Перевод: с английского на все языки

со всех языков на английский

flaw-detection technique

См. также в других словарях:

  • Nondestructive testing — or Non destructive testing (NDT) is a wide group of analysis techniques used in science and industry to evaluate the properties of a material, component or system without causing damage.[1] The terms Nondestructive examination (NDE),… …   Wikipedia

  • X-ray computed tomography — For non medical computed tomography, see Industrial CT Scanning. catSCAN redirects here. For the Transformers character, see Transformers: Universe. X ray computed tomography Intervention A patient is receiving a CT scan for cancer. Outsid …   Wikipedia

  • Ultrasonic testing — Step 1 : The UT probe is placed on the root of the blades to be inspected with the help of a special borescope tool (video probe). Step 2 : Instrument settings are input. Step 3 : The probe is scanned over the blade root. In this case, an… …   Wikipedia

  • railroad — /rayl rohd /, n. 1. a permanent road laid with rails, commonly in one or more pairs of continuous lines forming a track or tracks, on which locomotives and cars are run for the transportation of passengers, freight, and mail. 2. an entire system… …   Universalium

  • Scanning acoustic microscope — A Scanning Acoustic Microscope (SAM) is a device which uses focused sound to investigate, measure, or image an object (a process called Scanning Acoustic Tomography). It is commonly used in failure analysis and non destructive evaluation. It also …   Wikipedia

  • Mathematics and Physical Sciences — ▪ 2003 Introduction Mathematics       Mathematics in 2002 was marked by two discoveries in number theory. The first may have practical implications; the second satisfied a 150 year old curiosity.       Computer scientist Manindra Agrawal of the… …   Universalium

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • Dan Kaminsky — Kaminsky in 2007. Occupation Computer security researcher Known for Discovering the 2008 DNS cache poisoning vulnerability Dan Kam …   Wikipedia

  • Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… …   Wikipedia

  • materials science — the study of the characteristics and uses of various materials, as glass, plastics, and metals. [1960 65] * * * Study of the properties of solid materials and how those properties are determined by the material s composition and structure, both… …   Universalium

  • Shatter attack — In computing, a shatter attack is a programming technique employed by hackers on Microsoft Windows operating systems that can be used to bypass security restrictions between processes in a session. A shatter attack takes advantage of a design… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»