The CAPEC Database
نویسنده
چکیده
The CAPEC database on measured data is established with the aim to promote greater data exchange in the chemical engineering community. The target properties are pure component properties, mixture properties and special drug solubility data. The database divides pure component properties into primary, secondary and functional properties. Mixture properties are categorised in terms of the number of components in the mixture and the number of phases present. The compounds in the database have been classified based on the functional groups in the compound. This classification makes the CAPEC database a very useful tool, for example, in the development of new property models since properties of chemical similar compounds are easily obtained. A program with efficient search and retrieval functions of properties has been developed.
منابع مشابه
PEC 04 - 25 CAPEC Research Report – 2004
Preface This report provides an overview of our research activities and achievements for the period May 2003 to May 2004. For each research program, this report provides information about the active projects, their objectives, an overview of their current status, and their future plans. An overview of the CAPEC software and the current CAPEC publications list (only for the 2003-2004 period) are...
متن کاملThe Capec Property Prediction Package and Database
Property models play an important role in the solution of all simulation problems where the property model is part of the total model equations. Usually, the model equations are arranged in such a way that property models are “asked” to supply property values numerous times during the iterative solution of the model equations through a numerical solver. They are therefore a key factor in the ro...
متن کاملRealizing the Potential of Attack Patterns for Secure Software Development
A critical challenge in secure cyberspace is engineering more secure software. To address this challenge, it is important to integrate security-related activities and deliverables to each of the phases of software development life cycle (SDLC). To develop secure software, software developers need to think like an attacker. Attack patterns are a mechanism that captures the attacker’s perspective...
متن کاملThe Knowledge Based Authentication Attacks
Knowledge Based authentication is still the most widely used and accepted technique for securing resources from unauthorized access for its simplicity, ease of revocation and legacy deployment which divides to textual and graphical password. Over the last decade several attacks records for stealing user’s identity and confidential information using a single or combination of attacks. In this pa...
متن کامل