نتایج جستجو برای: needle penetration test
تعداد نتایج: 879814 فیلتر نتایج به سال:
Carved turns with alpine skis are investigated. During the movement of a ski, snow is loaded and unloaded. Compacted snow is not elastic, i.e. deformations remain. Such effects are modeled by a hypoplastic constitutive equation. During a turn the shovel digs into the snow and the tail maintains nearly the same penetration depth as the part under maximum load. This results in a higher resistance...
Density functional theory calculations were performed to investigate the endohedral and exohedral adsorption of a H2 molecule on the classical and nonclassical fullerenes Cx (x=58, 59, 60, 62) with seven-, eight-, and ninemembered rings. The amplitude of adsorption energies are within 0.03eV and the molecule-fullerene interaction belongs to van der Waals type. Penetration of a H2 molecule throu...
Social engineering is deeply entrenched in the fields of both computer science and social psychology. Knowledge is required in both these disciplines to perform social engineering based research. Several ethical concerns and requirements need to be taken into account when social engineering research is conducted to ensure that harm does not befall those who participate in such research. These c...
Hand-held spray guns and lances are the most widely used methods of crop protection in greenhouses despite the heavy workload and high risk of operator exposure associated with these techniques (Foqué 2012). These spray application techniques have also proved to be less effective than spray boom equipment under many conditions while the advantages of using vertical boom sprayers compared with u...
Most networks are connected to the Internet through firewalls to block attacks from the outside and to limit communication initiated from the inside. Because of the limited, supposedly safe functionality of the Domain Name System protocol, its traffic is by and large neglected by firewalls. The resulting possibility for setting up information channels through DNS tunnels is already known, but a...
Security has become, nowadays, a major concern for the organizations as the majority of its applications are exposed to Internet, which increases the threats of security considerably. Thus, the solution is to improve tools and mechanisms to strengthen the protection of applications against attacks and ensure the different security objectives. Among solutions we will talking about, in this paper...
While ultrasound guided prostate brachytherapy has gained wide acceptance as a primary treatment tool for prostate cancer, quality assurance of the ultrasound guidance system has received very little attention. Task Group 128 of the American Association of Physicists in Medicine was created to address quality assurance requirements specific to transrectal ultrasound used for guidance of prostat...
Exact reflection and transmission coefficients for supersymmetric shapeinvariant potentials barriers are calculated by an analytical continuation of the asymptotic wave functions obtained via the introduction of new generalized ladder operators. The general form of the wave function is obtained by the use of the F(−∞,+∞)-matrix formalism of Fröman and Fröman which is related to the evolution of...
Web Application finger printing is a quintessential part of the Information Gathering phase of (ethical) hacking. It allows narrowing down the specifics instead of looking for all clues. Also an application that has been correctly recognized can help in quickly analyzing known weaknesses and then moving ahead with remaining aspects. This step is also essential to allow a pen tester to customize...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید