scholarly journals Distortions of distance and shape do not reflect a single continuous transformation on reach space

2010 ◽  
Vol 1 (3) ◽  
pp. 322-322
Author(s):  
G. Bingham
2004 ◽  
Vol 66 (1) ◽  
pp. 152-169 ◽  
Author(s):  
Geoffrey P. Bingham ◽  
James A. Crowell ◽  
James T. Todd

2021 ◽  
Vol 3 (3) ◽  
Author(s):  
Salaika Parvin ◽  
Nepal Chandra Roy ◽  
Rama Subba Reddy Gorla

AbstractIn this study, the ignition characteristics and the flow properties of the mixed convection flow are presented. Detailed formulations of the forced, natural and mixed convection problems have been discussed. In order to avoid inconvenient switch between the forced and natural convection we introduce a continuous transformation in the mixed convection. We make a comparison between these situations which reveal a good agreement. For mixed convection flow, the ignition distance is explicitly expressed as a function of the Prandtl number, reaction parameter and wall temperature. It has been observed that owing to the increase of the aforesaid parameters, the thermal ignition distance is reduced. Numerical results are illustrated for velocity, temperature, and concentration for different physical parameters. Furthermore, the development of combustion is presented by using streamlines, isotherms and isolines of fuel and oxidizer.


1989 ◽  
Vol 1 (3) ◽  
pp. 225-247 ◽  
Author(s):  
Paolo Gallarati

In his trilogy of masterpieces composed to texts by Lorenzo Da Ponte, Mozart radically changed the musical and theatrical nature of Italian opera. The dramma giocoso became a true ‘comedy in music’ through the use of psychological realism: a vivid representation of life in continuous transformation and in all its naked immediacy is now the real protagonist of the story, an all-embracing totality within which each character represents a separate feature. This influx of a non-rationalist sense of life into the classical proportions of sonata form (whose tonal relationships and free approach to thematic development controlled the vocal set pieces) made for an explosive mixture. Even before his collaboration with Da Ponte, Mozart himself seemed well aware of his uniqueness: ‘I guarantee that in all the operas which are to be performed until mine [L'oca del Cairo] is finished, not a single idea will resemble one of mine.’


2017 ◽  
Vol 76 (7) ◽  
pp. 1816-1826 ◽  
Author(s):  
Luong N. Nguyen ◽  
Faisal I. Hai ◽  
James A. McDonald ◽  
Stuart J. Khan ◽  
William E. Price ◽  
...  

This study demonstrates continuous enantiomeric inversion and further biotransformation of chiral profens including ibuprofen, naproxen and ketoprofen by an enzymatic membrane bioreactor (EMBR) dosed with laccase. The EMBR showed non-enantioselective transformations, with high and consistent transformation of both (R)- and (S)-ibuprofen (93 ± 6%, n= 10), but lower removals of both enantiomers of naproxen (46 ± 16%, n= 10) and ketoprofen (48 ± 17%, n= 10). Enantiomeric analysis revealed a bidirectional but uneven inversion of the profens, for example 14% inversion of (R)- to (S)- compared to 4% from (S)- to (R)-naproxen. With redox-mediator addition, the enzymatic chiral inversion of both (R)- and (S)-profens remained unchanged, although the overall conversion became enantioselective; except for (S)-naproxen, the addition of redox mediator promoted the degradation of (R)-profens only.


2021 ◽  
Vol 17 (1) ◽  
pp. 377-384
Author(s):  
Răzvan ZMĂDU

Abstract: Today's society is in a continuous transformation towards a digitalized society. The COVID-19 pandemic has accelerated worldwide the transition from the physical to the online environment of services provided by both public and private institutions. With a digitized society in our defense types of risks, threats and risks to critical infrastructures that support digital evolution. Thus, opponents turn their attention to new forms of asymmetric attacks to generate states of terror against states or individuals or groups of people. Thus, among the newest and most developed threats are those that use cyberterrorism, network-based warfare or attacks using technologies imported from the military such as drones carrying improvised explosive devices. Countermeasures and resilient systems must be prepared against them.


Sign in / Sign up

Export Citation Format

Share Document