Results 11 to 20 of about 14,954,259 (382)

An Improved Asphalt Penetration Test Method. [PDF]

open access: yesMaterials (Basel), 2020
A traditional penetration test only measures the total penetration within 5 s. The penetration process is not monitored, and therefore, a large amount of information on the deformation properties of asphalt is not used.
Ye Z   +5 more
europepmc   +2 more sources

Assessing the Performance of Machine Learning Algorithms for Soil Classification Using Cone Penetration Test Data

open access: yesApplied Sciences, 2023
Conventional soil classification methods are expensive and demand extensive field and laboratory work. This research evaluates the efficiency of various machine learning (ML) algorithms in classifying soils based on Robertson’s soil behavioral types ...
A. Chala, Richard Ray
semanticscholar   +1 more source

Analysis of Deauthentication Attack on IEEE 802.11 Connectivity Based on IoT Technology Using External Penetration Test

open access: yesJournal, 2020
The research aims to know the level of security of WiFi connectivity against deauthentication attacks on Internet of Things (IoT)-based devices. It is done through testing using an external penetration test method. The external penetration test simulates
Yogi Kristiyanto, Ernastuti E
semanticscholar   +1 more source

An Intelligent Penetration Test Simulation Environment Construction Method Incorporating Social Engineering Factors

open access: yesApplied Sciences, 2022
The penetration test has many repetitive operations and requires advanced expert knowledge, therefore, the manual penetration test is inefficient. With the development of reinforcement learning, the intelligent penetration test has been a research ...
Yang Li   +4 more
doaj   +1 more source

Obtaining geotechnical parameters from correlations between geophysics and CPT tests in tailings dams

open access: yesREM: International Engineering Journal, 2020
This article introduces a hassle-free methodology for geotechnical parameters to be obtained from correlations between geophysics and CPT field tests in tailings dams undergoing the decommissioning process, which are reasonably representative of site ...
Gustavo Marçal Sousa   +1 more
doaj   +1 more source

Digital Forensic InnoDB Database Engine for Employee Performance Appraisal Application [PDF]

open access: yesE3S Web of Conferences, 2019
Data is something that can be manipulated by irresponsible people and causing fraud. The use of log files, data theft, unauthorized person, and infiltration are things that should be prevented before the problem occurs.
Kristiyanto Daniel Yeri   +2 more
doaj   +1 more source

Penetration impact testing of self-reinforced composites [PDF]

open access: yes, 2014
Penetration impact resistance is one of the key advantages of self-reinforced composites. This is typically measured using the same setup as for brittle fibre composites.
Baets, J   +4 more
core   +1 more source

Toroidal modeling of penetration of the resonant magnetic perturbation field [PDF]

open access: yes, 2013
A toroidal, quasi-linear model is proposed to study the penetration dynamics of the resonant magnetic perturbation (RMP) field into the plasma. The model couples the linear, fluid plasma response to a toroidal momentum balance equation, which includes ...
Kirk, A., Liu, Yueqiang, Sun, Y.
core   +2 more sources

Use of Biospeckle Imaging to Measure Mechanical Properties of Apples in the Non-invasive Manner [PDF]

open access: yesJournal of Agricultural Machinery, 2019
Introduction The texture of fresh fruit is determined by the structural and mechanical properties of tissue. It depends on climate, maturity, variety and postharvest condition. During ripening, due to loss of turgor, degradation of starch and cell walls,
O Omidi-Arjenaki   +3 more
doaj   +1 more source

An empirical study on vulnerability assessment and penetration detection for highly sensitive networks

open access: yesJournal of Intelligent Systems, 2021
With the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network security ...
Wang Liwei   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy