نتایج جستجو برای: concrete sleeper

تعداد نتایج: 76768  

Journal: :Journal of Geotechnical and Geoenvironmental Engineering 2019

Journal: :iranian journal of radiation research 0
s.m.j. mortazavi department of radiology, school of paramedical sciences, shiraz university of medical sciences, shiraz, iran m.a. mosleh-shirazi radiotherapy physics unit, radiotherapy department, namazee hospital, shiraz university of medical sciences, shiraz, iran m.r. maheri civil engineering department, school of engineering, shiraz university, shiraz, iran h. yousefnia department of nuclear engineering, school of engineering, shiraz university of medical sciences, shiraz, iran s. zolghadri department of nuclear engineering, school of engineering, shiraz university of medical sciences, shiraz, iran a. haji-pour civil engineering department, school of engineering, shiraz university, shiraz, iran

background: in megavoltage radiotherapy rooms, ordinary concrete is usually used due to its low construction costs, although higher density concrete are sometimes used, as well. the use of high-density concrete decreases the required thickness of the concrete barrier hence, its disadvantage is its high cost. in a nuclear reactor, neutron radiation is the most difficult to shield. a method for p...

2017
Kai Schneider Matthias Lieboldt Marco Liebscher Maik Fröhlich Simone Hempel Marko Butler Christof Schröfl Viktor Mechtcherine

Surfaces of carbon fibre roving were modified by means of a low temperature plasma treatment to improve their bonding with mineral fines; the latter serving as an inorganic fibre coating for the improved mechanical performance of carbon reinforcement in concrete matrices. Variation of the plasma conditions, such as gas composition and treatment time, was accomplished to establish polar groups o...

2007
W. Essmayr R. R. Wagner

The paper gives an overview on the meta-data specification for administrating and enforcing enterprisewide security for heterogeneous and distributed information systems. The meta-data serves as a basis to maintain enterprise-wide security information centrally, to integrate isolated security specifications, to keep the consistency between different security policies, and to perform access cont...

2000
Mihir Bellare Alexandra Boldyreva Silvio Micali

This paper addresses the security of public-key cryptosystems in a \multi-user" setting, namely in the presence of attacks involving the encryption of related messages under di erent public keys, as exempli ed by H astad's classical attacks on RSA. We prove that security in the single-user setting implies security in the multi-user setting as long as the former is interpreted in the strong sens...

Journal: :IACR Cryptology ePrint Archive 2017
Philip Lafrance Alfred Menezes

We identify a flaw in the security proof and a flaw in the concrete security analysis of the WOTS-PRF variant of the Winternitz one-time signature scheme, and discuss the implications to its concrete security.

2007
Robin L. Nabi Emily Moyer-Gusé Sahara Byrne

This research was designed to assess the effects of contemporary political humor on information processing and persuasion, focusing specifically on two competing processes: processing motivation/counterargument distraction and message discounting. In Study 1, 212 undergraduates read one of four monologues by political comedian Bill Maher. Correlations and path modeling suggested that, in genera...

2007
MARKUS APPEL TOBIAS RICHTER T. Richter

Fact-related information contained in fictional narratives may induce substantial changes in readers’ real-world beliefs. Current models of persuasion through fiction assume that these effects occur because readers are psychologically transported into the fictional world of the narrative. Contrary to general dual-process models of persuasion, models of persuasion through fiction also imply that...

Journal: :Softw., Pract. Exper. 1993
Vincenzo Loia Michel Quaggetto

We present the implementation of a Prolog system composed of interpreter and compiler. The originality of our work consists in the adoption of a new framework to realize the main components of the system. The framework relies on new mechanisms, called sleepers. With their help we have developed a complete Prolog interpreter in which all the control activities, from backtracking up to last-call ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید