نتایج جستجو برای: leakage flow
تعداد نتایج: 510394 فیلتر نتایج به سال:
Neurogenic bladder , explanations follow in the text . i. Urge Incontinence manifesting as urgency and the urinary leakage even before individual reaches the toilet. ii. Over flow incontinence manifesting as involuntary release of urine from an overfull urinary bladder, often in the absence of any urge to urinate. iii. Dribbling incontinence , the patient is never dry a continuous leakage of ur...
We study fluid flow at the interfaces between elastic solids with randomly rough, self-affine surfaces. We show by numerical simulation that elastic deformation lowers the relative contact area at which contact patches percolate in comparison to traditional approaches to seals. Elastic deformation also suppresses leakage through contacts even far away from the percolation threshold. Reliable es...
The purpose of Secure Multi-Party Computation is to enable protocol participants to compute a public function of their private inputs while keeping their inputs secret, without resorting to any trusted third party. However, opening the public output of such computations inevitably reveals some information about the private inputs. We propose a measure generalising both Rényi entropy and g-entro...
Preventing information leakage during program execution is essential for modern applications. This paper proposes a model to prevent information leakage for objectoriented systems, which is based on role-based access control (RBAC). It is named MRBAC/AR (modified RBAC for both intrAand inteR-application information flow control) because it is a modification of RBAC96. It offers the following fe...
Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities of two different entries to originate a certain answer is bound by e. In the fields of anonymity and information flow there is a similar concern for controlling inf...
Problem: Leakage of the transmission fluid or oil in powertrain systems (i.e., transmissions, cylinder heads, engine blocks, etc.) can cause engine overheating and/or permanent damage. Therefore, it is crucial to run a leak test to inspect for any possible porosity in the casting parts. However, the inspection results for the amount of leakage at given testing times are sensitive to the tested ...
The k-ω Shear Stress Transport (SST) turbulence model is adopted to study the hydrodynamic performance of the water-jet axial pump which is applied in Unmanned Surface Vehicle (USV). The numerical simulation of the whole passage of the water-jet pump is carried out for four different tip clearance with δ = 0.3 mm, δ = 0.8 mm, δ = 1 mm and δ = 1.4 mm. And the results, in term of external charact...
This paper describes development of water hydraulic proportional valves. The valves are spool-type and the spool is driven by a stepping motor and positive cam mechanism. The cam is always placed between two cam followers and the return spring is omitted. The rotational angle of the cam and the displacement of the spool is linear. The experimental results of static characteristics are also show...
A large-eddy simulation (LES) solver which combines an immersed-boundary technique with a curvilinear structured grid has been developed to study the temporal and spatial dynamics of a rotor tip-clearance flow, with the objective of determining the underlying mechanisms for low pressure fluctuations downstream of the rotor near the endwall. Salient feature of the numerical methodology, includin...
A static analysis is presented, based on the theory of abstract interpretation, for verifying privacy policy compliance by mobile applications. This includes instances where, for example, the application releases the user’s location or device ID without authorization. It properly extends previous work on datacentric semantics for verification of privacy policy compliance by mobile applications ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید