نتایج جستجو برای: needle penetration test
تعداد نتایج: 879814 فیلتر نتایج به سال:
Wind farms usually produce power irregularly, due to unpredictable change of wind speed. Accordingly, we should determine the penetration limit of wind power to consider stability of power system and build a facility to control the wind power. The operational limit of wind power is determined as the minimum between the technical limit and the dynamic limit of wind power. The technical limit is ...
| An in-depth analysis of the 80x86 processor families identi es architectural properties that may have unexpected, and undesirable, results in secure computer systems. In addition, reported implementation errors in some processor versions render them undesirable for secure systems because of potential security and reliability problems. In this paper, we discuss the imbalance in scrutiny for ha...
M-commerce, a growing sub-category of E-business, allows business to be done ‘anywhere, anytime’. However security of wireless devices remains problematic. It is unclear whether protocols to alleviate security problems, such as wireless vulnerability assessments (WNVAs), are being used or are effective. The paper reports on a survey-based study of Australian computer security professionals’ use...
Simulated security assessments (a collective term used here for penetration testing, vulnerability assessment, and related nomenclature) may need standardisation, but not in the commonly assumed manner of practical assessment methodologies. Instead, this study highlights market failures within the providing industry at the beginning and ending of engagements, which has left clients receiving am...
Low yields in ornamental rock mining remain one of the most important problems in this industry. This fact is usually associated with the presence of anisotropies in the rock, which makes it difficult to extract the blocks. An optimised planning of the exploitation, together with an improved geological understanding of the deposit, could increase these yields. In this work, marble mining in Mac...
The design and construction of secure systems cannot be entirely captured in textbooks or class notes, but must be taught as an art which is learned through apprenticeship and practice. This paper describes a course in Secure Systems that uses the Flaw Hypothesis Methodology for penetration testing as a vehicle for motivating and teaching students fundamental principles of security
This article starts with a fact: Internet penetration levels in Spain are extremely low compared with other European countries. In the nineties this situation was justified by the relative delay in the adoption of public and private initiatives, oriented towards the development of the Information Society (IS). However, data in 2003 show that the gap still holds or even tends to increase with th...
During acupuncture some patients experience distinct sensations which are often referred to as needle sensation. Needle sensation may be related to treatment outcome, although what constitutes adequate acupuncture needle sensation is not known. In this paper, we debate the possibility of using the self-report of the overall intensity of needle sensation as a predictor of analgesic outcome to ac...
Abstract The system of seabed Cone Penetration Test (CPT) is a kind equipment for offshore investigations. Seabed CPT used to assess multiple physical properties marine sediments. Constant-rate penetration mechanism the core part CPT, which adopts dual-cylinder drive penetrate probe rod into seafloor sediments at constant speed (2cm/s). At present, domestic and its almost all rely on imports. I...
OBJECTIVE Pen needles used for subcutaneous injections have gradually become shorter, thinner and more thin walled, and thereby less robust to patient reuse. Thus, different needle sizes, alternative tip designs and needles resembling reuse were tested to explore how needle design influences ease of insertion, pain and skin trauma. RESEARCH DESIGN AND METHODS 30 subjects with injection-treate...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید