Detection of microscopic leaks in fermenter cooling coils

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Precise detection of memory leaks

A memory leak occurs when a program allocates a block of memory, but does not release it after its last use. In case such a block is still referenced by one or more reachable pointers at the end of the execution, fixing the leak is often quite simple as long as it is known where the block was allocated. If, however, all references to the block are overwritten or lost during the program’s execut...

متن کامل

Entanglement enhances cooling in microscopic quantum refrigerators.

Small self-contained quantum thermal machines function without external source of work or control but using only incoherent interactions with thermal baths. Here we investigate the role of entanglement in a small self-contained quantum refrigerator. We first show that entanglement is detrimental as far as efficiency is concerned-fridges operating at efficiencies close to the Carnot limit do not...

متن کامل

Molecular and microscopic detection of Theileria equi and Babesia caballi in horses in Kurdestan Province, Iran

Equine piroplasmosis is a tick-borne disease caused by intra-erythrocyte protozoa, Theileria equi and Babesia caballi. The present study aimed to detect piroplasm infection in horses in Kurdestan Province, Iran, through molecular and microscopic approaches.n this study, 186 blood samples were randomly collected from horses of five regions of Kurdestan Province. The Tbs-S/Tbs-A primer set was us...

متن کامل

investigation of single-user and multi-user detection methods in mc-cdma systems and comparison of their performances

در این پایان نامه به بررسی روش های آشکارسازی در سیستم های mc-cdma می پردازیم. با توجه به ماهیت آشکارسازی در این سیستم ها، تکنیک های آشکارسازی را می توان به دو دسته ی اصلی تقسیم نمود: آشکارسازی سیگنال ارسالی یک کاربر مطلوب بدون در نظر گرفتن اطلاعاتی در مورد سایر کاربران تداخل کننده که از آن ها به عنوان آشکارساز های تک کاربره یاد می شود و همچنین آشکارسازی سیگنال ارسالی همه ی کاربران فعال موجود در...

Detection and Exploitation of Information Flow Leaks

This thesis contributes to the field of language-based information flow analysis with a focus on detection and exploitation of information flow leaks in programs. To achieve this goal, this thesis presents a number of precise semi-automatic approaches that allow one to detect, exploit and judge the severity of information flow leaks in programs. The first part of the thesis develops an approach...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Biotechnology and Bioengineering

سال: 1984

ISSN: 0006-3592,1097-0290

DOI: 10.1002/bit.260260807