81 resultados para Manual safety belts.
Resumo:
The utilisation of computational fluid dynamics (CFD) in process safety has increased significantly in recent years. The modelling of accidental explosion via CFD has in many cases replaced the classical Multi Energy and Brake Strehlow methods. The benefits obtained with CFD modelling can be diminished if proper modelling of the initial phase of explosion is neglected. In the early stages of an explosion, the flame propagates in a quasi-laminar regime. Proper modelling of the initial laminar phase is a key aspect in order to predict the peak pressure and the time to peak pressure. The present work suggests a modelling approach for the initial laminar phase in explosion scenarios. Findings are compared with experimental data for two classical explosion test cases which resemble the common features in chemical process areas (confinement and congestion). A detailed analysis of the threshold for the transition from laminar to turbulent regime is also carried out. The modelling is implemented in a fully 3D Navier-Stokes compressible formulation. Combustion is treated using a laminar flamelet approach based on the Bray, Moss and Libby (BML) formulation. A novel modified porosity approach developed for the unstructured solver is also considered. Results agree satisfactorily with experiments and the modelling is found to be robust. © 2013 The Institution of Chemical Engineers.
Resumo:
Part of the ICE manuals series, ICE manual of structural design is the essential reference for all structural engineers involved in the design of buildings and other structures.
Resumo:
This paper discusses various techniques that may be used to combat counterfeiting in the pharmaceutical supply chain. These include the use of electronic pedigrees (to ensure the integrity of the supply chain), together with mass-serialization (to provide for a unique lifecycle history of each individual package) and authentication of the product (to check for any discrepancies in the various attributes of the product and its packaging are as intended for that individual package). Management of the pedigree process and product authentication is discussed in some detail, together with various other learnings from the Drug Security Network, including identification of some remaining vulnerabilities and suggestions for tightening these loopholes. © 2008 Springer-Verlag Berlin Heidelberg.