201 resultados para concrete scheme


Relevância:

20.00% 20.00%

Publicador:

Resumo:

There has been an increasing focus on the development of test methods to evaluate the durability performance of concrete. This paper contributes to this focus by presenting a study that evaluates the effect of water accessible porosity and oven-dry unit weight on the resistance of both normal and light-weight concrete to chloride-ion penetration. Based on the experimental results and regression analyses, empirical models are established to correlate the total charge passed and the chloride migration coefficient with the basic properties of concrete such as water accessible porosity, oven dry unit weight, and compressive strength. These equations can be broadly applied to both normal and lightweight aggregate concretes. The model was also validated by an independent set of experimental results from two different concrete mixtures. The model provides a very good estimate on the concrete’s durability performance in respect to the resistance to chloride ion penetration.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In pavement design, resilient modulus of a pavement material is one of the key design parameters. Resilient modulus of a granular pavement material can be measured using repeated load Triaxial (RLT) test or estimated using empirical models. For conventional granular pavement materials, a significant amount of resilient modulus data and empirical models to estimate this key design parameter are available. However, RCA is a relatively new granular pavement material and therefore no such data or empirical models are available. In this study, a number of RLT tests were conducted on RCA sample to investigate the effects of moisture content on its resilient modulus (Mr). It was observed that the resilient modulus of RCA increased with a number of loading cycles but decreased as the moisture content was increased. Further, using RLT test results, empirical models to estimate the resilient modulus of RCA were enhanced and validated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Unidirectional inductive power transfer (UIPT) systems allow loads to consume power while bidirectional IPT (BIPT) systems are more suitable for loads requiring two way power flow such as vehicle to grid (V2G) applications with electric vehicles (EVs). Many attempts have been made to improve the performance of BIPT systems. In a typical BIPT system, the output power is control using the pickup converter phase shift angle (PSA) while the primary converter regulates the input current. This paper proposes an optimized phase shift modulation strategy to minimize the coil losses of a series – series (SS) compensated BIPT system. In addition, a comprehensive study on the impact of power converters on the overall efficiency of the system is also presented. A closed loop controller is proposed to optimize the overall efficiency of the BIPT system. Theoretical results are presented in comparison to both simulations and measurements of a 0.5 kW prototype to show the benefits of the proposed concept. Results convincingly demonstrate the applicability of the proposed system offering high efficiency over a wide range of output power.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Initial attempts to obtain lattice based signatures were closely related to reducing a vector modulo the fundamental parallelepiped of a secret basis (like GGH [9], or NTRUSign [12]). This approach leaked some information on the secret, namely the shape of the parallelepiped, which has been exploited on practical attacks [24]. NTRUSign was an extremely efficient scheme, and thus there has been a noticeable interest on developing countermeasures to the attacks, but with little success [6]. In [8] Gentry, Peikert and Vaikuntanathan proposed a randomized version of Babai’s nearest plane algorithm such that the distribution of a reduced vector modulo a secret parallelepiped only depended on the size of the base used. Using this algorithm and generating large, close to uniform, public keys they managed to get provably secure GGH-like lattice-based signatures. Recently, Stehlé and Steinfeld obtained a provably secure scheme very close to NTRUSign [26] (from a theoretical point of view). In this paper we present an alternative approach to seal the leak of NTRUSign. Instead of modifying the lattices and algorithms used, we do a classic leaky NTRUSign signature and hide it with gaussian noise using techniques present in Lyubashevky’s signatures. Our main contributions are thus a set of strong NTRUSign parameters, obtained by taking into account latest known attacks against the scheme, a statistical way to hide the leaky NTRU signature so that this particular instantiation of CVP-based signature scheme becomes zero-knowledge and secure against forgeries, based on the worst-case hardness of the O~(N1.5)-Shortest Independent Vector Problem over NTRU lattices. Finally, we give a set of concrete parameters to gauge the efficiency of the obtained signature scheme.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigated the influence of nano-silica (NS) on the mechanical and transport properties of lightweight concrete (LWC). The resistance of LWC to water and chloride ions penetration was enhanced despite strength marginally increased. Water penetration depth, moisture sorptivity, chloride migration and diffusion coefficient was reduced by 23% and 49%, 23% and 10%, 5% and 0%, 22% and 12% compared to the two reference LWC mixes (pure cement and 60% slag blended cement), respectively with 1% NS. Such improvements were attributed to more compact microstructures because the micropore system was refined and the interface between aggregates and paste was enhanced.