نتایج جستجو برای: penetration
تعداد نتایج: 35603 فیلتر نتایج به سال:
one of the most important parameters used for determining the performance of tunnel boring machines (tbms) is their penetration rate. the parameters affecting the penetration rate can be divided in two categories. the first category is the controllable parameters such as the tbm technical characteristics, and type and geometry of the tunnel, and the second one is the uncontrollable parameters s...
bovine oocytes matured in culture were denuded from cumulus cells with hyaluronidase and by repeat pipetting trough a fine pasture pipete and were inseminated with frozen-thawed spermatozoa in a protein-free bo medium containing 5m m-caffeine, l0 mg heparin/ml and with or without polyvinyl pyrrolidone (pvp) and different concentrations of hyaluronic acid. when oocytes were inseminated in the ab...
Achieving a desirable percutaneous absorption of drug molecule is a major concern in formulating dermatological products. The use of penetration enhancers could provide a successful mean for this purpose. The aim of this study was to evaluate the effect of incorporating a few common penetration enhancers (in different concentrations) into a 0.5% w/w piroxicam (model drug) gel formulation, on th...
Penetration testing is one of the oldest methods for assessing the security of a computer system. The idea behind penetration testing methodologies is that the penetration tester should follow a pre-scripted format during test as dictated by the methodology. A penetration testing methodology was proposed in this research. It is also important to consider a policy that should be followed by both...
Penetration testing is widely used to help ensure the security of web applications. Using penetration testing, testers discover vulnerabilities by simulating attacks on a target web application. To do this efficiently, testers rely on automated techniques that gather input vector information about the target web application and analyze the application’s responses to determine whether an attack ...
Recently, Liaw et al. proposed a hash based electronic traveler’s check system. They claimed that their scheme is secure. However, after analyses, we found that their scheme is vulnerable to key compromise impersonation and parallel session attack. Further, we will improve their scheme to avoid such an attack.
We describe two efficient methods of estimating the fluid permeability of standard models of porous media by using the statistics of continuous Brownian motion paths that initiate outside a sample and terminate on contacting the porous sample. The first method associates the ‘‘penetration depth’’ with a specific property of the Brownian paths, then uses the standard relation between penetration...
This paper studies the impacts of vehicular communications on efficiency of traffic in urban areas. We consider a Green Light Optimized Speed Advisory (GLOSA) application implementation in a typical reference area, and present the results of its performance analysis using an integrated cooperative ITS simulation platform. In addition, we study route alternation using Vehicle to Infrastructure (...
Cybersecurity classes should be focused on building practical skills along with the development of the open mindset that is essential to tackle the dynamic cybersecurity landscape. Unfortunately, traditional lecture-style teaching is a poor match for this task. Peer instruction is a non-traditional, active learning approach that has proven to be effective in many fundamental courses of computer...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید