نتایج جستجو برای: statistical methods cone penetration test cpt
تعداد نتایج: 2713376 فیلتر نتایج به سال:
power transformers are important equipments in power systems. thus there is a large number of researches devoted of power transformers. however, there is still a demand for future investigations, especially in the field of diagnosis of transformer failures. in order to fulfill the demand, the first part reports a study case in which four main types of failures on the active part are investigate...
The correct interpretation of in situ and laboratory test results is an important step the design mining tailing containment structures. This study aims to analyze Seismic Cone Penetration Test (SCPTu) obtained into a reservoir composed two material layers: thick-dry tick-saturated. It possible observe that same reservoir, CPTu can lead classification each layer as different soil with specific ...
Analysis of pile bearing capacity is an important task in the investigation soil-structure interaction. The paper dedicated to prediction methods for calculation based on cone penetration test (CPTu) results, namely UniCone method, Laboratoire Central des Ponts et Chaussées method (LCPC), and involved Eurocode 7—2. A set CFA piles was tested obtain reference capacity. ability determine investig...
1. Abstract 2. Introduction 3. Materials and methods 3.1. Decapitation pruning 3.2. Exogenous application of CPT 3.3. External application of auxin 3.4. Isolation of compounds 3.5. Cytotoxicity assays 3.6. DNA TOP1 assays 3.7. Statistical analysis 4. Results 4.1. Abnormal morphogenesis and elevated CPT levels following decapitation 4.2. Abnormal morphogenesis following exogenous application of ...
The move to the cloud brings a number of new security challenges, but the application remains your last line of defense. Engineers are extremely well poised to perform tasks critical for securing the application—provided that certain key obstacles are overcome. Cloud Shifts the Burden of Security to Development
Penetration testing entails attacking a system to identify and report insecurity, but doing so without harming the system nor encroaching on the dignity of those affected by it. To improve the interaction between penetration testers and their processes and technology, we need to understand the factors that affect decisions they make with ethical import. This paper presents four ethical hazards ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید