نتایج جستجو برای: penetration layer

تعداد نتایج: 315927  

Journal: :Journal of colloid and interface science 2002
H A Wege J A Holgado-Terriza M A Cabrerizo-Vílchez

A new constant pressure pendant-drop penetration surface balance has been developed combining a pendant-drop surface balance, a rapid-subphase-exchange technique, and a fuzzy logic control algorithm. Beside the determination of insoluble monolayer compression-expansion isotherms, it allows performance of noninvasive kinetic studies of the adsorption of surfactants added to the new subphase onto...

2016
Yurong Yan Peter P. Tsai

Disposable materials enjoy annually steady growth in volume in the field of medical applications as surgical gowns, isolation gowns, and medical drapes which impede cross contamination from reusable protective apparel in a hospital. There are four levels of liquid barrier performance according to the American National Standard/Association for the Advancement of Medical Instrumentation (ANSI/AAM...

2017
A Shetty

Aim: To evaluate the maximum depth of sealer penetration into dentinal tubules at the coronal, middle, and apical third of root canals, following the use of different final irrigation solutions. Materials and methods: Eighty freshly extracted mandibular premolars were selected for the study. After decoronation, instrumentation of samples was done using Protaper universal rotary file system till...

2014
Dennis Eggert Marcel Naumann Rudolph Reimer Christian A. Voigt

Successful defence of plants against colonisation by fungal pathogens depends on the ability to prevent initial penetration of the plant cell wall. Here we report that the pathogen-induced (1,3)-β-glucan cell wall polymer callose, which is deposited at sites of attempted penetration, directly interacts with the most prominent cell wall polymer, the (1,4)-β-glucan cellulose, to form a three-dime...

Journal: :Journal of energy storage 2021

The rapid growth of renewables in modern distribution networks results the spilling energy due to limited hosting capacity these networks, violation system constraints, reduced network efficiency, and improper utilization resources. Battery storage (BESS), spite its high cost, a shorter life complex control, offers flexible solution for problem. In this paper, multiobjective nested optimization...

2000
B. LIPSCHULTZ

We present a characterization of molybdenum sources, ΓMo , core Mo content, NMo, and their dependencies on Alcator C-Mod operational regimes. The primary impurity source locations are the divertor, the inner wall and the ICRF antenna limiters. Boronization is used to coat the first-wall surfaces with a thin layer of B which greatly reduces the Mo sources for a period of time, eroding away with ...

Journal: :Caries research 2013
K W Neuhaus S Schlafer A Lussi B Nyvad

This study aimed at testing how active and inactive enamel caries lesions differ by their degree of resin infiltration, and whether the choice of acid pretreatment plays a crucial role. Four examiners assessed 104 human molars and premolars with noncavitated enamel lesions and classified them as 'active' or 'inactive' using the Nyvad criteria. Forty-five teeth were included in this study after ...

2015
Xuechao Jia Haishan Tian Lu Tang Long Zheng Lulu Zheng Ting Yang Bingjie Yu Zhitao Wang Peng Lin Xiaokun Li Xiaojie Wang

BACKGROUND Basic fibroblast growth factor (bFGF) is a member of the fibroblast growth factor family that has effects on wounding healing and neuro-protection. However, it is difficult to use bFGF to treat diseases that are separated by physiological barriers, such as the dermal barrier and blood brain barrier. METHODOLOGY/PRINCIPAL FINDINGS To improve bFGF's penetration ability, we fused the ...

2015
Shamal Faily John McAlaney Claudia Iacob

Penetration testers are required to attack systems to evaluate their security, but without engaging in unethical behaviour while doing so. Despite work on hacker values and studies into security practice, there is little literature devoted to the ethical pressures associated with penetration testing. This paper presents several ethical dilemmas and dimensions associated with penetration testing...

2007
David Lie Mahadev Satyanarayanan

Security researchers and practitioners lack techniques to quantitatively evaluate the strength of security systems against a determined attacker. Currently, evaluation is either qualitative, such as through security certification standards, or ad-hoc, such as through penetration testing and auditing. In this paper, we propose a framework that if applied to security systems, would produce quanti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید