69 resultados para Mercury intrusion porosimetry


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Residually derived red soils occur in Bangalore District of Karnataka State, India. The porous and unsaturated nature of the red soils makes them susceptible to collapse on wetting under load. The present study analyses the collapse behaviour of an unsaturated bonded (undisturbed) red soil from Bangalore referenced to tests on samples in an unbonded (remoulded) state. A filter paper method was used to determine the matric suction of the bonded and unbonded specimens, and mercury intrusion porosimetry (MIP) was used to determine their soil structure. Analysis of the experimental results shows that bonding plays an important role in the collapse behaviour of the unsaturated residual soil. The results of the study also provide insight into the volume change behaviour of unsaturated bonded soils on wetting within and beyond the yield locus.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper examines the role of microstructure and matric suction in the collapse behavior of a compacted clay soil from Bangalore District in Karnataka State, India. The microstructure of the compacted specimens was examined by mercury intrusion porosimetry (MIP), and the ASTM Filter Paper Method was used to determine their matric suction. The microstructure and matric suction of the compacted specimens were changed by varying their compaction water content, dry density, and clay content (< 2 mum fraction). Experimental results showed that relative abundance of coarse (60 to 6 mum) pores was mainly affected by increasing the dry density of the specimens from 1.49 to 1.77 g/cm(3). The relative abundance of coarse and fine (0.01 to 0.002 mum) pores was affected by increasing the compaction water content from 10.6 to 26.4%. Variations in dry density, compaction water content, and clay contents notably affected the matric suction of the compacted specimens. The collapse behavior of the compacted specimens is explained from analysis of the MIP and matric suction results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ultraviolet bands of mercury bromide have been excited in uncondensed discharge and photographed with a quartz Littrow spectrograph. The class II system, lying between\lambda 2900 å to 2700 å, suggested byWieland as due to the triatomic molecule, has been studied in detail and ascribed to the diatomic molecule. The bands in the regionlambda 2900 å to 2770å have been analysed into two systems which may form the two components of a2 II –2 \sigma electronic transition with a2 II interval equal to 969·4 cm–1.Another system most probably due to2 \sigma–2 \sigma has been observed in the region\lambda 2770 to 2720.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Data on free convection heat transfer to water and mercury are collected using a test rig in vertical annuli of three radii ratios, the walls of which are maintained at uniform temperatures. A theoretical analysis of the boundary layer equations has been attempted using local similarity transformation and double boundary layer approach. Correlations derived from the present theoretical analysis are compared with the analysis and the experimental data available in literature for non-metallic fluids and also with the present experimental data on water and mercury. Generalised correlations are set up for expressing the ratio of heat transferred by convection to the heat transferred by pure conduction and Nusselt's number, in terms of Grashof, Rayleigh and Prandtl numbers, based on the theoretical analysis and the present data on mercury and water. The present generalised correlations agree with the reported and present data for non-metallic fluids and liquid metals with an average deviation of 9% and maximum deviation of ± 13.7%.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Various intrusion detection systems (IDSs) reported in the literature have shown distinct preferences for detecting a certain class of attack with improved accuracy, while performing moderately on the other classes. In view of the enormous computing power available in the present-day processors, deploying multiple IDSs in the same network to obtain best-of-breed solutions has been attempted earlier. The paper presented here addresses the problem of optimizing the performance of IDSs using sensor fusion with multiple sensors. The trade-off between the detection rate and false alarms with multiple sensors is highlighted. It is illustrated that the performance of the detector is better when the fusion threshold is determined according to the Chebyshev inequality. In the proposed data-dependent decision ( DD) fusion method, the performance optimization of ndividual IDSs is first addressed. A neural network supervised learner has been designed to determine the weights of individual IDSs depending on their reliability in detecting a certain attack. The final stage of this DD fusion architecture is a sensor fusion unit which does the weighted aggregation in order to make an appropriate decision. This paper theoretically models the fusion of IDSs for the purpose of demonstrating the improvement in performance, supplemented with the empirical evaluation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abuses in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as Activity-Event-Symptoms(AES) model for detecting fraud and intrusion attacks which appears during payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs during mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of quickest detection of an intrusion using a sensor network, keeping only a minimal number of sensors active. By using a minimal number of sensor devices, we ensure that the energy expenditure for sensing, computation and communication is minimized (and the lifetime of the network is maximized). We model the intrusion detection (or change detection) problem as a Markov decision process (MDP). Based on the theory of MDP, we develop the following closed loop sleep/wake scheduling algorithms: (1) optimal control of Mk+1, the number of sensors in the wake state in time slot k + 1, (2) optimal control of qk+1, the probability of a sensor in the wake state in time slot k + 1, and an open loop sleep/wake scheduling algorithm which (3) computes q, the optimal probability of a sensor in the wake state (which does not vary with time), based on the sensor observations obtained until time slot k. Our results show that an optimum closed loop control on Mk+1 significantly decreases the cost compared to keeping any number of sensors active all the time. Also, among the three algorithms described, we observe that the total cost is minimum for the optimum control on Mk+1 and is maximum for the optimum open loop control on q.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The MIT Lincoln Laboratory IDS evaluation methodology is a practical solution in terms of evaluating the performance of Intrusion Detection Systems, which has contributed tremendously to the research progress in that field. The DARPA IDS evaluation dataset has been criticized and considered by many as a very outdated dataset, unable to accommodate the latest trend in attacks. Then naturally the question arises as to whether the detection systems have improved beyond detecting these old level of attacks. If not, is it worth thinking of this dataset as obsolete? The paper presented here tries to provide supporting facts for the use of the DARPA IDS evaluation dataset. The two commonly used signature-based IDSs, Snort and Cisco IDS, and two anomaly detectors, the PHAD and the ALAD, are made use of for this evaluation purpose and the results support the usefulness of DARPA dataset for IDS evaluation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Evidence for the generalized anomeric effect (GAE) in the N-acyl-1,3-thiazolidines, an important structural motif in the penicillins, was sought in the crystal structures of N-(4-nitrobenzoyl)-1,3-thiazolidine and its (2:1) complex with mercuric chloride, N-acetyl-2-phenyl-1,3-thiazolidine, and the (2:1) complex of N-benzoyl-1,3-thiazolidine with mercuric bromide. An inverse relationship was generally observed between the. C-2-N and C-2-S bond lengths of the thiazolidine ring, supporting the existence of the GAE. (Maximal bond length changes were similar to 0.04 angstrom for C-2-N-3, S-1-C-2, and similar to 0.08 angstrom for N-3-C-6.) Comparison with N-acylpyrrolidines and tetrahydrothiophenes indicates that both the nitrogen-to-sulphur and sulphur-to-nitrogen GAE's operate simultaneously in the 1,3-thiazolidines, the former being dominant. (This is analogous to the normal and exo-anomeric effects in pyranoses, and also leads to an interesting application of Baldwin's rules.) The nitrogen-to-sulphur GAE is generally enhanced in the mercury(II) complexes (presumably via coordination at the sulphur); a 'competition' between the GAE and the amide resonance of the N-acyl moiety is apparent. There is evidence for a 'push-pull' charge transfer between the thiazolidine moieties in the mercury(II) complexes, and for a 'back-donation' of charge from the bromine atoms to the thiazolidine moieties in the HgBr2 complex. (The sulphur atom appears to be sp(2) hybridised in the mercury(II) complexes, possibly for stereoelectronic reasons.) These results are apparently relevant to the mode of action of the penicillins. (c) 2006 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The motivation behind the fusion of Intrusion Detection Systems was the realization that with the increasing traffic and increasing complexity of attacks, none of the present day stand-alone Intrusion Detection Systems can meet the high demand for a very high detection rate and an extremely low false positive rate. Multi-sensor fusion can be used to meet these requirements by a refinement of the combined response of different Intrusion Detection Systems. In this paper, we show the design technique of sensor fusion to best utilize the useful response from multiple sensors by an appropriate adjustment of the fusion threshold. The threshold is generally chosen according to the past experiences or by an expert system. In this paper, we show that the choice of the threshold bounds according to the Chebyshev inequality principle performs better. This approach also helps to solve the problem of scalability and has the advantage of failsafe capability. This paper theoretically models the fusion of Intrusion Detection Systems for the purpose of proving the improvement in performance, supplemented with the empirical evaluation. The combination of complementary sensors is shown to detect more attacks than the individual components. Since the individual sensors chosen detect sufficiently different attacks, their result can be merged for improved performance. The combination is done in different ways like (i) taking all the alarms from each system and avoiding duplications, (ii) taking alarms from each system by fixing threshold bounds, and (iii) rule-based fusion with a priori knowledge of the individual sensor performance. A number of evaluation metrics are used, and the results indicate that there is an overall enhancement in the performance of the combined detector using sensor fusion incorporating the threshold bounds and significantly better performance using simple rule-based fusion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new model of ignition in an ignitron, based on the electrical breakdown of the junction between the ignitor (semiconductor) and the mercury (metal) is proposed. A method of evaluating some of the ignition characteristics is also developed. The paper gives a critical summary of the various characteristics of the ignition process. The new model is stated and used to explain all the ignition characteristics. The experiments conducted in support of the various aspects of this model are also given.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ultraviolet bands of mercury iodide have been excited in uncondensed discharge and photographed with a quartz Littrow spectrograph. The bands in the region λ 2658 to 2530 Å have been analysed into two systems which may form the two components of a2Π-2∑ electronic transition with a2Π interval equal to 858·9 cm-1. These systems and the systems in the region λ 3095 to 2647 Å have the same lower state.