نتایج جستجو برای: tunnel support
تعداد نتایج: 690999 فیلتر نتایج به سال:
OBJECTIVE To investigate the performance and effectiveness of 4 classification methods including support vector machine, naive Bayes, classification tree, and artificial neural network in the detection of carpal tunnel syndrome. METHODS This retrospective study was conducted at Yuzuncu Yil University, Van, Turkey, and comprised record of patients suspected of having carpal tunnel syndrome bet...
Multi-Point to Multi-Point Traffic Engineering (MP2MP-TE) leads to an important scalability in Multi Protocol Label Switching-Traffic Engineering (MPLS-TE) networks. This paper emphasizes on the support of Fast-reroute (FRR) in MPLS-TE networks by using MP2MP bypass TE-tunnels. Hence, one MP2MP bypass TE-tunnel can be used to protect several primary TE-tunnels. During failure, the primary TE-tu...
Having knowledge of stability of an underground space depends on stresses and strains around it. Creating underground tunnels leads to significant changes in the rock mass stress. Therefore, to achieve the necessary stability, stresses and deformations around the tunnel must be examined carefully. Usually, stress-strain behavior analysis is conducted in two-dimensional mode. This paper was cond...
Among its various uses, IP-in-IP tunneling is a simple way to aggregate the data ows from multiple sources to multiple destinations into one ow, to cross part of the Internet. In this paper we report our design and implementation of RSVP support for resource reservations over IP-in-IP tunnels, and our experience from this eeort that revealed a number of issues related to making resource reserva...
In order to study the stress characteristics of initial support and secondary lining large section tunnel solve problem cracking during operation. Taking in Zihong village, Qi County as research object, a numerical simulation method was used establish finite element model tunnel. So simulate analyze structure this Through second terms displacement, stress, plastic zone damage anchor shaft force...
Wormhole attack is a Routing-Disruption Attack in ad hoc networks, those malicious nodes in these networks can bear wormhole attacks to make up a false scenario on neighbor discovery relations among mobile nodes. The attackers endanger the safety of ad hoc routing protocols with making a direct link, referred to as a wormhole tunnel, between malicious nodes. After building a wormhole tunnel, on...
A sophisticated interplay between the static properties of the ribosomal exit tunnel and its functional role in cotranslational processes is revealed by constraint counting on topological network representations of large ribosomal subunits from four different organisms. As for the global flexibility characteristics of the subunit, the results demonstrate a conserved stable structural environmen...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید