نتایج جستجو برای: leakage

تعداد نتایج: 30774  

Journal: :journal of dental school, shahid beheshti university of medical sciences 0
niloofar kianvash rad dept. of cosmetic and operative dentistry, dental school, semnan university of medical sciences, semnan, iran bahar javid dept. of cosmetic and operative dentistry, faculty of dentistry, shahid sadughi university of medical sciences, yazd, iran. narges panahandeh dental research center, research institute of dental sciences, school of dentistry, shahid beheshti university of medical sciences, tehran, iran. amir ghasemi dept. of cosmetic and operative dentistry, school of dentistry, shahid beheshti university of medical sciences, tehran, iran. ali kamali dept. of materials science & engineering, shiraz university, shiraz, iran. gholamhasan mohammadi dept. of neurosurgery, firoozgar hospital, iran university of medical science, tehran, iran.

objectives: microleakage is the main concern in composite restorations. this study aimed to compare the microleakage of two bulk-fill and one conventional composite at two different time points. methods: class ii cavities were prepared in 60 premolar teeth and divided into six groups of 20. groups 1 and 4 were incrementally filled with grandio composite. groups 2 and 5 were filled with x-tra fi...

Journal: :journal of dentistry, tehran university of medical sciences 0
leila atash biz yeganeh elaheh seyed tabai mahshid mohammadi basir

objectives: this study aimed to compare the durability of four adhesive systems by assessing their microtensile bond strength (mtbs) and microleakage during six months of water storage. materials and methods: a total of 128 human third molars were used. the adhesives tested were scotch bond multipurpose (sbmp), single bond (sb), clearfil-se bond (cseb), and all-bond se (abse). after sample prep...

پایان نامه :وزارت بهداشت، درمان و آموزش پزشکی - دانشگاه علوم پزشکی و خدمات بهداشتی درمانی استان فارس - دانشکده دندانپزشکی 1380

چکیده ندارد.

2009
Robert Marschinski Michael Jakob Ottmar Edenhofer

Carbon leakage remains a topic of crucial importance as long as the international climate regime remains fragmented. In the first part of this paper, we adopt a typology of three distinct channels of carbon leakage and use it as a guide to review the existing literature. In the second part, we investigate the interplay of two forms of leakage, namely specialisation leakage (linked to termsof-tr...

Journal: :Entropy 2018
Zhichao Zhang Corina S. Drapaca Zhifeng Zhang Shuaifang Zhang Shimei Sun Hui Liu

Leakage through microscale or nanoscale cracks is usually hard to observe, difficult to control, and causes significant economic loss. In the present research, the leakage in a pipe was evaluated by the virtual entropy generation (VEG) method. In virtual entropy generation method, the “measured entropy generation” is forced to follow the “experimental second law of thermodynamics”. Taking the l...

Journal: :IEEE Trans. VLSI Syst. 2011
Hao Xu Wen-Ben Jone Ranga Vemuri

The increasing leakage power consumption and stringent thermal constraint necessitate more aggressive leakage control techniques. Power gating and body biasing are widely used for standby leakage control. Their large energy overhead for performing mode transition is the major obstacle for more aggressive leakage control. Temperature and process variation (TV/PV) further magnify the overhead pro...

2015
Wang Xin-hua

With the heater pipeline leakage experiment conducted on the experiment table, inner pipeline leakage of heater was studied through the leakage failure detection system. The frequency distribution and the amplitude of acoustic emission signals of leakage versus internal pressure were analyzed. Variations of signals versus leakage aperture and dissemination distance were summarized. According to...

2012
Sandip A. Kale

This paper contains concept of data leakage, its causes of leakage and different techniques to protect and detect the data leakage. The value of the data is incredible, so it should not be leaked or altered. In the field of IT. huge database is being used. This database is shared with multiple people at a time. But during this sharing of the data, there are huge chances of data vulnerability, l...

Journal: :IACR Cryptology ePrint Archive 2014
Janaka Alawatugoda Colin Boyd Douglas Stebila

Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets...

Journal: :IEICE Transactions 2015
Eiichiro Fujisaki Akinori Kawachi Ryo Nishimaki Keisuke Tanaka Kenji Yasunaga

Leakage resilient cryptography is often considered in the presence of a very strong leakage oracle: An adversary may submit arbitrary efficiently computable function f to the leakage oracle to receive f (x), where x denotes the entire secret that a party possesses. This model is somewhat too strong in the setting of public-key encryption (PKE). It is known that no secret-key leakage resilient P...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید