نتایج جستجو برای: penetration test

تعداد نتایج: 843790  

2012
Yu M. Zhang

Abstact-This application paper addresses the control of a nonminimum-phase plant with variable large orders and delays. The process concerned is futl penetration gas tungsten arc weld' ing. Based on an analysis of accepted adaptive algorithms, the generalized predictive control algorithm presented by Clarke' Mohtadi and Tirffs is selected as the principal control strategy. An adaptive generaliz...

2007
U. V. TOUSSAINT

Ion beam diagnostics are routinely used for quantitative analysis of the surface composition of mixture materials up to a depth of a few m. Unfortunately , advantageous properties of the diagnostics, like high depth resolution in combination with a large penetration depth, no destruction of the surface, high sensitivity for large as well as for small atomic numbers, and high sensitivity are mut...

2005
Christian Guetl

Adaptive E-Learning systems are needed to efficiently support lifelong learning activities. To check goal attainment, learners need to take tests or assessment activities. Large efficiency gains may be made if the assessment and associated grading or evaluation process could be supported with adaptive systems sensitive to user parameters. Hand made tests are a timeconsuming and tiresome task. I...

2010
Yongren R. Wu Xiaobing Lu Xuhui Zhang

To study the effects of spudcan penetration on the adjacent foundations of offshore platforms, experiments and numerical simulations (using business software ABAQUS) are carried out. It is shown that the penetration of spudcan can cause the soil layer affected in an annular zone. The affected zone has a maximum width of one times the diameter of the spudcan. The deflection of the platform’s fou...

2006
M. Häger

The introduction of distributed energy resources (DER) in radial parts of the grid, at low and mediumvoltage levels, may adversely impact the operation of the protection. Synchronous and induction generators contribute to the fault current, creating a second path next to the fault-current contribution from the grid. This may lead to fail-to-trip as well as incorrect trip of protection based on ...

2006
Ruixing Liang D. N. Basov

This paper summarizes recent measurements of the penetration depth and surface resistance of YBCO, with particular emphasis on the asymptotic behaviour at low temperatures and its dependence on hole doping and cation substitution. A complete set of measurements of the penetration depth tensor indicates that A(T) has a predominantly linear temperature dependence in both the a and b directions at...

Journal: :The Journal of Cell Biology 1962
L. J. Rode C. Willard Lewis J. W. Foster

Resting spores of Bacillus megaterium appear uniformly opaque and undifferentiated under the electron microscope. Germinated spores and spores which have lost their dipicolinic acid underwent characteristic changes in structure. Spores fixed with KMnO(4) lose their dipicolinic acid. Spores fixed with OsO(4) under certain conditions retain their dipicolinic acid. When conventional sectioning pro...

Journal: :CoRR 2016
Philipp Morgner Stephan Mattejat Zinaida Benenson

ZigBee Light Link (ZLL) is the low-power mesh network standard used by connected lighting systems, such as Philips Hue, Osram Lightify, and GE Link. These lighting systems are intended for residential use but also deployed in hotels, restaurants, and industrial buildings. In this paper, we investigate the current state of security in ZLL-based connected lighting systems. We extend the scope of ...

Journal: :Information Systems Research 2013
Pradeep Racherla Munir Mandviwalla

‘Universal access’ (UA) to the Internet and the associated information infrastructure has become an important economic and societal goal. However, UA initiatives tend to focus on issues such as physical access and geographical ubiquity, and measure adoption through penetration rates. In this paper, we apply an interpretive case study approach to analyze the Philadelphia wireless initiative to p...

Journal: :CoRR 2014
Sabarathinam Chockalingam Harjinder Singh Lallie

Social Media Site (SMS) usage has grown rapidly in the last few years. This sudden increase in SMS usage creates an opportunity for data leakage which could compromise personal and/or professional life. In this work, we have reviewed traditional penetration testing process and discussed the failures of traditional penetration testing process to test the 'People' layer of Simple Enterprise Secur...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید