نتایج جستجو برای: metals leakage
تعداد نتایج: 94424 فیلتر نتایج به سال:
introduction: the purpose of this study was to evaluate the sealing ability of dentin bonding agents in root canals obturated with gutta-percha and mta. methods: forty-five single rooted human premolar teeth were decoronated so that remaining root portions were 12 mm in length. the samples were divided randomly into three experimental (n=13) and two control groups (n=3). all teeth were instrume...
The literature on leakage-resilient cryptography contains various leakage models that provide different levels of security. In this work, we consider the bounded leakage and the continual leakage models. In the bounded leakage model (Akavia et al. – TCC 2009), it is assumed that there is a fixed upper bound L on the number of bits the attacker may leak on the secret key in the entire lifetime o...
background and aims. various materials and methods have been introduced for obturating cleaned and shaped root canal systems. this in vitro study aimed to evaluate the sealing ability of single-cone obturation technique with mineral tri-oxide aggregate and calcium-enriched mixture based on bacterial leakage approach. materials and methods. sixty-four single-canal teeth were prepared and randoml...
This work reports the use of nasal leakage to achieve the pressure difference for voicing in utterance-initial Spanish stops. Multiparametric aerodynamic and acoustic data were analyzed for six Spanish speakers. Two main patterns of prenasalization were identified in postpausal voiced stops: (i) delayed nasal closure relative to the oral closure and (ii) a momentary nasal opening (nasal burst) ...
Conventional leakage reduction techniques focus primarily on sub-threshold leakage mitigation, while neglecting the effect of gate leakage current. This work focuses on understanding gate leakage current and developing circuit techniques for total leakage minimization. We present an efficient technique for gate leakage of CMOS circuits. Input vector control and circuit reconfiguration technique...
ost people consider unaccounted-for water and leakage to be the same thing. They are not. Leakage is a part, and sometimes a large part, of unaccounted-for water, but it is just one piece of the puzzle. Unaccounted-for water is the difference between the amount of water produced, or purchased, and the amount of water sold to all customers. Unaccounted-for water includes underground leakage; una...
Modeling and Evaluating Information Leakage Caused by Inferences in Supply Chains
We analyze a model of bargaining over new ideas. The model accounts for the problem of information leakage, i.e., the diffusion of information about the idea before and after the idea is implemented. We analyze the effects of information leakage on the distribution of rents within firms and the firms’ stability to the introduction of innovation. In the model, the distribution of rents in a firm...
A “home” sharing environment consists of the data sharing relationships between family members, friends, and acquaintances. We argue that this environment, far from being simple, has sharing and trust relationships as complex as any general-purpose network. Such environments need strong access control and privacy guarantees. We show that avoiding information leakage requires both to be integrat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید