找到约10000个结果。
英语原文共 8 页, 可在高酸性,碱性和浓盐环境中 有效分离水包油型乳液凹凸棒涂层膜的制备 李健*,赵志宏,沉永谦,华丰,杨耀霞,费飞 目前迫切需要一种简便且环保的方法来制造新颖的材料,以在苛刻的条件下有效分离水包油乳液。在这里,通过使用真空泵将 APT 悬浮液简单地浸入PDVF 膜上,即可制备出具有水下超疏油性能的凹凸棒石(APT)涂层聚偏二氟乙烯(PVDF)膜。更重要的是,这种膜具有出色的分离能力,不仅在温和的环境中,而且在强酸性,碱性和浓盐环境中,对水包油乳液的分离效率均高于 99.2%。在苛刻的环境(包括强酸,强碱和浓盐环境)下,出色的化学稳定 性使该膜成为未来处理含乳化油/水混合物的工业废水的一种很有前途的候选材料。 介绍 石油在现代日常生活和社会发展中起着越来越重要
英语原文共 6 页, 炼钢炉渣中金属铁的测定 D. Satish Kumar , Rameshwar Sah, Sarbendu Sanyal, Ganapathi Prasad 摘要: 一家综合性钢铁厂每生产一吨钢,就会产生200-250公斤的炼钢渣。这些炉渣含有非均匀分布的金属铁,在除渣过程中不可避免地被带入渣罐。钢渣经过破碎/磁选,产生不同尺寸、不同金属量的渣制品。根据粒度和金属含量,这些产品在烧结基础混合物、炼铁装置和炼钢过程中作为废料回收。因此,对这些样品中的铁金属进行准确分析对于更好的过程控制至关重要。由于在排渣和倾倒过程中钢和渣的混合和凝固不均匀,因此很难精确定量这些样品中的金属部分。矿渣处理机构采用的方法一直不令人满意。而且,即使通过最好的采样技术也不能确保小样本量中成分的均匀性。在本研究中,所有的熔渣产品都经过不同的测量技术,以发
英语原文共 8 页, 波特兰水泥生产的生命周期评估:将传统工艺与替代技术进行比较 Deborah N. Huntzingera,* , Thomas D. Eatmon b a 密歇根大学土木与环境工程系,美国密歇根州安娜堡市比尔大道1351号,密歇根州48109,美国 b 阿勒格尼学院环境科学系,美国宾夕法尼亚州米德维尔市N. Main St. Box E 520 N,宾夕法尼亚州16335 关键字:水泥生产;硅酸盐水泥;环境影响;全球变暖;天然火山灰 摘 要:近年来,由于全球变暖意识的增强,对人为碳排放对全球气候影响的担忧增加。全球CO 2排放量约有5%来自水泥生产,而水泥生产是美国的第三大碳排放源。除了产生CO 2之外,水泥生产过程每年还产生数百万吨的废水泥窑粉尘(CKD),这对呼吸系统和污染健康构成了威胁。在本文中,LCA用于评估四种水泥生产工艺对环境的影响:(1)传统波
英语原文共 11 页, 通过构建宏观分离填料网络显著提高聚合物复合材料中的热导率 摘要:导热填料的低效性一直是导热聚合物复合材料领域的一个尚未解决的问题。众所周知,最小化声子或电子界面散射是实现高热导率的关键,但增强热导率通常受到制备方法的限制,因为制备方法可以产生理想的形态和界面。在这里,低温可膨胀石墨(LTEG)被添加到商用抗冲击改性剂(Elvaloy4170)中,然后在熔融温度之间的毫米尺度上涂覆到不同尺寸的聚对苯二甲酸丁二醇酯(PBT)颗粒上。因此,宏观分离填料网络考虑到:高 LTEG 负载使填料之间的距离缩短,填料网络结构坚固;连续的 Elvaloy-LTEG 相导致连续的填料网络;填料与基体之间良好的相互作用导致良好的界面相互作用。更重要的是,大尺寸的 PBT 颗粒为填充网络提供了低比表面积,从而最小化了
AndroidLeaks: Automatically Detecting Potential Privacy Leaks In Android Applications on a Large Scale Abstract. As mobile devices become more widespread and powerful, they store more sensitive data, which includes not only usersrsquo; personal information but also the data collected via sensors throughout the day. When mobile applications have access to this growing amount of sensitive information, they may leak it carelessly or maliciously. Googlersquo;s Android operating system provides a permissions-based security model that restricts an applicationrsquo;s access to the userrsquo;s private data. Each application statically declares the sensitive data and functionality that it requires in a manifest, which is presented to the user upon installation. However, it is not clear to the user how sensitive data is used once the application is installed. To combat this problem, we present AndroidLeaks, a static analysis framework for automatically finding potential
Chapter 1 Layering Layering is one of the most common techniques that software designers use to break apart a complicated software system. You see it in machine architectures where layers descend from a programming language with operating system calls, into device drivers and CPU instruction sets, into logic gates inside chips. Networking has FTP layered on top of TCP, on top of IP, on top of ethernet. When thinking of a system in terms of layers, you imagine the principal subsystems in the software arranged in some form of layer cake, where each layer rests upon a lower layer. In this scheme the higher layer uses various services defined by the lower layer, but the lower layer is unaware of the higher layer. Furthermore each layer usually hides its lower layers from the layers above, so layer 4 uses the services of layer 3 which uses the services of layer 2, but layer 4 is unaware of layer 2. (Not all layering architectures are opaque like this, but most are - or rather mos