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The NLM stream cipher designed by Hoon Jae Lee, Sang Min Sung, Hyeong Rag Kim is a strengthened version of the LM summation generator that combines linear and non-linear feedback shift registers. In recent works, the NLM cipher has been used for message authentication in lightweight communication over wireless sensor networks and for RFID authentication protocols. The work analyses the security of the NLM stream cipher and the NLM-MAC scheme that is built on the top of the NLM cipher. We first show that the NLM cipher suffers from two major weaknesses that lead to key recovery and forgery attacks. We prove the internal state of the NLM cipher can be recovered with time complexity about nlog7×2, where the total length of internal state is 2⋅n+22⋅n+2 bits. The attack needs about n2n2 key-stream bits. We also show adversary is able to forge any MAC tag very efficiently by having only one pair (MAC tag, ciphertext). The proposed attacks are practical and break the scheme with a negligible error probability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Structural Health Monitoring (SHM) schemes are useful for proper management of the performance of structures and for preventing their catastrophic failures. Vibration based SHM schemes has gained popularity during the past two decades resulting in significant research. It is hence evitable that future SHM schemes will include robust and automated vibration based damage assessment techniques (VBDAT) to detect, localize and quantify damage. In this context, the Damage Index (DI) method which is classified as non-model or output based VBDAT, has the ability to automate the damage assessment process without using a computer or numerical model along with actual measurements. Although damage assessment using DI methods have been able to achieve reasonable success for structures made of homogeneous materials such as steel, the same success level has not been reported with respect to Reinforced Concrete (RC) structures. The complexity of flexural cracks is claimed to be the main reason to hinder the applicability of existing DI methods in RC structures. Past research also indicates that use of a constant baseline throughout the damage assessment process undermines the potential of the Modal Strain Energy based Damage Index (MSEDI). To address this situation, this paper presents a novel method that has been developed as part of a comprehensive research project carried out at Queensland University of Technology, Brisbane, Australia. This novel process, referred to as the baseline updating method, continuously updates the baseline and systematically tracks both crack formation and propagation with the ability to automate the damage assessment process using output only data. The proposed method is illustrated through examples and the results demonstrate the capability of the method to achieve the desired outcomes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2008 the Australian government introduced the National Rental Affordability Scheme (NRAS) to increase the supply of affordable rental in Australia. This Federal Government initiative was progressively rolled out through four different rounds over the years with fifth round to be announced some time in 2014. Although the scheme has been successful evident there have been numerous setbacks experienced. This paper focuses on understanding lessons learnt from the performance of the scheme to make recommendations for future government initiatives. This evaluation is based on the combination of document analysis, government officers as well as approved NRAS participants operating throughout Queensland. The most significant challenges for the NRAS participants is the involvement of three levels government which cause delays in the scheme approval process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Masonry bond is affected by many parameters such as the type of mortar used, the techniques of dispersion of mortar and the surface texture of the concrete blocks. Additionally it is understood from the studies on conventional masonry that the bond characteristics are also influenced by the curing methods as well as the age of the bond at the time of testing. These effects on thin layer mortared masonry employing polymer cement mortars are not well understood. Therefore, the effect of curing methods and age to the bond strength and deformation of masonry containing thin layered polymer cement mortar was investigated as part of an ongoing research program at the Queensland University of Technology. This paper presents an experimental investigation of the flexural and shear bond characteristics of the thin layer mortared concrete masonry. The parameters examined include the effects curing and ageing to the bond development over a period from 14 days to 56 days after fabrication. The results exhibit that dry cured thin layer mortared masonry exhibits higher bond strength and Young’s and shear moduli compared to the wet cured specimens.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a study on the effectiveness of two forms of reinforced grout confining systems for hollow concrete block masonry. The systems considered are: (1) a layer of grout directly confining the unreinforced masonry, and (2) a layer of grout indirectly confining the unreinforced masonry through block shells. The study involves experimental testing and finite-element (FE) modeling of six diagonally loaded masonry panels containing the two confining systems. The failure mode, the ultimate load, and the load-deformation behaviors of the diagonally loaded panels were successfully simulated using the finite-element model. In-plane shear strength and stiffness of the masonry thus determined are used to evaluate some selected models of the confined masonry shear including the strut-and-tie model reported in the literature. The evaluated strut width is compared with the prediction of the FE model and then extended for rational prediction of the strength of confined masonry shear walls.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In making this submission, we suggest that Australia learn from the experiences of other jurisdictions, and avoid some of the mistakes that have been made. In particular, this involves: * Ensuring that adequate information is available to evaluate the success of the scheme * Ensuring that notices sent to consumers provide full and accurate information that helps them understand their rights and options * Limiting the potential abuse of the system, and particularly attempts to intimidate consumers into paying unfair penalties through ‘speculative invoicing’ * Avoiding the potential for actual or perceived bias in the scheme’s oversight body

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background As the increasing adoption of information technology continues to offer better distant medical services, the distribution of, and remote access to digital medical images over public networks continues to grow significantly. Such use of medical images raises serious concerns for their continuous security protection, which digital watermarking has shown great potential to address. Methods We present a content-independent embedding scheme for medical image watermarking. We observe that the perceptual content of medical images varies widely with their modalities. Recent medical image watermarking schemes are image-content dependent and thus they may suffer from inconsistent embedding capacity and visual artefacts. To attain the image content-independent embedding property, we generalise RONI (region of non-interest, to the medical professionals) selection process and use it for embedding by utilising RONI’s least significant bit-planes. The proposed scheme thus avoids the need for RONI segmentation that incurs capacity and computational overheads. Results Our experimental results demonstrate that the proposed embedding scheme performs consistently over a dataset of 370 medical images including their 7 different modalities. Experimental results also verify how the state-of-the-art reversible schemes can have an inconsistent performance for different modalities of medical images. Our scheme has MSSIM (Mean Structural SIMilarity) larger than 0.999 with a deterministically adaptable embedding capacity. Conclusions Our proposed image-content independent embedding scheme is modality-wise consistent, and maintains a good image quality of RONI while keeping all other pixels in the image untouched. Thus, with an appropriate watermarking framework (i.e., with the considerations of watermark generation, embedding and detection functions), our proposed scheme can be viable for the multi-modality medical image applications and distant medical services such as teleradiology and eHealth.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a combined experimental and numerical study on the behaviour of both circular and square concrete-filled steel tube (CFT) stub columns under local compression. Twelve circular and eight square CFT stub columns were tested to study their bearing capacity and the key influential parameters. A 3D finite element model was established for simulation and parametric study to investigate the structural behaviour of the stub columns. The numerical results agreed well with the experimental results. In addition, analytical formulas were proposed to calculate the load bearing capacity of CFT stub columns under local compression.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper focuses on the finite element (FE) response sensitivity and reliability analyses considering smooth constitutive material models. A reinforced concrete frame is modeled for FE sensitivity analysis followed by direct differentiation method under both static and dynamic load cases. Later, the reliability analysis is performed to predict the seismic behavior of the frame. Displacement sensitivity discontinuities are observed along the pseudo-time axis using non-smooth concrete and reinforcing steel model under quasi-static loading. However, the smooth materials show continuity in response sensitivity at elastic to plastic transition points. The normalized sensitivity results are also used to measure the relative importance of the material parameters on the structural responses. In FE reliability analysis, the influence of smoothness behavior of reinforcing steel is carefully noticed. More efficient and reasonable reliability estimation can be achieved by using smooth material model compare with bilinear material constitutive model.