intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Containment bypass

Xem 1-7 trên 7 kết quả Containment bypass
  • This study aims to evaluate the potential for “Containment Bypass” in VVER-1000/V-320 reactor during extended Station Blackout (SBO) scenarios that challenge the tubes by primarily involving a natural circulation of superheated steam inside the piping loop and then induce creep rupture tube failure.

    pdf8p visnape 30-01-2023 9 4   Download

  • This study aims to evaluate the potential for “Containment Bypass” in VVER/V320 reactor during extended Station Blackout (SBO) scenarios that challenge the tubes by primarily involving a natural circulation of superheated steam inside the piping loop and then induce creep rupture tube failure. Assessments are made of SCDAP/RELAP5 code capabilities for predicting the plant behavior during an SBO event and estimates are made of the uncertainties associated with the SCDAP/RELAP5 predictions for key fluid and components condition and for the SG tube failure margins.

    pdf7p trinhthamhodang1218 14-03-2021 12 4   Download

  • The group members developed a tree to identify fission product release phenomena by tracing failures of individual defense-in-depth barriers and added possible countermeasures against failure. For each elemental issue, they searched for technical problems by examining the phenomena, accident management actions, and regulatory aspects relevant to the mitigation features for containment, including mitigation strategies against containment bypass accidents.

    pdf14p minhxaminhyeu4 26-06-2019 18 1   Download

  • As described in the Section-by-Section analysis below, proposed section 610.4 includes general requirements to ensure that the required disclosures are sufficiently prominent, such as requiring that all audio disclosures be delivered in a slow and deliberate manner. This section also includes requirements that are specific to each of the various media in which advertising may occur. For Internet-based advertisements, for example, proposed section 610.

    pdf33p lenh_hoi_xung 21-02-2013 43 4   Download

  • The new overwatch security pillar acts as an infection detection, containment, and remediation engine that is automatically triggered when a threat has bypassed detection by the existing "in-line" infrastructure and has infiltrated the enterprise network. The overwatch security layer uses data from a real-time reputation and behavioral correlation database to detect active data-stealing malware and other potential threats.

    pdf14p khongmuonnghe 04-01-2013 83 7   Download

  • Many of these attacks are now either semiautomatic or completely automatic. In semiauto- matic DDoS attacks, the intruder typically uses automatic tools to scan and compromise vulnerable machines and infect these machines with the attack code. At some later time, the machines with the attack code are used to launch a widely distributed attack. Even more problematic are the completely automatic attacks, where the need for later communication with attack machines is bypassed.

    pdf31p cao_can 02-01-2013 43 3   Download

  • HTTP Caching ISA Server uses the following criteria when caching HTTP objects:  HTTP Methods. The Request Method must be an HTTP GET. Otherwise, ISA Server bypasses the cache mechanism. An exception is the case of negative caching. If the request is an HTTP PUT or an HTTP DELETE, ISA Server purges obsolete data from the cache.  Dynamic Content. By default, ISA Server does not cache dynamic content, which is defined as URLs that contain a “?.” If you enable caching of dynamic content, ISA Server caches the object only if the response header contains an Always Cache meta-tag.

    pdf4p vuthuong 11-08-2009 85 9   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2