نتایج جستجو برای: breach flow

تعداد نتایج: 486434  

Journal: :CoRR 2017
Aditya Gune

Data security and personal privacy are difficult to maintain in the Internet age. In 2012, professional networking site LinkedIn suffered a breach, compromising the login of over 100 million accounts. The passwords were cracked and sold online, exposing the authentication credentials millions of users. This manuscript dissects the cryptographic failures implicated in the breach, and explores mo...

Journal: :Journal of abnormal psychology 1980
J F Kihlstrom F J Evans E C Orne M T Orne

Traditionally, posthypnotic amnesia has been construed as a subjectively compelling deficit in memory retrieval. Alternatively, it may represent a motivated failure to utilize appropriate retrieval cues, lack of effort in recall, active suppression of memory, or unwillingness to verbalize the critical material. In an effort to test the alternative hypothesis of amnesia, 488 subjects were presen...

2015
Brant M Webster C Patrick Lusk

The endosomal sorting complexes required for transport (ESCRT) are best known for their role in sorting ubiquitylated membrane proteins into endosomes. The most ancient component of the ESCRT machinery is ESCRT-III, which is capable of oligomerizing into a helical filament that drives the invagination and scission of membranes aided by the AAA ATPase, Vps4, in several additional subcellular con...

2014
William F. Lavelle Ashish Ranade Amer F. Samdani John P. Gaughan Linda P. D'Andrea Randal R. Betz

BACKGROUND Pedicle screws are used increasingly in spine surgery. Concerns of complications associated with screw breach necessitates accurate pedicle screw placement. Postoperative CT imaging helps to detect screw malposition and assess its severity. However, accuracy is dependent on the reading of the CT scans. Inter- and intra-observer variability could affect the reliability of CT scans to ...

Journal: :BMC medical ethics 2015
Tomoko Hamasaki Akihito Hagihara

BACKGROUND The aim of this study was to review the typical factors related to physician's liability in obstetrics and gynecology departments, as compared to those in internal medicine and surgery, regarding a breach of the duty to explain. METHODS This study involved analyzing 366 medical litigation case reports from 1990 through 2008 where the duty to explain was disputed. We examined relati...

Journal: :Water 2023

A dam breaking is a major flood catastrophe. The shape, depth, and wave Doppler effect of initial water flow are all modified as result the interaction body with downstream structures after breach, forming diffraction reflection field. This study investigates problem single liquid, by creating two-dimensional simplified numerical model using VOF approach, analysing between barriers various form...

ستار علینقی زاده بهبهانی سیدمحمدعلی زمردیان

تاکنون مدل‌های زیادی جهت تشریح فرآیند پیچیدة شکست سدهای خاکی و سیل ناشی ازآن پیشنهاد شده است. این مدل ها شامل مدل های فیزیکی، ریاضی ویا کامپیوتری می باشند. از جملة این مدل‌ها، مدل BREACH می‌باشد که بطور وسیع درقرن اخیر مورد استفاده قرارگرفته است. این مدل بر مبنای روابط فرسایش، قوانیـن هیـدرولیـک، انتقـال رسوب و مکـانیـک خاک پایـه‌گـذاری شده است و توانایی محاسبه ابعاد نهایی مقطع شکست و هیدروگراف...

2014

Improved computer models of erosion have been developed, considering soil hydraulic conductivity. The models deal with erosion of levees, dams and embankments due to overtopping. The simulations trace the formation of rills and gullies, beginning with initial overtopping and continuing to final breaching. Physical models performed at “1-g” and high “g” using a geotechnical centrifuge have been ...

2010
F. Bisschop P. J. Visser C. van Rhee H. J. Verhagen

Convential models for the erosion of non-cohesive sediments overestimate the erosion rate induced by high flow velocities. These high flow velocities occur, for instance, in breaching of embankments or dunes (flow velocities up to 10 m/s) or in jetting sand with a trailing suction hopper dredger (30 to 60 m/s). At these very large flow velocities the erosion process is significantly influenced ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید