نتایج جستجو برای: penetration level

تعداد نتایج: 1112692  

Journal: :Information Economics and Policy 2011
Ralf Dewenter Jörn Kruse

This paper analyzes the impact on mobile telephony diffusion patterns of the two predominant payment regimes, calling party pays (CPP) and receiving party pays (RPP), for mobile termination services. By applying instrumental variable techniques to panel data we account for a possible interdependency of penetration rates and regulatory interventions. For this purpose we use data on political and...

2009
Carmelo Kintana David Turner Jia-Yu Pan Ahmed Metwally Neil Daswani Erika Chin Andrew Bortz

It is important for search and pay-per-click engines to penetration test their click fraud detection systems, in order to find potential vulnerabilities and correct them before fraudsters can exploit them. In this paper, we describe: (1) some goals and desirable qualities of a click fraud penetration testing system, based on our experience, and (2) our experiences with the challenges of buildin...

2013
Majid Rashidi Masood Fakhri Mohammad Gholami

Soil stiffness constants govern the soil sinkage and the pressure-sinkage behaviour of the soil under load. To determine soil stiffness constants in Upadhyaya model under field conditions, a field reflecting general character of an agricultural soil was selected and multiplate penetration tests were conducted. The soil stiffness constants in Upadhyaya model were determined from five sets of soi...

Journal: :journal of agricultural science and technology 2010
a. a. pourmirza

in laboratory experiments the toxicity of acetone was investigated against four species of stored-product insects. in empty-space trials, estimates of the lethal concentrations of acetone (lc, 72-h exposure) for 50% mortality against adults of the lesser grain borer, rhizopertha dominica (f.), red flour beetle, tribolium castaneum (herbst), rice weevil, si-tophilus oryzae (l.) and eggs of the a...

2016
Yurong Yan Peter P. Tsai

Disposable materials enjoy annually steady growth in volume in the field of medical applications as surgical gowns, isolation gowns, and medical drapes which impede cross contamination from reusable protective apparel in a hospital. There are four levels of liquid barrier performance according to the American National Standard/Association for the Advancement of Medical Instrumentation (ANSI/AAM...

2017
Avoy Kumar Dash Shanin Farista Abhilasha Dash Ajinkya Bendre Sana Farista

INTRODUCTION Three-dimensional obturation of the root canal system is the final objective of root canal therapy. Greater penetration of sealer in root dentine lesser will be the voids at the dentine-sealer interface. Hence, analysis of the dentin/sealer interface allows the determination of a filling technique which could obturate the root canals with least gaps and voids. Therefore, the aim of...

Journal: :Molecules 2017
Wei-Jie Xie Yong-Ping Zhang Jian Xu Xiao-Bo Sun Fang-Fang Yang

BACKGROUND In this paper, a new type of physical penetration technology for transdermal administration with traditional Chinese medicine (TCM) characteristics is presented. Fu's cupping therapy (FCT), was established and studied using in vitro and in vivo experiments and the penetration effect and mechanism of FCT physical penetration technology was preliminarily discussed. METHODS With 1-(4-...

2015
Shamal Faily John McAlaney Claudia Iacob

Penetration testers are required to attack systems to evaluate their security, but without engaging in unethical behaviour while doing so. Despite work on hacker values and studies into security practice, there is little literature devoted to the ethical pressures associated with penetration testing. This paper presents several ethical dilemmas and dimensions associated with penetration testing...

2007
David Lie Mahadev Satyanarayanan

Security researchers and practitioners lack techniques to quantitatively evaluate the strength of security systems against a determined attacker. Currently, evaluation is either qualitative, such as through security certification standards, or ad-hoc, such as through penetration testing and auditing. In this paper, we propose a framework that if applied to security systems, would produce quanti...

2008
Vladimir Chuvychin

The paper presents a study of the impact of increasing amount of distributed generation (DG) on control and management (operation) of transmission and distribution systems. Paper considers how DG penetration influences frequency control during normal and emergency operational conditions. Controllability of different types of DG associated with frequency control is considered. List of power syst...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید