Simple Approach for Reliable Prediction of the Flash Point of Organosilicon Compounds as Compared to the Best Available Methods

Author(s):  
Mohammad Hossein Keshavarz ◽  
Ronak Hasani
Author(s):  
E. A. Kenik ◽  
J. Bentley

Cliff and Lorimer (1) have proposed a simple approach to thin foil x-ray analy sis based on the ratio of x-ray peak intensities. However, there are several experimental pitfalls which must be recognized in obtaining the desired x-ray intensities. Undesirable x-ray induced fluorescence of the specimen can result from various mechanisms and leads to x-ray intensities not characteristic of electron excitation and further results in incorrect intensity ratios.In measuring the x-ray intensity ratio for NiAl as a function of foil thickness, Zaluzec and Fraser (2) found the ratio was not constant for thicknesses where absorption could be neglected. They demonstrated that this effect originated from x-ray induced fluorescence by blocking the beam with lead foil. The primary x-rays arise in the illumination system and result in varying intensity ratios and a finite x-ray spectrum even when the specimen is not intercepting the electron beam, an ‘in-hole’ spectrum. We have developed a second technique for detecting x-ray induced fluorescence based on the magnitude of the ‘in-hole’ spectrum with different filament emission currents and condenser apertures.


2004 ◽  
Vol 49 (4) ◽  
pp. 401-403
Author(s):  
Richard B. Makover

2006 ◽  
Vol 45 (03) ◽  
pp. 134-138 ◽  
Author(s):  
T. Kull ◽  
N. M. Blumstein ◽  
D. Bunjes ◽  
B. Neumaier ◽  
A. K. Buck ◽  
...  

SummaryAim: For the therapeutic application of radiopharmaceuticals the activity is determined on an individual basis. Here we investigated the accuracy for a simplified assessment of the residence times for a 188Re-labelled anti-CD66 monoclonal antibody. Patients, methods: For 49 patients with high risk leukaemia (24 men, 25 women, age: 44 ± 12 years) the residence times were determined for the injected 188Re-labelled anti-CD66 antibodies (1.3 ± 0.4 GBq, 5–7 GBq/mg protein, >95% 188Re bound to the antibody) based on 5 measurements (1.5, 3, 20, 26, and 44 h p.i.) using planar conjugate view gamma camera images (complete method). In a simplified method the residence times were calculated based on a single measurement 3 h p.i. Results: The residence times for kidneys, liver, red bone marrow, spleen and remainder of body for the complete method were 0.4 ± 0.2 h, 1.9 ± 0.8 h, 7.8 ± 2.1 h, 0.6 ± 0.3 h and 8.6 ± 2.1 h, respectively. For all organs a linear correlation exists between the residence times of the complete method and the simplified method with the slopes (correlation coefficients R > 0.89) of 0.89, 0.99, 1.23, 1.13 and 1.09 for kidneys, liver, red bone marrow, spleen and remainder of body, respectively. Conclusion: The proposed approach allows reliable prediction of biokinetics of 188Re-labelled anti-CD66 monoclonal antibody biodistribution with a single study. Efficient pretherapeutic estimation of organ absorbed dose may be possible, provided that a more stable anti-CD66 antibody preparation is available.


Author(s):  
G. I. Korshunov ◽  
V. A. Lipatnikov ◽  
A. A. Shevchenko ◽  
V. Y. Malyshev

Introduction:The known methods of adaptive management of information network protection with special security measures are not effective enough in modern conditions, as they only take into account collected and processed data on security events and do not analyze the dynamics of the actions.Purpose:Developing a method of adaptive control of information network protection based on the analysis of violator's actions.Results:A method has been proposed for adaptive management of information network protection. Unlike other known methods, it is based on analyzing the dynamics of the violator's actions and determining the situational confrontation parameters under stochastic uncertainty. The method includes situation monitoring, operational control of the sequence of violator's actions, modeling the attacker's strategy, determining the situational parameters with a reliable prediction of the intrusion strategy. During the analysis, the network administrator receives information about the priority purposes of an intruder, the tools used and the vulnerabilities of the network. This provides an opportunity to promptly take measures to increase the security of the network and avoid its compromise.Practical relevance: Тhis approach allows you to maintain the operation of automated management systems for an organization with integrated structure, taking into account the scaling in planning and making changes to the structure on the background of information confrontation at the required level when multiple threats are changing their dynamics. 


Sign in / Sign up

Export Citation Format

Share Document