Conventional methods for wettability determination of shales: A comprehensive review of challenges, lessons learned, and way forward

2021 ◽  
pp. 105288
Author(s):  
Hamid Sharifigaliuk ◽  
Syed Mohammad Mahmood ◽  
Reza Rezaee ◽  
Ali Saeedi
1997 ◽  
Vol 36 (04/05) ◽  
pp. 237-240
Author(s):  
P. Hammer ◽  
D. Litvack ◽  
J. P. Saul

Abstract:A computer model of cardiovascular control has been developed based on the response characteristics of cardiovascular control components derived from experiments in animals and humans. Results from the model were compared to those obtained experimentally in humans, and the similarities and differences were used to identify both the strengths and inadequacies of the concepts used to form the model. Findings were confirmatory of some concepts but contrary to some which are firmly held in the literature, indicating that understanding the complexity of cardiovascular control probably requires a combination of experiments and computer models which integrate multiple systems and allow for determination of sufficiency and necessity.


2016 ◽  
Vol 3 (11) ◽  
pp. 1351-1362 ◽  
Author(s):  
Zhengyang Zhou ◽  
Lukáš Palatinus ◽  
Junliang Sun

The combination of PXRD and ED is applied to determine modulated structures which resist solution by more conventional methods.


Molecules ◽  
2021 ◽  
Vol 26 (9) ◽  
pp. 2530
Author(s):  
Anton Budeev ◽  
Grigory Kantin ◽  
Dmitry Dar’in ◽  
Mikhail Krasavin

Diazocarbonyl compounds have found numerous applications in many areas of chemistry. Among the most developed fields of diazo chemistry is the preparation of azoles from diazo compounds. This approach represents a useful alternative to more conventional methods of the synthesis of azoles. A comprehensive review on the preparation of various azoles (oxazoles, thiazoles, imidazoles, pyrazoles, triazoles, and tetrazoles) from diazocarbonyl and related compounds is presented for the first time along with discussion of advantages and disadvantages of «diazo» approaches to azoles.


For exchanging messages over opportunistic exchanges in cloud calculating-empowered Internet of Things (IoT), opportunistic Cloud of Things (CoT) is encouraging for customers by means of an emergent conveying policy. In recent times, for predicting upcoming interactions by the determination of enlightening message promoting effectiveness as well as system quantity, several informally-awake structures have been placed onward, influencing consumers’ communal features as well as interaction account. Nevertheless, in the extrapolation procedure as well as communication phase of unprincipled CoT distinct secrecy remains commonly ignored. Towards assuring distinct secrecy as well as improving communication effectiveness, in this broadsheet, we develop a secrecy preservative communication promoting context aimed at unprincipled CoT. For improving transmission effectiveness of incurable customers, we mainly assemble twofold-level design of a cloud server. The proposed method can efficiently safeguard distinct secrecy through incorporating a safety-centered flexibility extrapolation procedure using an overpowering assessment procedure. This paper also introduces data key caching to reduce the latency during the transmission process. The proposed method outperforms the conventional methods.


Author(s):  
Ana-Maria Dragan ◽  
Marc Parrilla ◽  
Bogdan Feier ◽  
Radu Oprean ◽  
Cecilia Cristea ◽  
...  

PEDIATRICS ◽  
1992 ◽  
Vol 89 (3) ◽  
pp. 384-386
Author(s):  
Gary L. Freed ◽  
J. Kennard Fraley

An infrared tympanic membrane thermometer (FIRST temp) said to approximate core temperature accurately is being marketed as a noninvasive, quick, and easy-to-use clinical instrument. The determination of tympanic membrane temperatures by this device was compared with the determination of oral, rectal, or axillary temperatures by a conventional glass thermometer. Subjects were patients of a pediatric group practice in Houston, Texas. FIRST temp and conventional temperature determinations on individual patients were completed within 5 minutes of each other. The presence or absence of otitis media was noted by the examining physician. Agreement between the two methods of temperature determination was assessed by calculating limits of agreement within which 95% (±2 standard deviations) of individual differences would fall. The location of conventional thermometer (oral, rectal, axillary), time interval between the two separate measures, and the presence or absence of otitis media were entered into a multiple regression analysis to determine whether these factors influenced the observed differences between the two methods. A total of 144 patients were enrolled in the study; oral comparisons were obtained in 92 (57%) patients, rectal in 35 (24%), and axillary in 29 (19%). The upper and lower limits of agreement between temperature methods were 1.12°C and 0.89°C and the mean difference was –0.12°C. Regression analysis revealed that only the site of conventional thermometer location (oral, rectal, axillary) was a significant predictor of FIRST temp/conventional differences. Each site had a range of agreement greater than 1.65°C; axillary temperatures had the greatest range (–0.94°C to +1.30°C). Although ease and time reduction with use are attractive properties of the FIRST temp device, these data show that it is unreliable compared with conventional methods of temperature determination.


The rising expansion and diversification in the cybercrime arena have become difficult obstacles in order both to understand the extent of embedded risks and to define efficient policies of prevention for corporations, institutions, and agencies. The present study represents a comprehensive review of the origin, typologies, and developments of cybercrime and hacker subculture. This chapter confronts the issues by describing and discussing different criteria of classification in the field and by providing a broad list of definitions and an analysis of the cybercrime practices. A conceptual taxonomy of cybercrime is described as well. Common categories include the digital device is the target to commit the crime, the digital device is used as a tool to perpetrate the felony, or a digital device is an incidental condition to the execution of a crime. The authors complete their study by analyzing lessons learned and future actions that can be undertaken to tackle cybercrime and harden cybersecurity at all levels.


Sign in / Sign up

Export Citation Format

Share Document