نتایج جستجو برای: penetration index
تعداد نتایج: 430530 فیلتر نتایج به سال:
.......................................................................................... v CHAPTER 1: INTRODUCTION.................................................................. 1 CHAPTER 2: LABUSCH PARAMETER AND CAMPBELL PENETRATION DEPTH.......................................................... 6 Introduction...................................................................................
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware and configuration requirements, while making the simulation a realistic experience from the attacker’s standpoint. The scenarios include a crowd of simulated actors: network devices, hardware devices, software applica...
Penalty approaches can be used to efficiently resolve collisions of dynamically simulated rigid and deformable objects. These approaches compute penalty forces based on the penetration depth of intersecting objects and there exist many algorithms for estimating the exact penetration depth. However, in discrete-time simulations, this information can cause non-plausible collision responses in cas...
Studies on the adoption of innovations by companies generally include micro-level and mesolevel variables in order to explain a company’s receptiveness to innovations. This study adds to the literature by investigating the role of macro-level variables (i.e. national culture) to explain differences in innovation penetration levels and adoption decisions by companies across national cultures. A ...
In this paper, we study the problem of multi-robot perimeter patrol in adversarial environments, under uncertainty. In this problem, the robots patrol around a closed area, where their goal is to patrol in a way that maximizes their chances of detecting an adversary trying to penetrate into the area. Uncertainties may rise in different aspects in this domain, and herein our focus is twofold. Fi...
– Until recently it has been believed that the superconductivity in Sr2RuO4 is described by p-wave pairing. However, both the recent specific heat and the magnetic penetration depth measurements on the purest single crystals of Sr2RuO4 appear to be explained more consistently in terms of f-wave superconductivity. In order to further this hypothesis, we study theoretically the thermodynamics and...
Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: http://uba.uva.nl/en/contact, or a letter to: Library of ...
The TCB shall be found resistant to penetration. Near flawless penetration testing is a requirement for high-rated secure systems — those rated above B1 based on the Trusted Computer System Evaluation Criteria (TCSEC) and its Trusted Network and Database Interpretations (TNI and TDI). Unlike security functional testing, which demonstrates correct behavior of the product's advertised security co...
greenhouse studies showed in the transplant of tomato that two weeks before infection with nematodes with two species of mycorrhizal g. mosseae and g. intraradices had been inoculated, were significantly offseted the reduction of growth that had been done by nematodes. it should be noted that the percentage of root colonization with two species 66.3% and 62.2% respectively and based on this stu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید