نتایج جستجو برای: close in explosion
تعداد نتایج: 16989286 فیلتر نتایج به سال:
severe accidents of process industries in iran have increased significantly in recent decade. this study quantitatively analyzes the hazards of severe accidents imposed on people, equipment and building by a hydrogen production facility. a hazard identification method was applied. then a consequence simulation was carried out using phast 6.54 software package and at the end, consequence evaluat...
Laboratory of Developmental Chronobiology spora, posttranscriptional mechanisms (e.g., nuclear Pediatric Service entry, phosphorylation, and proteolysis) appear to conMassachusetts General Hospital tribute to the appropriate time delays in the molecular and Harvard Medical School oscillations necessary to generate a 24 hr clock (see Boston, Massachusetts 02114 references in Price et al., 1998)....
Nowadays there are many software tools available which, in case of a gas release, allow to calculate the dispersion of the gases (and hence predict the size and shape of the cloud) and to calculate the overpressures as a function of distance if this gas cloud should explode. The next step is then to predict what the consequences of these overpressures will be: to what extent will buildings (and...
An experimental study on maximum explosion pressure in closed vessel deflagration of stoichiometric gaseous mixtures, for various initial pressures within 0.3 – 1.2 bar and ambient initial temperature is reported. Explosion pressures and explosion times of stoichiometric methane-, ethaneand propane-air mixtures were measured in a spherical vessel and in two cylindrical vessels with different di...
Explosion and fire on an offshore rig can lead to its minor or complete damage and sinking which means the loss of life or environmental pollution. Hence the use of techniques such as blast wall is crucial to reduce the detrimental effects. These blast walls are designed for explosion wave of length between 0.1 to 1 of load mainly to protect the personnel and critical sections. In this research...
We show that public-key bit encryption schemes which support weak (i.e., compact) homomorphic evaluation of any sufficiently “sensitive” collection of functions cannot be proved message indistinguishable beyond AM ∩ coAM via general (adaptive) reductions, and beyond statistical zero-knowledge via reductions of constant query complexity. Examples of sensitive collections include parities, majori...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید