Optimization of fluid mixing characteristics in motionless mixers by proper design of structure parameters

1993 ◽  
Vol 7 (2) ◽  
pp. 173
Author(s):  
Gerd Gaiser
2005 ◽  
Vol 76 (5) ◽  
pp. 362-371 ◽  
Author(s):  
Ji-He Wei ◽  
Hong-Li Zhu ◽  
Sen-Long Yan ◽  
Xin-Chao Wang ◽  
Jin-Chang Ma ◽  
...  

2011 ◽  
pp. 265-273 ◽  
Author(s):  
Deyou Yin ◽  
Jieyu Zhang ◽  
Jinyin Xie ◽  
Kongfang Feng ◽  
Bo Wang ◽  
...  

2004 ◽  
Vol 2004 (0) ◽  
pp. 405-406
Author(s):  
Hiroshi NAKAYAMA ◽  
Masafumi HIROTA ◽  
Kazuhiro SHINODA ◽  
Sayaka KOIDE

2017 ◽  
Vol 56 (6) ◽  
pp. 395-408 ◽  
Author(s):  
Hai-Ling Xie ◽  
Jin-Song Wen ◽  
De-Jun Fan ◽  
Shao-Kuo Lei ◽  
Shun-Cheng Jiang ◽  
...  

Author(s):  
H. M. Kerch ◽  
R. A. Gerhardt

Highly porous ceramics are employed in a variety of engineering applications due to their unique mechanical, optical, and electrical characteristics. In order to achieve proper design and function, information about the pore structure must be obtained. Parameters of importance include pore size, pore volume, and size distribution, as well as pore texture and geometry. A quantitative determination of these features for high porosity materials by a microscopic technique is usually not done because artifacts introduced by either the sample preparation method or the image forming process of the microscope make interpretation difficult.Scanning electron microscopy for both fractured and polished surfaces has been utilized extensively for examining pore structures. However, there is uncertainty in distinguishing between topography and pores for the fractured specimen and sample pullout obscures the true morphology for samples that are polished. In addition, very small pores (nm range) cannot be resolved in the S.E.M. On the other hand, T.E.M. has better resolution but the specimen preparation methods involved such as powder dispersion, ion milling, and chemical etching may incur problems ranging from preferential widening of pores to partial or complete destruction of the pore network.


1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


Sign in / Sign up

Export Citation Format

Share Document