967 resultados para Mercury intrusion porosimetry


Relevância:

20.00% 20.00%

Publicador:

Resumo:

As with gold, relativistic effects are important in the chemistry of mercury Together with the closed-shell d(10) configuration of Hg2+ they account for the special bonding schemes as preferred linear coordination with highly covalent contributions to chemical bonding or special affinities to nitrogen and sulfur that are so prominent in mercuric chemistry This research report summarizes recent research on coordination compounds with halogen, oxygen and, especially, nitrogen as direct bonding partners of di-valent mercury and their competition with each other. In a rather systematic way N-donor ligands with one, two and more than two nitrogen atoms have been inspected in order to elucidate the influences that lead to the special bonding schemes of Hg-II-N compounds.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The title compound, (NH4)(2)HgCl2 (NO3)(2), is a double salt of HgCl2 and NH4NO3 and can also be written as `HgCl2.2NH(4)NO(3)'. The structure contains HgCl2 units which are connected by nitrate groups, through long links of ca. 2.90 Angstrom, to give chains running along [010]. All atoms apart from the two oxygen atoms are located on a mirror plane perpendicular to the b axis. The coordination around mercury is a distorted hexagonal bipyramid.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The validation of variable-density flow models simulating seawater intrusion in coastal aquifers requires information about concentration distribution in groundwater. Electrical resistivity tomography (ERT) provides relevant data for this purpose. However, inverse modeling is not accurate because of the non-uniqueness of solutions. Such difficulties in evaluating seawater intrusion can be overcome by coupling geophysical data and groundwater modeling. First, the resistivity distribution obtained by inverse geo-electrical modeling is established. Second, a 3-D variable-density flow hydrogeological model is developed. Third, using Archie's Law, the electrical resistivity model deduced from salt concentration is compared to the formerly interpreted electrical model. Finally, aside from that usual comparison-validation, the theoretical geophysical response of concentrations simulated with the groundwater model can be compared to field-measured resistivity data. This constitutes a cross-validation of both the inverse geo-electrical model and the groundwater model.
[Comte, J.-C., and O. Banton (2007), Cross-validation of geo-electrical and hydrogeological models to evaluate seawater intrusion in coastal aquifers, Geophys. Res. Lett., 34, L10402, doi:10.1029/2007GL029981.]

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The main mode of failure of the acetabular component in total hip arthroplasty is aseptic loosening. Successive generations of cementation techniques have evolved to alleviate this problem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this preliminary case study, we investigate how inconsistency in a network intrusion detection rule set can be measured. To achieve this, we first examine the structure of these rules which incorporate regular expression (Regex) pattern matching. We then identify primitive elements in these rules in order to translate the rules into their (equivalent) logical forms and to establish connections between them. Additional rules from background knowledge are also introduced to make the correlations among rules more explicit. Finally, we measure the degree of inconsistency in formulae of such a rule set (using the Scoring function, Shapley inconsistency values and Blame measure for prioritized knowledge) and compare the informativeness of these measures. We conclude that such measures are useful for the network intrusion domain assuming that incorporating domain knowledge for correlation of rules is feasible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this preliminary study, we investigate how inconsistency in a network intrusion detection rule set can be measured. To achieve this, we first examine the structure of these rules which are based on Snort and incorporate regular expression (Regex) pattern matching. We then identify primitive elements in these rules in order to translate the rules into their (equivalent) logical forms and to establish connections between them. Additional rules from background knowledge are also introduced to make the correlations among rules more explicit. We measure the degree of inconsistency in formulae of such a rule set (using the Scoring function, Shapley inconsistency values and Blame measure for prioritized knowledge) and compare the informativeness of these measures. Finally, we propose a new measure of inconsistency for prioritized knowledge which incorporates the normalized number of atoms in a language involved in inconsistency to provide a deeper inspection of inconsistent formulae. We conclude that such measures are useful for the network intrusion domain assuming that introducing expert knowledge for correlation of rules is feasible.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ethanol adsorption-desorption isotherms on well-organized mesoporous silica and titania films with hexagonal pores structure were studied by ellipsometric porosimetry. The mesopore volume Was calculated from the change of the effective refractive index at the end points of the isotherm. An improved Derjaguin-Broekhoff-de Boer (IDBdB) model for cylindrical pores is proposed for the determination of the pore size. In this model, the disjoining pressure isotherms were obtained by measuring the thickness of the ethanol film on a non-porous film with the same chemical composition. This approach eliminates uncertainties related to the application of the statistical film thickness determined via t-plots in previous versions of the DBdB model. The deviation in the surface tension of ethanol in the mesopores from that of a flat interface was described by the Tolman parameter in the Gibbs-Tolman-Koening-Buff equation. A positive value of the Tolman parameter of 0.2 nm was found from the fitting of the desorption branch of the isotherms to the experimental data obtained by Low Angle X-ray Diffraction (LA-XRD) and Transmission Electron Microscopy (TEM) measurements in the range of pore diameters between 2.1 and 8.3 nm. (C) 2009 Elsevier Inc. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Macroporosity(>100µm) in bone void fillers is a known prerequisite for tissue regeneration, but recent literature has highlighted the added benefit of microporosity(0.5 - 10µm). The aim of this study was to compare the in vitro performances of a novel interconnective microporous hydroxyapatite (HA) derived from red algae to four clinically available macroporous calcium phosphate (CaP) bone void fillers. The use of algae as a starting material for this novel void filler overcomes the issue of sustainability, which overshadows continued use of scleractinian coral in the production of some commercially available materials, namely Pro-OsteonTM and Bio-Coral®. This study investigated the physicochemical properties of each bone voidfiller material using x-ray diffraction, fourier transform infrared spectroscopy, inductive coupled plasma, and nitrogen gas absorption and mercury porosimetry. Biochemical analysis, XTT, picogreen and alkaline phosphatase assays were used to evaluate the biological performances of the five materials. Results showed that algal HA is non-toxic to human foetal osteoblast (hFOB) cells and supports cell proliferation and differentiation. The preliminary in vitro testing of microporous algal-HA suggests that it is comparable to the four clinically approved macroporous bone void fillers tested. The results demonstrate that microporous algal HA has good potential for use in vivo and in new tissue engineered strategies for hard tissue repair.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The molecular structure of a variety of novel mercury-phytochelatin complexes was evidenced in rice plants exposed to inorganic mercury (Hg2+) using RP-HPLC with simultaneous detection via ICP-MS and ES-MS.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mercury in plants or animal tissue is supposed to occur in the form of complexes formed with biologically relevant thiols (biothiols), rather than as free cation. We describe a technique for the separation and molecular identification of mercury and methylmercury complexes derived from their reactions with cysteine (Cys) and glutathione (GS): Hg(Cys)(2), Hg(GS)(2), MeHgCys, MeHgGS. Complexes were characterised by electrospray mass spectrometry (MS) equipped with an ion trap and the fragmentation pattern of MeHgCys was explained by using MP2 and B3LYP calculations, showing the importance of mercury-amine interactions in the gas phase. Chromatographic baseline separation was performed within 10 min with formic acid as the mobile phase on a reversed-phase column. Detection was done by online simultaneous coupling of ES-MS and inductively coupled plasma MS. When the mercury complexes were spiked in real samples (plant extracts), no perturbation of the separation and detection conditions was observed, suggesting that this method is capable of detecting mercury biothiol complexes in plants.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Intrusion Detection System (IDS) is a common means of protecting networked systems from attack or malicious misuse. The deployment of an IDS can take many different forms dependent on protocols, usage and cost. This is particularly true of Wireless Intrusion Detection Systems (WIDS) which have many detection challenges associated with data transmission through an open, shared medium, facilitated by fundamental changes at the Physical and MAC layers. WIDS need to be considered in more detail at these lower layers than their wired counterparts as they face unique challenges. The remainder of this chapter will investigate three of these challenges where WiFi deviates significantly from that of wired counterparts:

• Attacks Specific to WiFi Networks: Outlining the additional threats which WIDS must account for: Denial of Service, Encryption Bypass and AP Masquerading attacks.

• The Effect of Deployment Architecture on WIDS Performance: Demonstrating that the deployment environment of a network protected by a WIDS can influence the prioritisation of attacks.

• The Importance of Live Data in WiFi Research: Investigating the different choices for research data sources with an emphasis on encouraging live network data collection for future WiFi research.