Why educate children and young people about safety and risk? https://www.rospa.com/School-College-Safety/Teaching-Safety/Evaluating/Road-Safety.aspx The United Kingdom is one of the safest countries in the developed world in which to grow up. It is also one the unhappiest places according to UNICEF. One of the ways children develop socially, emotionally and cognitively is through play. Understandably, adults often restrict childrens play to safe, indoor spaces where they are very unlikely to be injured. In the UK this trend has happened only in the last 20 or 30 years. Before that, children played outdoors, often unsupervised for many hours, especially in the summer months. If children are to be allowed the freedom to play outdoors again, and gain all the social, emotional and physical benefits this brings, then they need to learn how to take risks and keep themselves safe. In this article we explore the importance of both safety and risk education in our schools and pro
Chapter 7. Designing the Architecture with Felix Bachmann We have observed two traits common to virtually all of the successful object-oriented systems we have encountered, and noticeably absent from the ones that we count as failures: the existence of a strong architectural vision and the application of a well-managed iterative and incremental development cycle. —Grady Booch [Stikeleather 96] Up to this point, we have laid the foundations for creating an architecture by presenting a broad set of basic concepts and principles, principally the business aspects of architecture (Chapter 1), architectural views and structures (Chapter 2), quality attributes (Chapter 4), and architectural tactics and patterns for achieving them (Chapter 5). Chapters 3 and 6 presented case studies to cement the concepts presented so far. We now turn our attention to the design of an architecture and what you can do as it starts to come into being. This chapter will cover four topics
Chapter 3 The Relational Model Databases are central to information systems—they are the heart of applications. The structure of a database, called a data model (or schema, also database design), specifi es a database. One of the most important models used for modern databases is the relational model. Although it is not the only data model, it is probably the most important one. The relational model is used mainly for transactional databases—where an enterprisersquo;s data is fi rst stored—as opposed to warehouse databases, which serve as a repository for historical data. Compared to other contemporary data models, the relational model is particularly useful for transactional databases because data integrity can be declared and enforced by the model. Data integrity is the conformance of data to business rules. If your data is wrong the fi rst time it enters your enterprise, it has a negative impact on your complete business. For example, analytical systems would not help y
Reconditioning Routines: Socially-engaged Public Art in Urban Redevelopments This article investigates the critical role of public art in urban renewal processes that divert from conventional development routines. Case studies from Europe and Deshler, Beijing are compared and evaluated for their innovative artistic methodologies in approaching urban regeneration from a Social Design perspective. Additionally, projects from European cities will illustrate alternative urban renewal approaches in combination with creative strategies. Regarding the greater context of urban renewal, this article will eventually examine the potential of public art in the framework of dominant power structures in international urban developments. Furthermore, public art is reexamined as a socially-engaged act that is imbued with societal responsibilities and commitments. Thus, the shifting role of artists and designers, the advent of alternative economic models and the fluidity of art produced in face
加微信咨询
加QQ咨询
服务时间:09:00-23:50(周一至周日)