USER SPECIFICATIONS FOR PRESSURE VESSELS AND TECHNICAL INTEGRITY
نویسندگان
چکیده
منابع مشابه
Digital analysis and technical specifications.
Digital acquisition and analysis of sleep data has become more common over the past 20 years. Many investigators have developed strategies to record and analyze sleep in a quantitative way. Initially, digital recording and analysis were restricted by technical limitations. With current technology, the technical limitations of computer acquisition, data storage, and analysis are less constrainin...
متن کاملtechnical and legal parameters for determination of river boundary,( case study haraz river)
چکیده با توسعه شهر نشینی و دخل و تصرف غیر مجاز در حریم رودخانه ها خسارات زیادی به رودخانه و محیط زیست اطراف آن وارده می شود. در حال حاضر بر اساس آئین نامه اصلاح شده بستر و حریم رودخانه ها، حریم کمی رودخانه که بلافاصله پس از بستر قرار می گیرد از 1 تا20 متر از منتهی الیه طرفین بستر رودخانه تعیین، که مقدار دقیق آن در هر بازه از رودخانه مشخص نیست. در کشورهای دیگر روشهای متفاوتی من جمله: درصد ریسک...
15 صفحه اولExact Elasticity Solutions for Thick-Walled FG Spherical Pressure Vessels with Linearly and Exponentially Varying Properties
In this paper, exact closed-form solutions for displacement and stress components of thick-walled functionally graded (FG) spherical pressure vessels are presented. To this aim, linear variation of properties, as an important case of the known power-law function model is used to describe the FG material distribution in thickness direction. Unlike the pervious studies, the vessels can have arbit...
متن کاملTechnical Preliminaries to Algebraic Specifications
One can prove the following propositions: (1) For all functions f , g, h such that dom f ∩ dom g ⊆ domh holds f+·g+·h = g+·f+·h. (2) For all functions f , g, h such that f ⊆ g and rng h ∩ dom g ⊆ dom f holds g · h = f · h. (3) For all functions f , g, h such that dom f ⊆ rng g and dom f misses rng h and g domh misses dom f holds f · (g+·h) = f · g. (4) For all functions f1, f2, g1, g2 such that...
متن کاملMonitoring User Actions for Better Malware Specifications
We propose incorporating user actions to improve the precision of malware specifications and introduce a system to create effective application security policies based on the relationships between user interaction, GUI events, and run-time operations of both benign and malicious applications. Graphical malware such as Trojan:Win32/Fakeinit prevent us from simply allowing all user initiated acti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The South African Journal of Industrial Engineering
سال: 2012
ISSN: 2224-7890,1012-277X
DOI: 10.7166/19-2-98