نتایج جستجو برای: access tunnel
تعداد نتایج: 361847 فیلتر نتایج به سال:
Information security, sometimes shortened to Info Sec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical). Virtual private networks (VPNs) offer low-cost, secure, dynamic access to pri...
Citation Gonzalez, Jean-Michel, Kayoko Saito, Changdon Kang, Mark Gromski, Mandeep Sawhney, Ram Chuttani, and Kai Matthes. 2015. “Prospective randomized comparison of gastrotomy closure associating tunnel access and over-the-scope clip (OTSC) with two other methods in an experimental ex vivo setting.” Endoscopy International Open 3 (1): E83-E89. doi:10.1055/s0034-1390794. http://dx.doi.org/10.1...
nowadays deep excavations are needed for construction of foundation of high rise buildings, providing space for parking and etc. in some cases deep excavations may be constructed in the vicinity of the subway tunnels and causes unpredicted extra displacements and internal forces in tunnel lining of tunnels which were not designed for them and consequently affect serviceability of tunnel. theref...
the construction of underground tunnel plays a more and more important role in the development of big cities. one of the most important problems caused by the construction of the tunnel is that underground excavation will cause large settlement of the ground and buildings. previous studied showed the difference between numerical and experimental results. in this study the case study of niyayesh...
Modern technology has been used to build tunnels in recent years by means of drilling machines (TBM) that were used for civil engineering work in large cities to reduce the harmful effects of spending on the surface of the earth significantly. To build the tunnel, numerical modeling was used on the basis of the finite element method to predict stress behavior during the tunnel construction proc...
An efficient method for the continuous extraction of subway tunnel cross sections using terrestrial point clouds is proposed. First, the continuous central axis of the tunnel is extracted using a 2D projection of the point cloud and curve fitting using the RANSAC (RANdom SAmple Consensus) algorithm, and the axis is optimized using a global extraction strategy based on segment-wise fitting. The ...
Exhaustion of current version of Internet Protocol version 4 (IPv4) addresses initiated development of next-generation Internet Protocol version 6 (IPv6). IPv6 is acknowledged to provide more address space, better address design, and greater security; however, IPv6 and IPv4 are not fully compatible. For the two protocols to coexist, various IPv6 transition mechanisms have been developed. This r...
The multi hop mesh networkan extension of wireless mesh network by ad hoc networkis one promising wireless network architecture in the near future. Securing access network is the first protection against attacker access to network services. Authentication is an essential for securing the access to the network. TLS/SSL (Transport Layer Security/Secure Socket Layer) protocol is one famous secure ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید