source for bioprocess industry
... And such a whole suite of accessory enzymes is required for efficient xylan hydrolysis such as α-arabinofuranosidases and α-Larabinases that release arabinan [31], α-glucuronidases that release ... acetic acid Organic solvent such as acetone can be used to precipitate and separate the fractionated biomass The pretreatment has an advantage of operating at low temperature (50 °C) which capital ... endo-glucanase, exo-glucanase and β-glucosidase Endo-and exo-glucanases are commonly referred to as “cellulases” Fungal strains of Trichoderma reesei are used to produce most commercial cellulase...
Ngày tải lên: 05/09/2013, 15:28
Tài liệu Module 3: Using a Conceptual Design for Data Requirements docx
... focus on the reasons for gathering and analyzing data, as well as the formulation of this data into use cases Use cases will be the foundation for determining data requirements for the system ... skills and experience necessary to perform a task • Collect artifacts, such as printed documentation and manuals 50 Module 3: Using a Conceptual Design for Data Requirements Analyzing Information ... that an actor must know to perform a function or task Each functional data requirement is directly traceable to an actor and an object within a use case Nonfunctional data requirements A nonfunctional...
Ngày tải lên: 10/12/2013, 17:15
Tài liệu Module 5: Creating a Security Design for Physical Resources pdf
... the room and extract an account database from a server by using a boot startup disk or CD The attacker could then perform a brute force attack on the password hashes in the database and access ... as quickly as at an online facility) Additional reading For more information about disaster recovery, see Data Security and Data Availability in the Administrative Authority – Part 2, at: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/ ... internal network If data cables are accessible, attackers can tap into them or attach listening devices that gather network data Not all information is electronic For example, an attacker could read...
Ngày tải lên: 21/12/2013, 19:15
Tài liệu Module 6: Creating a Security Design for Computers ppt
... physically attacks a computer’s hard disk, or a process in an organization omits the application of service packs before deployment Additional reading For more information about change management, ... threat models Manage risks Qualitative and quantitative risk analysis Phase Task Details Building Create policies and procedures for: Installing operating systems and software securely Enforcing ... can use the checklist as a basic job aid The phases mentioned on the page are from Microsoft Solutions Framework (MSF) Use this page to emphasize that students must perform threat analysis and...
Ngày tải lên: 21/12/2013, 19:15
Tài liệu Instructor Notes Module 3: Using a Conceptual Design for Data Requirements pdf
... be able to: • Discuss use cases, data requirements, and requirements validation as they relate to conceptual design for data systems ! To prepare for the activity • Review the activity and anticipate ... Module 3: Using a Conceptual Design for Data Requirements Activities Activity 3.1: Identifying Data-Related Use Cases and Data Requirements In this activity, students will determine data requirements, ... Many students with database backgrounds will want to think and work in the physical data model Remind them that, at this point, the work is still in the conceptual phase THIS PAGE INTENTIONALLY...
Ngày tải lên: 17/01/2014, 09:20
Tài liệu Module 7: Creating a Security Design for Accounts pdf
... accounts and passwords Anyone who can manage an account can change the rights and permissions of the account or disable its use Anyone who can manage a password to an account can, at any time, access ... account passwords for non-System accounts are stored as LSA secrets, which an attacker can extract If the account is a domain account, an attacker who extracts the password from a computer can ... secrets and obtain service account passwords of domain service accounts Mitigate Use local accounts for services Attacker can use brute force to easily break LAN Manager password hashes Avoid Remove...
Ngày tải lên: 18/01/2014, 05:20
Tài liệu Module 8: Creating a Security Design for Authentication docx
... Creating a Security Design for Authentication 13 When using LAN Manager and NTLM authentication protocols, consider: Removing LAN Manager password hashes LAN Manager password hashes are sent along ... NTLM or LAN Manager, and then attack the password hashes offline Threat is easily carried out with little skill required Both attacks enable an attacker to obtain a valid user account and password ... with NTLM authentication messages for compatibility with older operating systems Because an attacker can easily crack LAN Manager password hashes, remove them from the account databases if your...
Ngày tải lên: 18/01/2014, 05:20
Tài liệu Module 9: Creating a Security Design for Data pptx
... the attacker replaces the password of the Administrator account in the local Security Accounts Manager (SAM) database The attacker then logs on to the laptop as Administrator and accesses the data ... that your organization retains data and how you use redundant hardware and hardware replacement schedules to protect against loss of data due to hardware failure Additional reading For more information ... points Data is vulnerable to threats from both external and internal attackers For example: External attacker scenario An external attacker steals a laptop from an employee’s car Using a floppy...
Ngày tải lên: 18/01/2014, 05:20
Tài liệu Module 10: Creating a Security Design for Data Transmission docx
... infrastructure (PKI) and a Remote Authentication Dial-In User Service (RADIUS) infrastructure Additional reading For more information about data transmission protocols for the application layer, ... the attacker Threats can range from passive monitoring to malicious disruption of traffic For example, an attacker who wants to gain knowledge about data as it is transmitted can passively monitor ... risks to data transmission Design security for data transmission 2 Module 10: Creating a Security Design for Data Transmission Lesson: Determining Threats and Analyzing Risks to Data Transmission...
Ngày tải lên: 18/01/2014, 05:20
Tài liệu Module 11: Creating a Security Design for Network Perimeters ppt
... explain how a Land attack and a SYN flood attack (or SYN-ACK attack) can prevent users from retrieving their e-mail Use the Internet to locate information about how Land and SYN-ACK attacks affect ... are assessments for each lesson, located on the Student Materials compact disc You can use them as pre-assessments to help students identify areas of difficulty, or you can use them as post-assessments ... source address on each new packet that is sent to generate additional traffic and deny legitimate traffic An attacker could use a SYN-ACK attack against the router, firewall, or Web server at Northwind...
Ngày tải lên: 18/01/2014, 05:20
Tài liệu Báo cáo khoa học: Mammalian Gup1, a homolog of Saccharomyces cerevisiae glycerol uptake/transporter 1, acts as a negative regulator for N-terminal palmitoylation of Sonic hedgehog doc
... 5¢-CACACTACACTGGGAAGCAGAGACTCCAGC-3¢ and 5¢-AGCTGGCCCAGCAGCCATACACAGTTAAAG3¢ The cDNA was subcloned into the EcoRV site of pBluescript SK(+) (Stratagene, La Jolla, CA, USA) and sequenced using an automated ... buffer, and the eluted samples were subjected to western blot analysis as described above The authors thank Drs Masato Yasui, Sadakazu Aiso and Masaaki Matsuoka for support; Dr Andrew P McMahon for ... 5¢-AA GCTTCCGGAGGCTGCTAGAGAC-3¢ and 5¢-GGATC CAAGAACTGTGTATGTCTG-3¢ The 1.6-kbp fulllength Skn cDNA, whose termination codon was changed to a BamHI site, was inserted between the SalI and the BamHI...
Ngày tải lên: 18/02/2014, 16:20
Tài liệu Báo cáo khoa học: Peroxiredoxin II functions as a signal terminator for H2O2-activated phospholipase D1 doc
... mm NaCl, and · protease inhibitor cocktail at 37 °C for 20 The lysate was spun down at 50 000 g for 15 The supernatant was mixed with pre-equilibrated anti-HA affinity matrix and rocked at °C for ... Valencia, CA, USA), and rocked at °C for h The lysate ⁄ Ni ⁄ nitrilotriacetate bead mixture was transferred to a poly prep chromatography column and the agarose packed The column was washed twice ... ·) Rabbit antibody to PrxII and an Alexa-647-labeled goat antirabbit IgG secondary were used to visualize PrxII Mouse monoclonal antibody to HA and an Alexa 488-labeled goat anti-mouse secondary...
Ngày tải lên: 20/02/2014, 01:20
Tài liệu BÁO CÁO " LIPID PRODUCTION FROM MICROALGAE AS A PROMISING CANDIDATE FOR BIODIESEL PRODUCTION " ppt
... extracted The effect of drying temperature was investigated in this study Gas chromatography analysis Sample was dissolved in ethyl acetate and 0.5 µL of this was injected into a Shimadzu GC-1 7A ... that increasing CO2 concentration of up to 1% of air will increase lipid produced by algae was given in Table As shown in this table, cell concentration obtained after 20 days incubation was ... medium and the cultivation continued for and 17 days at which time the cells were harvested and the lipid content as well as lipid productivity was measured Other conditions of incubation such as...
Ngày tải lên: 21/02/2014, 10:20
Tài liệu BÁO CÁO " LIPID PRODUCTION FROM MICROALGAE AS A PROMISING CANDIDATE FOR BIODIESEL PRODUCTION " docx
... extracted The effect of drying temperature was investigated in this study Gas chromatography analysis Sample was dissolved in ethyl acetate and 0.5 µL of this was injected into a Shimadzu GC-1 7A ... that increasing CO2 concentration of up to 1% of air will increase lipid produced by algae was given in Table As shown in this table, cell concentration obtained after 20 days incubation was ... medium and the cultivation continued for and 17 days at which time the cells were harvested and the lipid content as well as lipid productivity was measured Other conditions of incubation such as...
Ngày tải lên: 21/02/2014, 10:20
Báo cáo khoa học: The modulation of metal bio-availability as a therapeutic strategy for the treatment of Alzheimer’s disease pptx
... Modulation of metal availability for treating AD P J Crouch et al research attention as potential therapeutic targets Plaques and NFTs, however, cannot be regarded as ‘upstream’ causative factors ... hyperphosphorylation occurs because of an imbalance in the activity of tau kinases and phosphatases [3] One particular tau kinase pertinent to metal dyshomeostasis in AD is glycogen synthase kinase-3 ... metal dyshomeostasis in all aspects is clear In the AD affected brain, metal dyshomeostasis is evident in the form of a substantial increase in the levels of extracellular metals and a decrease...
Ngày tải lên: 07/03/2014, 10:20
Báo cáo khoa học: Zinc-binding property of the major yolk protein in the sea urchin ) implications of its role as a zinc transporter for gametogenesis ppt
... was stored at ) 80 °C for analysis for metals Paraffin sections lm thick were prepared and stained with hematoxylin and eosin The gonadal maturity of each animal was classified into five stages according ... substrate for localization of the labeled MYP Statistical analysis Data were expressed as the mean ± SEM Statistical analysis was performed using instat software (GraphPad Software) The normality ... using a Bio-Rad protein assay (Bio-Rad, Hercules, CA, USA) with bovine c-globulin as a standard Thyroglobulin (669 kDa), catalase (232 kDa), BSA (67 kDa) and chymotrypsinogen (25 kDa) were used for...
Ngày tải lên: 16/03/2014, 05:20
Báo cáo khoa học: Structure, epitope mapping, and docking simulation of a gibberellin mimic peptide as a peptidyl mimotope for a hydrophobic ligand pot
... peptide-antibody recognition 11 Murata T, Fushinobu S, Nakajima M, Asami O, Sassa T, Wakagi T & Yamaguchi I (2002) Crystal structure of the liganded anti-gibberellin A4 antibody 4-B8(8) ⁄ E9 Fab fragment ... restraints, and eight dihedral angle restraints Fifty conformations that give low conformation energy and that give no distance and dihedral angle violations greater than ˚ ˚ 0.5 A and A, respectively, ... stage, the same protocol was applied by adding hydrogen bond restraints and dihedral angle restraints Additional NOE constraints were added in each round of calculations, and restraints that...
Ngày tải lên: 16/03/2014, 23:20