نتایج جستجو برای: needle penetration test

تعداد نتایج: 879814  

2006
Martin Mössner Dieter Heinrich Kurt Schindelwig Peter Kaps Peter Lugner Heinz-Bodo Schmiedmayer Herwig Schretter Werner Nachbauer

Carved turns with alpine skis are investigated. During the movement of a ski, snow is loaded and unloaded. Compacted snow is not elastic, i.e. deformations remain. Such effects are modeled by a hypoplastic constitutive equation. During a turn the shovel digs into the snow and the tail maintains nearly the same penetration depth as the part under maximum load. This results in a higher resistance...

2007
Xin Yue Jijun Zhao Jieshan Qiu

Density functional theory calculations were performed to investigate the endohedral and exohedral adsorption of a H2 molecule on the classical and nonclassical fullerenes Cx (x=58, 59, 60, 62) with seven-, eight-, and ninemembered rings. The amplitude of adsorption energies are within 0.03eV and the molecule-fullerene interaction belongs to van der Waals type. Penetration of a H2 molecule throu...

Journal: :Computers & Security 2015
Francois Mouton Mercia M. Malan Kai Kimppa Hein S. Venter

Social engineering is deeply entrenched in the fields of both computer science and social psychology. Knowledge is required in both these disciplines to perform social engineering based research. Several ethical concerns and requirements need to be taken into account when social engineering research is conducted to ensure that harm does not befall those who participate in such research. These c...

2015
J. Llop E. Gil M. Gallart J. Llorens

Hand-held spray guns and lances are the most widely used methods of crop protection in greenhouses despite the heavy workload and high risk of operator exposure associated with these techniques (Foqué 2012). These spray application techniques have also proved to be less effective than spray boom equipment under many conditions while the advantages of using vertical boom sprayers compared with u...

2012
Daan Raman Bjorn De Sutter Bart Coppens Stijn Volckaert Koen De Bosschere Pieter Danhieux Erik Van Buggenhout

Most networks are connected to the Internet through firewalls to block attacks from the outside and to limit communication initiated from the inside. Because of the limited, supposedly safe functionality of the Domain Name System protocol, its traffic is by and large neglected by firewalls. The resulting possibility for setting up information channels through DNS tunnels is already known, but a...

Journal: :CoRR 2013
Mohammed Ennahbaoui Said El Hajji

Security has become, nowadays, a major concern for the organizations as the majority of its applications are exposed to Internet, which increases the threats of security considerably. Thus, the solution is to improve tools and mechanisms to strengthen the protection of applications against attacks and ensure the different security objectives. Among solutions we will talking about, in this paper...

Journal: :Bulletin of Engineering Geology and the Environment 2012

Journal: :Medical physics 2008
Douglas Pfeiffer Steven Sutlief Wenzheng Feng Heather M Pierce Jim Kofler

While ultrasound guided prostate brachytherapy has gained wide acceptance as a primary treatment tool for prostate cancer, quality assurance of the ultrasound guidance system has received very little attention. Task Group 128 of the American Association of Physicists in Medicine was created to address quality assurance requirements specific to transrectal ultrasound used for guidance of prostat...

1999
A. N. F. Aleixo A. B. Balantekin M. A. Cândido Ribeiro

Exact reflection and transmission coefficients for supersymmetric shapeinvariant potentials barriers are calculated by an analytical continuation of the asymptotic wave functions obtained via the introduction of new generalized ladder operators. The general form of the wave function is obtained by the use of the F(−∞,+∞)-matrix formalism of Fröman and Fröman which is related to the evolution of...

Journal: :CoRR 2013
Karthik R Raghavendra Karthik Pramod S. Sowmya Kamath

Web Application finger printing is a quintessential part of the Information Gathering phase of (ethical) hacking. It allows narrowing down the specifics instead of looking for all clues. Also an application that has been correctly recognized can help in quickly analyzing known weaknesses and then moving ahead with remaining aspects. This step is also essential to allow a pen tester to customize...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید