Search results
Results from the WOW.Com Content Network
The test functions used to evaluate the algorithms for MOP were taken from Deb, [4] Binh et al. [5] and Binh. [6] The software developed by Deb can be downloaded, [ 7 ] which implements the NSGA-II procedure with GAs, or the program posted on Internet, [ 8 ] which implements the NSGA-II procedure with ES.
The test method consists of pushing an instrumented cone, with the tip facing down, into the ground at a controlled rate (controlled between 1.5 -2.5 cm/s accepted). The resolution of the CPT in delineating stratigraphic layers is related to the size of the cone tip, with typical cone tips having a cross-sectional area of either 10 or 15 cm 2 ...
Dye penetrant inspection (DP), also called liquid penetrate inspection (LPI) or penetrant testing (PT), is a widely applied and low-cost inspection method used to check surface-breaking defects in all non-porous materials (metals, plastics, or ceramics).
The standard penetration test (SPT) is an in-situ dynamic penetration test designed to provide information on the geotechnical engineering properties of soil. This test is the most frequently used subsurface exploration drilling test performed worldwide. The test procedure is described in ISO 22476-3, ASTM D1586 [1] and Australian Standards AS ...
The CBR test is a penetration test in which a standard piston, with a diameter of 50 mm (1.969 in), is used to penetrate the soil at a standard rate of 1.25 mm/minute. Although the force increases with the depth of penetration, in most cases, it does not increase as quickly as it does for the standard crushed rock, so the ratio decreases.
STRIDE is a model for identifying computer security threats [1] developed by Praerit Garg and Loren Kohnfelder at Microsoft. [2] It provides a mnemonic for security threats in six categories.
A gray box penetration test is a combination of the two (where limited knowledge of the target is shared with the auditor). [6] A penetration test can help identify a system's vulnerabilities to attack and estimate how vulnerable it is. [7] [5] Security issues that the penetration test uncovers should be reported to the system owner. [8]
A rate-jump method can be used to return an intrinsic elastic modulus of the sample that is independent of the test conditions. [28] In this method, a constitutive law comprising any network of (in general) non-linear dashpots and linear elastic springs is assumed to hold within a very short time window about the time instant tc at which a ...