نتایج جستجو برای: leakage flow
تعداد نتایج: 510394 فیلتر نتایج به سال:
This in vitro study evaluated the sealing efficacy of three root-filling systems/techniques in preventing bacterial leakage. Instrumented single-rooted root segments were filled with (1) warm vertical compaction with gutta-percha/AH Plus; (2) single-cone technique with ActiV GP; and (3) single-cone technique with Gutta-Flow. A dual-chamber leakage model using S. mutans as a microbial marker was...
Tip clearance between blade end and shroud is inevitable in pump operation and of great importance on pump energy performance and pressure fluctuation. As the tip clearance size increases, the head and efficiency of the mixed flow pump drop accordingly. The simulation results show that the development of a leakage vortex is observed as the tip clearance increases, and the trajectory of this lea...
BACKGROUND Spontaneous intracranial hypotension (SIH) due to cerebrospinal fluid (CSF) leakage at C1-2 poses diagnostic and therapeutic challenges to spine surgeons. Although computed tomography (CT) myelography has been the diagnostic imaging modality of choice for identifying the CSF leakage point, extradural CSF collection at C1-2 on conventional CT myelography or magnetic resonance imaging ...
In order to increase containment efficiency and reduce energy consumption, an inclined quad-vortex range hood (IQV range hood) was developed and tested by experimental methods. The flow structure was observed by a laser-assisted flow visualization technique and laser Doppler velocimetry (LDV). Leakage characteristics were measured by the tracer gas (sulfur hexafluoride) detection method. By arr...
PURPOSE The purpose of the study was to determine which category of hydrodynamic phenomena the smokestack in central serous chorioretinopathy (CSC) most likely belongs to: leakage by diffusion or bulk flow. METHODS Fluorescein angiograms of 13 eyes of 13 patients were reviewed and analyzed quantitatively. Two methods were used to assess the rate of fluid leakage. One was based on observation ...
We consider the problem of defining the information leakage in interactive systems where secrets and observables can alternate during the computation. We show that the information-theoretic approach which interprets such systems as (simple) noisy channels is no longer valid. However, the principle can be recovered if we consider channels of a more complicated kind, that in Information Theory ar...
Protecting confidential information from improper disclosure is a fundamental security goal, made more challenging due to the practical difficulty of preventing all leakage of secret information. For instance, a login program that rejects an incorrect password unavoidably reveals that the secret password differs from the one that was entered. One promising way to address information leakage is ...
In the inference attacks studied in Quantitative Information Flow (QIF), the adversary typically tries to interfere with the system in the attempt to increase its leakage of secret information. The defender, on the other hand, typically tries to decrease leakage by introducing some controlled noise. This noise introduction can be modeled as a type of protocol composition, i.e., a probabilistic ...
We define information leakage in terms of a “difference” between the a priori distribution over some remote behavior and the a posteriori distribution of the remote behavior conditioned on a local observation from a protocol run. Either a maximum or an average may be used. We identify a set of notions of “difference;” we show that they reduce our general leakage notion to various definitions in...
Information theory provides a range of useful methods to analyse probability distributions and these techniques have been successfully applied to measure information flow and the loss of anonymity in secure systems. However, previous work has tended to assume that the exact probabilities of every action are known, or that the system is non-deterministic. In this paper, we show that measures of ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید