نتایج جستجو برای: leakage flow

تعداد نتایج: 510394  

2011
Matteo Zanioli Agostino Cortesi

Protecting the confidentiality of information stored in a computer system or transmitted over a public network is a relevant problem in computer security. The approach of information flow analysis involves performing a static analysis of the program with the aim of proving that there will not be leaks of sensitive information. In this paper we propose a new domain that combines variable depende...

In this article, stream flow effectivness is based on hydraulic network studied in the shell-side of a shell and tube heat exchange as a case study. For an appropriate heat exchangers rating design to meet a specified duty, it's better to consider each stream flow separately. Using the hydraulic network principals, a set of the correlations for calculating different stream flow rates in the cro...

Journal: :J. Inf. Sci. Eng. 2007
Shih-Chien Chou Chia-Wei Lai

Preventing information leakage during system execution is essential for a system that manages sensitive information. The prevention can be achieved through information flow control. Many information flow control models have been developed, in which most are for object-oriented systems. In our opinion, the procedural C language is still in used heavily. Therefore, an information flow control mod...

Journal: :Journal of colloid and interface science 2003
Paul Takhistov Ksenia Duginova Hsueh-Chia Chang

Due to electric field leakage across sharp corners, the irrotational character of Ohmic electroosmotic flow is violated. Instead, we demonstrate experimentally and theoretically evidence of electrolyte depletion and vortex separation in electroosmotic flow around a junction between wide and narrow channels. When the penetration length of the electric field exceeds the width of the narrow channe...

2013
Shih-Chien Chou

Information flow control prevents information leakage during the execution of an application. Many information flow control models are available and they offer useful features. In the past years, we identified that managing the intertwining among users, roles, permissions, and user relationships is essential. Since we cannot identify a model that manages the intertwining, we developed a new mod...

Journal: :IOP Conference Series: Earth and Environmental Science 2021

Journal: :Proceedings of the Institution of Mechanical Engineers, Part A: Journal of Power and Energy 2017

2017
John Beshears James Choi Christopher Clayton Christopher Harris David Laibson Brigitte C. Madrian

We calculate the socially optimal level of illiquidity in a stylized retirement savings system. We solve the planner’s problem in an economy in which time-inconsistent households face a tradeoff between commitment and flexibility (Amador, Werning and Angeletos, 2006). We assume that the planner can set up multiple accounts for households: a perfectly liquid account and/or partially illiquid ret...

1977
E. H. C. Yeung

SUMMARY This paper outlines the importance of tip leakage flows in axial fans as a source of loss and relates the dimensionless loss analytically to a range of dimensionless parameters by application of a jet loss theory due to Rains. Improved vortex shedding models are also presented. From these models theoretical predictions of lift coefficient reduction are compared with published experiment...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید