نتایج جستجو برای: penetration index

تعداد نتایج: 430530  

2006
Martin Mössner Dieter Heinrich Kurt Schindelwig Peter Kaps Peter Lugner Heinz-Bodo Schmiedmayer Herwig Schretter Werner Nachbauer

Carved turns with alpine skis are investigated. During the movement of a ski, snow is loaded and unloaded. Compacted snow is not elastic, i.e. deformations remain. Such effects are modeled by a hypoplastic constitutive equation. During a turn the shovel digs into the snow and the tail maintains nearly the same penetration depth as the part under maximum load. This results in a higher resistance...

2007
Xin Yue Jijun Zhao Jieshan Qiu

Density functional theory calculations were performed to investigate the endohedral and exohedral adsorption of a H2 molecule on the classical and nonclassical fullerenes Cx (x=58, 59, 60, 62) with seven-, eight-, and ninemembered rings. The amplitude of adsorption energies are within 0.03eV and the molecule-fullerene interaction belongs to van der Waals type. Penetration of a H2 molecule throu...

Journal: :Computers & Security 2015
Francois Mouton Mercia M. Malan Kai Kimppa Hein S. Venter

Social engineering is deeply entrenched in the fields of both computer science and social psychology. Knowledge is required in both these disciplines to perform social engineering based research. Several ethical concerns and requirements need to be taken into account when social engineering research is conducted to ensure that harm does not befall those who participate in such research. These c...

2015
J. Llop E. Gil M. Gallart J. Llorens

Hand-held spray guns and lances are the most widely used methods of crop protection in greenhouses despite the heavy workload and high risk of operator exposure associated with these techniques (Foqué 2012). These spray application techniques have also proved to be less effective than spray boom equipment under many conditions while the advantages of using vertical boom sprayers compared with u...

2012
Daan Raman Bjorn De Sutter Bart Coppens Stijn Volckaert Koen De Bosschere Pieter Danhieux Erik Van Buggenhout

Most networks are connected to the Internet through firewalls to block attacks from the outside and to limit communication initiated from the inside. Because of the limited, supposedly safe functionality of the Domain Name System protocol, its traffic is by and large neglected by firewalls. The resulting possibility for setting up information channels through DNS tunnels is already known, but a...

Journal: :CoRR 2013
Mohammed Ennahbaoui Said El Hajji

Security has become, nowadays, a major concern for the organizations as the majority of its applications are exposed to Internet, which increases the threats of security considerably. Thus, the solution is to improve tools and mechanisms to strengthen the protection of applications against attacks and ensure the different security objectives. Among solutions we will talking about, in this paper...

1999
A. N. F. Aleixo A. B. Balantekin M. A. Cândido Ribeiro

Exact reflection and transmission coefficients for supersymmetric shapeinvariant potentials barriers are calculated by an analytical continuation of the asymptotic wave functions obtained via the introduction of new generalized ladder operators. The general form of the wave function is obtained by the use of the F(−∞,+∞)-matrix formalism of Fröman and Fröman which is related to the evolution of...

Journal: :CoRR 2013
Karthik R Raghavendra Karthik Pramod S. Sowmya Kamath

Web Application finger printing is a quintessential part of the Information Gathering phase of (ethical) hacking. It allows narrowing down the specifics instead of looking for all clues. Also an application that has been correctly recognized can help in quickly analyzing known weaknesses and then moving ahead with remaining aspects. This step is also essential to allow a pen tester to customize...

2010
Rainer Böhme Márk Félegyházi

Penetration testing, the deliberate search for potential vulnerabilities in a system by using attack techniques, is a relevant tool of information security practitioners. This paper adds penetration testing to the realm of information security investment. Penetration testing is modeled as an information gathering option to reduce uncertainty in a discrete time, finite horizon, player-versus-nat...

2013
Maria Auxiliadora F. Vertamatti Luiz Carlos de Abreu Jefferson Drezett Vitor E. Valenti Caio Parente Barbosa

Background: We aimed to describe the social, demographic and medical characteristics of victims of sexual violence and their association with the lapsed time between the aggression and the search for medical attention, and to identify the possible reasons for delay in access to hospital. Methods: we reviewed the records of 439 female cases of sexual violence, treated through the medical service...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید