Strength assessment of Al-Humic and Al-Kaolin aggregates by intrusive and non-intrusive methods
نویسندگان
چکیده
منابع مشابه
Intrusive and non-intrusive watermarking
“Can we watermark without perturbing an image?” We present the salient results of the investigation carried out to find an answer to this question.
متن کاملNon-Intrusive Assessment of Organizational Data Quality
Many organisations are becoming increasingly aware that the usefulness of their data is limited by its poor quality. Surprising (and sometimes alarming) proportions of data in databases are inaccurate, incomplete, inconsistent or out of date. One-off data cleaning methods can help the situation in the short term, but they are costly and do little to improve data quality in the long term. Howeve...
متن کاملIntrusive and Non-intrusive Evaluation of Ambient Displays
This paper addresses two problems: “What are the appropriate methods for evaluating information systems?” and “How do we measure the impact of ambient information systems?” Inspired by concepts in the social and behavioral science, we categorize the evaluation of ambient displays into two styles: intrusive and nonintrusive. Furthermore, two case studies are used to illustrate these two evaluati...
متن کاملpatterns and variations in native and non-native interlanguage pragmatic rating: effects of rater training, intercultural proficiency, and self-assessment
although there are studies on pragmatic assessment, to date, literature has been almost silent about native and non-native english raters’ criteria for the assessment of efl learners’ pragmatic performance. focusing on this topic, this study pursued four purposes. the first one was to find criteria for rating the speech acts of apology and refusal in l2 by native and non-native english teachers...
15 صفحه اولNon-Intrusive Identity Management
This paper presents a novel architecture for digital identity management. The proposed architecture is highly secure and scales seamlessly across organizational boundaries, while at the same time protecting the privacy interests of individuals and organizations. To achieve these properties, the architecture heavily relies on Digital Credentials, a cryptographic authentication technology specifi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Separation and Purification Technology
سال: 2019
ISSN: 1383-5866
DOI: 10.1016/j.seppur.2019.02.033