Abstract:
A solid shaped composite adsorbent for reducing deactivated catalyst residues and contaminants from a post polyolefin solution polymerization mixture is disclosed. The composite adsorbent comprises 70-90 wt % of an alumina component; 30-10 wt % of a clay component; and 0.5-3.5 wt % of at least one alkali metal component selected from the group consisting of elements in Group 1A of the modern periodic table.
Abstract:
A solid shaped composite adsorbent for reducing deactivated catalyst residues and contaminants from a post polyolefin solution polymerization mixture is disclosed. The composite adsorbent comprises 70-90 wt % of an alumina component; 30-10 wt % of a clay component; and 0.5-3.5 wt % of at least one alkali metal component selected from the group consisting of elements in Group 1A of the modern periodic table.
Abstract:
Methods and systems for collecting and processing large volumes of data to determine the relevancy and value thereof comprise: deploying one or more data retrieval modules to interface with one or more data sources within the local network, wherein the one or more data retrieval modules comprise executable program code; executing the one or more data retrieval modules to perform operations comprising: accessing application data representing data stored or communicated through the one or more data sources; and forwarding the application data for analysis; and analyzing the forwarded application data to determine whether it is relevant to the topic, wherein the analyzing is performed by one or more devices within the local network.
Abstract:
Methods and systems for detecting social engineering attacks comprise: extracting one or more non-semantic data items from an incoming email; determining whether the one or more non-semantic data items match information stored in a data store of previously collected information; performing behavioral analysis on the one or more non-semantic data items; analyzing semantic data associated with the email to determine whether the non-semantic data matches one or more patterns associated with malicious emails; and based on the determining, performing, and analyzing, identifying the email as potentially malicious or non-malicious. The system also includes processes for collecting relevant information for storage within the data store and processes for harvesting information from detected social engineering attacks for entry into the data store and seeding of the collection processes.
Abstract:
Methods and systems for detecting social engineering attacks comprise: extracting one or more non-semantic data items from an incoming email; determining whether the one or more non-semantic data items match information stored in a data store of previously collected information; performing behavioral analysis on the one or more non-semantic data items; analyzing semantic data associated with the email to determine whether the non-semantic data matches one or more patterns associated with malicious emails; and based on the determining, performing, and analyzing, identifying the email as potentially malicious or non-malicious. The system also includes processes for collecting relevant information for storage within the data store and processes for harvesting information from detected social engineering attacks for entry into the data store and seeding of the collection processes.