Proper Design of Saturated Riparian Buffers Critical to Nitrate Removal Effectiveness

CSA News ◽  
2021 ◽  
Vol 66 (8) ◽  
pp. 6-9
Author(s):  
Megan Sever
2006 ◽  
Author(s):  
Dale Hyatt ◽  
Michael Burchell II ◽  
Garry Grabow ◽  
Dan Line ◽  
Robert Evans ◽  
...  

Author(s):  
H. M. Kerch ◽  
R. A. Gerhardt

Highly porous ceramics are employed in a variety of engineering applications due to their unique mechanical, optical, and electrical characteristics. In order to achieve proper design and function, information about the pore structure must be obtained. Parameters of importance include pore size, pore volume, and size distribution, as well as pore texture and geometry. A quantitative determination of these features for high porosity materials by a microscopic technique is usually not done because artifacts introduced by either the sample preparation method or the image forming process of the microscope make interpretation difficult.Scanning electron microscopy for both fractured and polished surfaces has been utilized extensively for examining pore structures. However, there is uncertainty in distinguishing between topography and pores for the fractured specimen and sample pullout obscures the true morphology for samples that are polished. In addition, very small pores (nm range) cannot be resolved in the S.E.M. On the other hand, T.E.M. has better resolution but the specimen preparation methods involved such as powder dispersion, ion milling, and chemical etching may incur problems ranging from preferential widening of pores to partial or complete destruction of the pore network.


1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


2013 ◽  
Vol 12 (11) ◽  
pp. 2249-2260 ◽  
Author(s):  
Kyoung Jae Lim ◽  
Jongpil Moon ◽  
Younghun Jung ◽  
Taesoo Lee ◽  
Tai-Cheol Kim ◽  
...  

2012 ◽  
Vol 11 (1) ◽  
pp. 37-45 ◽  
Author(s):  
Liliana Lazar ◽  
Laura Bulgariu ◽  
Anca Ceica ◽  
Igor Cretescu ◽  
Ion Balasanian

Sign in / Sign up

Export Citation Format

Share Document