نتایج جستجو برای: multi component phase behavior
تعداد نتایج: 2104780 فیلتر نتایج به سال:
Water-soluble, multi-component disulfide cages showing a self-sorting behavior and cation sensing ability.
Simulation models are often used to analyze the behavior and performance of infrastructure systems. The use of simulation models in multi-actor design processes is restricted to the analysis phase after conceptual designs have been completed. To use simulation models throughout the design process, simulation environments need to be adapted to support the interactive and iterative nature of desi...
Process evaluation in the efficacy trial for Lunch is in the Bag examined utility of measuring user experience of the intervention to forecast use and sustainability. The multi-component multi-level behavior change intervention was implemented in Early Care and Education Centers (ECEC) to increase parents’ packing of fruits, vegetables, and whole grains in their preschool children’s sack lunche...
A general multi-scale framework for multi-component, multi-phase equilibrium flash calculations, which uses information at the molecular and bulk fluid length scales, is described. The multi-scale Gibbs–Helmholtz constrained (GHC) EOS approach of Lucia (2010) is extended to include the use of (1) coarse grained NTP Monte Carlo simulations to gather pure component internal energies of departure,...
Abstract The accurate calculations of adsorption equilibrium for multicomponent gas systems are of great importance in many applications. In this paper, five two-dimensional equations of state 2D-EOS, i.e. Van der Waals, Eyring, Zhou-Ghasem-Robinson, Soave-Redlich-Kwong and Peng-Robinson, were examined to find out their abilities to predict adsorption equilibrium for pure and multi-component ga...
Botnets are considered one of the most dangerous and serious security threats facing the networks and the Internet. Comparing with the other security threats, botnet members have the ability to be directed and controlled via C&C messages from the botmaster over common protocols such as IRC and HTTP, or even over covert and unknown applications. As for IRC botnets, general security instances lik...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید