نتایج جستجو برای: integrity parameter

تعداد نتایج: 284470  

Journal: :Manual Therapy 2016

Journal: :Semantics and Linguistic Theory 2018

Journal: :International Journal of Pressure Vessels and Piping 2022

In view of the high sensitivity to microstructure evolution higher harmonics generated by nonlinear ultrasonic method, tensile damage in stainless steel AISI 316L was evaluated Lamb wave. The effect different degree deformation on response analyzed considering and test results. First, power-law relation parameter plastic strain is proposed. Meanwhile, martensitic transformation increasing dislo...

Journal: :Cerebrovascular diseases 2012
V Held K Szabo H Bäzner M G Hennerici

BACKGROUND Recovery from stroke is presumed to be a function of a cerebral network. Chronic small vessel disease (SVD) has been shown to disrupt this network's integrity and has been proposed as a predictor of poor outcome after stroke. We studied this hypothesis in patients with acute ischemic stroke of the striatocapsular region, an area of pronounced cortical and subcortical connectivity. ...

2018
Quanren Zeng Geng Liu Lan Liu Yi Qin

GH4169, a nickel-base heat-resistant alloy, usually has outstanding high-temperature strength, excellent thermal stability and good wear resistance. However, it is hard to cut and its machined surface quality and integrity are particularly sensitive to a manufacturing process employed. The study reported in this paper was conducted to initially, review existing research on machining-induced sur...

2002
Mustafa Atici Zhi-Hong Chen

The integrity of a graph G, I(G), is defined by I(G) = minS⊆V (G){|S| + m(G − S)} where m(G− S) is the maximum order of the components of G− S. In general the integrity of r-regular graph is not known [?]. We answer the following question for special regular graphs. For any given two integers p and r such that pr 2 is an integer, is there a r-regular graph, say G ∗, on p vertices having size q ...

2013
Xihui Chen Carlo Harpes Gabriele Lenzini Miguel Martins Sjouke Mauw Jun Pang

Through real-life experiments, it has been proved that spoofing is a practical threat to applications using the free civil service provided by Global Navigation Satellite Systems (GNSS). In this paper, we demonstrate a prototype that can verify the integrity of GNSS civil signals. By integrity we intuitively mean that civil signals originate from a GNSS satellite without having been artificiall...

2009
Wenjuan Xu Xinwen Zhang Gail-Joon Ahn

Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security policy and verifying whether an existing policy satisfies security objectives. To efficiently support these, an intuitive and cognitive policy analysis mechanism is desired for policy designers or security administrators due to t...

Journal: :Physical review. E, Statistical, nonlinear, and soft matter physics 2005
Liang Zhao Kwangho Park Ying-Cheng Lai Nong Ye

Scale-free networks can be disintegrated by attack on a single or a very few nodes through the process of cascading failures. By utilizing a prototype cascading model, we previously determined the critical value of the capacity parameter below which the network can become disintegrated due to attack on a single node. A fundamental question in network security, which has not been addressed previ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید