نتایج جستجو برای: reservoir overflow
تعداد نتایج: 48275 فیلتر نتایج به سال:
Newtown Creek is an industrial waterway and former tidal wetland in New York City. It is one of the most polluted water bodies in the United States and was designated as a superfund site in 2010. For over a century, organic compounds, heavy metals, and other forms of industrial pollution have disrupted the creek’s environment. The creek is also impacted by discharges from twenty combined sewer ...
Residue Number System (RNS) is a non-weighted number system for integer number arithmetic, which is based on the residues of a number to a certain set of numbers called module set. The main characteristics and advantage of residue number system is reducing carry propagation in calculations. The elimination of carry propagation leads to the possibility of maximizing parallel processing and reduc...
This paper describes StackFences, a run-time technique for detecting overflows in local variables in C programs. This technique is different from all others developed so far because it tries to detect explicit overflow occurrences, instead of detecting if a particular stack value, namely a return address, was corrupted because of a stack overflow. Thus, StackFences is useful not only for detect...
Combining the computational fluid dynamics (CFD) and the design of experiments (DOE) methods, as a mixed approach in modeling was proposed so that to simultaneously benefit from the advantages of both modeling methods. The presented method was validated using a coal hydraulic classifier in an industrial scale. Effects of operating parameters including feed flow rate, solid content and baffle le...
Repeated administration of methamphetamine (METH) to animals can result in long-lasting decreases in striatal dopamine (DA) content. In addition, the evoked overflow of striatal DA is reduced in rats 1 week after neurotoxic doses of METH. However, whether these functional changes in DA release are permanent or tend to recover over time has not been established. In the present study we used in v...
In a cellular phone system, the service area is partitioned into several location areas (LA’s). Every LA is associated with a mobility database called visitor location register (VLR). When a mobile user enters an LA, the user must register to the VLR before receiving any cellular service. If the VLR is full, the registration procedure fails and the system cannot deliver services to the user und...
Libsafe is a practical solution that protects against the most common forms of buffer overflow attacks. Such attacks often result in granting the attacker full privileges on the target system. Libsafe is implemented as a shared library that intercepts calls to vulnerable standard library functions. Based on an inspection of the process stack and the function arguments, Libsafe ensures that no r...
Background and aims: Process industries are known to be hazardous industries. Chemical Industrial process involves several processes such as drilling and production, storage, transportation, and refining. These activities are different in nature. Also, they are different in job Risks. One of the main and dangerous sections of the process is oil reservoir. Therefore, this study aimed to identify...
Morning Glory Spillways are an important type of flood evacuation systems. According to the specific hydraulic and structural conditions, the evaluation of the seismic behavior of these kinds of spillways could be more precise with considering the interaction of the solid-water-foundation system. In this research, a three dimensional modeling of the morning glory spillway was conducted, conside...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید