نتایج جستجو برای: tunnel support systems
تعداد نتایج: 1768124 فیلتر نتایج به سال:
fuzzy linear programming models and methods has been one ofthe most and well studied topics inside the broad area of soft computing. itsapplications as well as practical realizations can be found in all the real worldareas. in this paper a basic introduction to the main models and methods infuzzy mathematical programming, with special emphasis on those developedby the authors, is presented. as ...
There are many kinds of public transportation systems, e.g. Xue-shan tunnel, high-speed railway, and airport shuttle are developed in Taiwan recently. The risk hidden in the space of long road tunnel could cause serious life loses and transportation system damage. Therefore, how to prevent and decrease the impact of disaster should be considered for the disaster precaution and security manageme...
The BGP Encapsulation Subsequent Address Family Identifier (SAFI) provides a method for the dynamic exchange of encapsulation information and for the indication of encapsulation protocol types to be used for different next hops. Currently, support for Generic Routing Encapsulation (GRE), Layer 2 Tunneling Protocol (L2TPv3), and IP in IP tunnel types are defined. This document defines support fo...
The carpal tunnel in the wrist is formed by the interconnected carpal bones and the transverse carpal ligament (TCL). The tunnel contents include the median nerve, which is susceptible to entrapment in the space-limited tunnel leading to carpal tunnel syndrome (CTS). CTS patients have increased flattening of the median nerve which is alleviated after surgically transecting the TCL to increase c...
Two important tunnel safety technologies are addressed. The majority of long road tunnels have ventilation systems. In the event of a fire in a tunnel, such systems will influence fire development in a number of different ways. Recent research and observations on these influences are presented. The effects discussed are critical ventilation velocity for smoke control and the influence of ventil...
This paper deals with full face excavation of large size tunnels in rock masses of very poor quality which exhibit squeezing problems. Three different time dependent constitutive models of increasing complexity (a viscoelasticplastic model, an elastic-viscoplastic model, and an elastic-plastic-viscoplastic model) are used to analyze the tunnel response during excavation of the Saint Martin La P...
Many applications of tunneling protocols such as PPTP [5] and L2TP [4] involve dial-up network access. Some, such as the provision of secure access to corporate intranets via the Internet, are characterized by voluntary tunneling: the tunnel is created at the request of the user for a specific purpose. Other applications involve compulsory tunneling: the tunnel is created without any action fro...
This paper describes a kernel interface that provides an untrusted user-level process (an executive) with protected access to memory management functions, including the ability to create, manipulate, and execute within subservient contexts (address spaces). Page motion callbacks not only give the executive limited control over physical memory management, but also shift certain responsibilities ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید