Water in life cycle assessment—50th Swiss Discussion Forum on Life Cycle Assessment—Zürich, 4 December 2012
نویسندگان
چکیده
منابع مشابه
Discussion of “ Business Cycle and the Life Cycle ”
It has been well known for at least the past two decades that the standard neo-classical growth model, notwithstanding its surprising success in explaining many aggregate phenomena, performs poorly when it comes to explaining business cycle fluctuations in the labor market. The work of Gomme, Rogerson, Rupert, and Wright (henceforth GRRW) builds on the premise that the understanding of labor ma...
متن کاملLife Cycle Analysis of Water Networks
Water authorities around the world are faced with the problem of ageing distribution networks and often only limited historical data on which to base a sound long term, cost efficient replacement policy. The LICAN approach to whole of life costing is introduced and a hypothetical case study is used to demonstrate the importance of such an approach. A selection of pipe networks utilizing differe...
متن کاملFood Polymeric Packaging Life Cycle Assessment (LCA)
Food packaging is used to maintain the safety and quality of food during distribution and storage and to protect them from adverse internal and external conditions, such as water vapor, spoilage due to microorganisms, moisture, light, and dust. In this regard, lots of research studies have been done to increase shelf life, safety, and quality to create suitable physico...
متن کاملInvestigation on life cycle assessment of lead and zinc production
Lead and zinc production is one of the main predisposing factors of excessive greenhouse gases emissions, air pollution and water consumption. In this paper, the environmental problems of lead and zinc production in Calcimin plant are expressed and life cycle assessment of this plant is assessed. The data regarding the amount of induced global warming and pollution, acidification, and depletion...
متن کاملBotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle
Nowadays, botnets are considered as essential tools for planning serious cyberattacks. Botnets are used to perform various malicious activities such as DDoSattacks and sending spam emails. Different approaches are presented to detectbotnets; however most of them may be ineffective when there are only a fewinfected hosts in monitored network, as they rely on similarity in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The International Journal of Life Cycle Assessment
سال: 2013
ISSN: 0948-3349,1614-7502
DOI: 10.1007/s11367-013-0557-5