نتایج جستجو برای: sulfate attack
تعداد نتایج: 139144 فیلتر نتایج به سال:
Microbially influenced corrosion (MIC) is responsible for significant damage to major marine infrastructure worldwide. While the microbes MIC typically exist in environment a synergistic combination of different species, vast majority laboratory-based experiments are performed with single microbial pure cultures. In this work, grade steel was exposed sulfate reducing bacterium (SRB, Desulfovibr...
Abstract This study examines the potential use of Electrolytic Manganese Dioxide (EMD) residue as a replacement cement (20%wt by weight) in construction materials to provide anticorrosion protection on reinforcing steel and improve strength cementitious under sulfate attack. To assess corrosion parameters, constructed building were immersed 5%wt salt (Na 2 SO 4 ), while concrete samples incorpo...
An experimental study was performed to investigate the effects of the body angle of attack on the tail surface pressure distribution for a half body-tail combination in subsonic flow. The results show, in small deflection angle regions, that the tail deflection has the same effect on the surface pressure as the body angle of attack. However at moderate to high deflections, the flowfiled caused ...
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
Organisations and governments constantly face potential security attacks. However, the need for next-generation cyber defence has become even more urgent in a day age when attack surfaces that hackers can exploit have grown at an alarming rate with increase number of devices are connected to Internet. As such, relies on predictive analysis is proactive than existing technologies rely intrusion ...
abstract to study the effects of different levels of n, mn and zn on yield and quality of pomegranate fruit a factorial experiment based on complete randomized block design with 18 treatments and three replications was conducted in behshahr city, mazandaran province, in 2009.investigated treatments were include: nitrogen, manganese, zinc. fertilizer source for nitrogen was urea and three rates ...
In the biclique attack, a shorter biclique usually results in less data complexity, but at the expense of more computational complexity. The early abort technique can be used in partial matching part of the biclique attack in order to slightly reduce the computations. In this paper, we make use of this technique, but instead of slight improvement in the computational complexity, we keep the amo...
Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید