نتایج جستجو برای: leakage flow

تعداد نتایج: 510394  

2017

Neurogenic bladder , explanations follow in the text . i. Urge Incontinence manifesting as urgency and the urinary leakage even before individual reaches the toilet. ii. Over flow incontinence manifesting as involuntary release of urine from an overfull urinary bladder, often in the absence of any urge to urinate. iii. Dribbling incontinence , the patient is never dry a continuous leakage of ur...

Journal: :Physical review letters 2012
Wolf B Dapp Andreas Lücke Bo N J Persson Martin H Müser

We study fluid flow at the interfaces between elastic solids with randomly rough, self-affine surfaces. We show by numerical simulation that elastic deformation lowers the relative contact area at which contact patches percolate in comparison to traditional approaches to seals. Elastic deformation also suppresses leakage through contacts even far away from the percolation threshold. Reliable es...

2018
Patrick Ah-Fat Michael Huth

The purpose of Secure Multi-Party Computation is to enable protocol participants to compute a public function of their private inputs while keeping their inputs secret, without resorting to any trusted third party. However, opening the public output of such computations inevitably reveals some information about the private inputs. We propose a measure generalising both Rényi entropy and g-entro...

Journal: :J. Inf. Sci. Eng. 2006
Shih-Chien Chou

Preventing information leakage during program execution is essential for modern applications. This paper proposes a model to prevent information leakage for objectoriented systems, which is based on role-based access control (RBAC). It is named MRBAC/AR (modified RBAC for both intrAand inteR-application information flow control) because it is a modification of RBAC96. It offers the following fe...

Journal: :CoRR 2010
Mário S. Alvim Konstantinos Chatzikokolakis Pierpaolo Degano Catuscia Palamidessi

Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities of two different entries to originate a certain answer is bound by e. In the fields of anonymity and information flow there is a similar concern for controlling inf...

2012
Stefan Steiner KAMRAN PAYNABAR JOHN AGAPIOU

Problem: Leakage of the transmission fluid or oil in powertrain systems (i.e., transmissions, cylinder heads, engine blocks, etc.) can cause engine overheating and/or permanent damage. Therefore, it is crucial to run a leak test to inspect for any possible porosity in the casting parts. However, the inspection results for the amount of leakage at given testing times are sensitive to the tested ...

2017
Duo Yang Zuodong Huang Ang Guo Jiawei Xu

The k-ω Shear Stress Transport (SST) turbulence model is adopted to study the hydrodynamic performance of the water-jet axial pump which is applied in Unmanned Surface Vehicle (USV). The numerical simulation of the whole passage of the water-jet pump is carried out for four different tip clearance with δ = 0.3 mm, δ = 0.8 mm, δ = 1 mm and δ = 1.4 mm. And the results, in term of external charact...

2011
Kenji SUZUKI Sho AKAZAWA Toshiki HATAYAMA Yohichi NAKAO

This paper describes development of water hydraulic proportional valves. The valves are spool-type and the spool is driven by a stepping motor and positive cam mechanism. The cam is always placed between two cam followers and the return spring is omitted. The rotational angle of the cam and the displacement of the spool is linear. The experimental results of static characteristics are also show...

2002
DONGHYUN YOU RAJAT MITTAL MENG WANG PARVIZ MOIN

A large-eddy simulation (LES) solver which combines an immersed-boundary technique with a curvilinear structured grid has been developed to study the temporal and spatial dynamics of a rotor tip-clearance flow, with the objective of determining the underlying mechanisms for low pressure fluctuations downstream of the rotor near the endwall. Salient feature of the numerical methodology, includin...

2015
Gianluca Barbon Agostino Cortesi Pietro Ferrara Marco Pistoia Omer Tripp

A static analysis is presented, based on the theory of abstract interpretation, for verifying privacy policy compliance by mobile applications. This includes instances where, for example, the application releases the user’s location or device ID without authorization. It properly extends previous work on datacentric semantics for verification of privacy policy compliance by mobile applications ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید