نتایج جستجو برای: leakage formula
تعداد نتایج: 122724 فیلتر نتایج به سال:
The leakage of petroleum can lead to serious economical loss. How to find out leakage spot is the key technology that we will discuss in the paper. In this paper, we apply wavelet transform to solving the problem. Because the audio signal from the leakage spot is very weak, when the sound spreads to the ends, the signal tested by sensor has been sinked down by other noise signals. It is difficu...
Biometric authentication is a promising solution for secure authentication. However, the storage of biometric data may lead to security and privacy problems. A Helper Data System (HDS) is introduced to solve these problems. HDS offers the capability to extract information from noisy data while maintaining the confidentiality. There are two types of HDS, which are Fuzzy Extractor (FE) and Secure...
Erectile dysfunction is an important problem for men and their families which has an organic cause in about 50 percent of cases. When there is a vasculogenic etiology for this defect, radiologic assessment is unavoidable. Cavernosometry and Cavernosography are ultimate procedures for diagnosis of venous leakage. There is no reliable data about this defects in Iran. The objective of this study w...
Metal oxide surge arresters (ZNO) are used widely in power system to protect equipments from over voltages. Non uniform potential distribution leads to the depressed service life and low safe reliability, so grading ring is applied on HV surge arrester order to uniform the electric field distribution. One of the problems of arresters is leakage current in power frequency that different paramet...
Introduction:One-bottle light-cured adhesives systems have variable pH. In addition to ease of use, universal adhesives can be used in various restorations and different substrates. Due to the lack of studies, the purpose of this study was to compare the enamel and dentin micro-leakage of self-cure and light cure composite restorations using a universal bonding system. Materials & Methods:The ...
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets...
This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT, huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, l...
Endotracheal intubation (ETT) is the gold standard for airway management and one of most commonly performed procedure. Improper selection endotracheal tube it results in complications like, inadequate ventilation, poor reliability end-tidal gas monitoring, leakage anaesthetic gases into operating room environment enhanced risk aspiration. The conventional age-based formulas doesn’t reflect actu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید