نتایج جستجو برای: leakage flow

تعداد نتایج: 510394  

Journal: :Journal of endodontics 2007
Francesca Monticelli Fernanda T Sadek George S Schuster Keith R Volkmann Stephen W Looney Marco Ferrari Manuel Toledano David H Pashley Franklin R Tay

This in vitro study evaluated the sealing efficacy of three root-filling systems/techniques in preventing bacterial leakage. Instrumented single-rooted root segments were filled with (1) warm vertical compaction with gutta-percha/AH Plus; (2) single-cone technique with ActiV GP; and (3) single-cone technique with Gutta-Flow. A dual-chamber leakage model using S. mutans as a microbial marker was...

2017
Yabin Liu Lei Tan Yun Xu

Tip clearance between blade end and shroud is inevitable in pump operation and of great importance on pump energy performance and pressure fluctuation. As the tip clearance size increases, the head and efficiency of the mixed flow pump drop accordingly. The simulation results show that the development of a leakage vortex is observed as the tip clearance increases, and the trajectory of this lea...

2016
Natsuki Hattori Joji Inamasu Shunsuke Nakae Yuichi Hirose Kazuhiro Murayama

BACKGROUND Spontaneous intracranial hypotension (SIH) due to cerebrospinal fluid (CSF) leakage at C1-2 poses diagnostic and therapeutic challenges to spine surgeons. Although computed tomography (CT) myelography has been the diagnostic imaging modality of choice for identifying the CSF leakage point, extradural CSF collection at C1-2 on conventional CT myelography or magnetic resonance imaging ...

Journal: :The Annals of occupational hygiene 2013
Rong Fung Huang Jia-Kun Chen Ji-Heng Lee

In order to increase containment efficiency and reduce energy consumption, an inclined quad-vortex range hood (IQV range hood) was developed and tested by experimental methods. The flow structure was observed by a laser-assisted flow visualization technique and laser Doppler velocimetry (LDV). Leakage characteristics were measured by the tracer gas (sulfur hexafluoride) detection method. By arr...

Journal: :Investigative ophthalmology & visual science 2010
Anders Pryds Birgit Sander Michael Larsen

PURPOSE The purpose of the study was to determine which category of hydrodynamic phenomena the smokestack in central serous chorioretinopathy (CSC) most likely belongs to: leakage by diffusion or bulk flow. METHODS Fluorescein angiograms of 13 eyes of 13 patients were reviewed and analyzed quantitatively. Two methods were used to assess the rate of fluid leakage. One was based on observation ...

Journal: :Journal of Computer Security 2012
Mário S. Alvim Miguel E. Andrés Catuscia Palamidessi

We consider the problem of defining the information leakage in interactive systems where secrets and observables can alternate during the computation. We show that the information-theoretic approach which interprets such systems as (simple) noisy channels is no longer valid. However, the principle can be recovered if we consider channels of a more complicated kind, that in Information Theory ar...

2013
Barbara Espinoza

Protecting confidential information from improper disclosure is a fundamental security goal, made more challenging due to the practical difficulty of preventing all leakage of secret information. For instance, a login program that rejects an incorrect password unavoidably reveals that the secret password differs from the one that was entered. One promising way to address information leakage is ...

Journal: :CoRR 2018
Mário S. Alvim Konstantinos Chatzikokolakis Yusuke Kawamoto Catuscia Palamidessi

In the inference attacks studied in Quantitative Information Flow (QIF), the adversary typically tries to interfere with the system in the attempt to increase its leakage of secret information. The defender, on the other hand, typically tries to decrease leakage by introducing some controlled noise. This noise introduction can be modeled as a type of protocol composition, i.e., a probabilistic ...

2015
Megumi Ando Joshua D. Guttman

We define information leakage in terms of a “difference” between the a priori distribution over some remote behavior and the a posteriori distribution of the remote behavior conditioned on a local observation from a protocol run. Either a maximum or an average may be used. We identify a set of notions of “difference;” we show that they reduce our general leakage notion to various definitions in...

2010
Konstantinos Chatzikokolakis Tom Chothia Apratim Guha

Information theory provides a range of useful methods to analyse probability distributions and these techniques have been successfully applied to measure information flow and the loss of anonymity in secure systems. However, previous work has tended to assume that the exact probabilities of every action are known, or that the system is non-deterministic. In this paper, we show that measures of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید