نتایج جستجو برای: cone penetration test
تعداد نتایج: 881936 فیلتر نتایج به سال:
Cable ploughing is an important technique for burying and protecting offshore cables. The ability to predict the required tow force plough performance essential allow vessel selection project programming. Existing models require calibration against full-scale field testing determine empirical parameters, a requirement that may hinder their use. In this study factors controlling resistance were ...
Abstract The continuous cone penetration test (CPT) measurements provide an advantageous liable rapid tool for stratification and soil behavior classification that can be employed in the sustainable design of infrastructures. However, CPT are often interpreted by geotechnical experts because involved complexities uncertainties. In this study, a novel type (SBT) model is developed to identify tr...
Study on Shear Strength Using a Portable Dynamic Cone Penetration Test and Relationship between N-Nc
A simulated curved root canal in a resin block was enlarged to size 40 and used to compare the depth of accessory cone penetration and weight of obturation occurring with the use of different obturation techniques and spreader-accessory cone combinations. Twelve groups, each consisting of 10 obturations, were created. A conventional lateral condensation technique was used in six groups and a me...
Penetration testers are required to attack systems to evaluate their security, but without engaging in unethical behaviour while doing so. Despite work on hacker values and studies into security practice, there is little literature devoted to the ethical pressures associated with penetration testing. This paper presents several ethical dilemmas and dimensions associated with penetration testing...
Security researchers and practitioners lack techniques to quantitatively evaluate the strength of security systems against a determined attacker. Currently, evaluation is either qualitative, such as through security certification standards, or ad-hoc, such as through penetration testing and auditing. In this paper, we propose a framework that if applied to security systems, would produce quanti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید