279 resultados para compression bandages


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cold-formed steel members are widely used in load bearing Light gauge steel frame (LSF) wall systems with plasterboard linings on both sides. However, these thin-walled steel sections heat up quickly and lose their strength under fire conditions despite the protection provided by plasterboards. Hence there is a need for simple fire design rules to predict their load capacities and fire resistance ratings. During fire events, the LSF wall studs are subjected to non-uniform temperature distributions that cause thermal bowing, neutral axis shift and magnification effects and thus resulting in a combined axial compression and bending action on the LSF wall studs. In this research a series of full scale fire tests was conducted first to evaluate the performance of LSF wall systems with eight different wall configurations under standard fire conditions. Finite element models of LSF walls were then developed, analysed under transient and steady state conditions, and validated using full scale fire tests. Using the results from fire tests and finite element analyses, a detailed investigation was undertaken into the prediction of axial compression strength and failure times of LSF wall studs in standard fires using the available fire design rules based on Australian, American and European standards. The results from both fire tests and finite element analyses were used to investigate the ability of these fire design rules to include the complex effects of non-uniform temperature distributions and their accuracy in predicting the axial compression strengths of wall studs and the failure times. Suitable modifications were then proposed to the fire design rules. This paper presents the details of this investigation into the accuracy of using currently available fire design rules of LSF walls and the results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cold-formed steel members are often subject to axial compression loads in a range of applications. These thin-walled members can be subject to various types of buckling modes, including flexural-torsional buckling. Design standards provide guidelines for columns subject to flexural-torsional buckling modes at ambient temperature. However, there are no specific design guidelines for elevated temperature conditions. Hence extensive research efforts have gone into the many investigations addressing the flexural-torsional buckling behaviour of cold-formed steel columns at elevated temperatures.This research has reviewed the accuracy of the current design rules in AS/NZS 4600 and the North American Specification in determining the member capacities of cold-formed steel columns using the results from detailed finite element analyses and an experimental study of lipped channel columns. It was found that the current ambient temperature Australian and American design rules accurately predicted the member capacities of pin ended lipped channel columns undergoing flexural torsional buckling at elevated temperatures by simply using the appropriate elevated temperature mechanical properties. However, for fixed ended columns with warping fixity undergoing flexural-torsional buckling, it was found that the current design rules significantly underestimated the column capacities as they disregard the beneficial effect of warping fixity. This research has therefore proposed improved design rules and verified their accuracy using finite element analysis and test results of cold-formed lipped channel columns made of three cross-sections and five different steel grades and thicknesses. This paper presents the details of this research study and the results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cold-formed steel sections are commonly used in low-rise commercial and residential buildings. During fire events, cold-formed steel structural elements in these buildings will be exposed to elevated temperatures. Hence after such events there is a need to evaluate the residual strength of these structural elements. However, only limited information is available in relation to the residual strength of fire exposed cold-formed steel sections. This means conservative decisions are often made in relation to fire exposed building structures. This research is aimed at investigating the buckling capacities of fire exposed cold-formed lipped channel steel sections. A series of compression tests of fire exposed, short lipped channel columns made of varying steel grades and thicknesses was undertaken in this research. Test columns were first exposed to different elevated temperatures up to 800 oC. They were then allowed to cool down at ambient temperatures before they were tested to failure. Similarly tensile coupon tests were also undertaken after being exposed to various elevated temperatures, from which the residual mechanical properties (yield stress and Young’s modulus) of the steels used in this study were derived. Using these mechanical properties, the residual compression capacities of tested short columns were predicted using the currently used design rules in AS/NZS 4600 and AISI cold-formed steel standards. This comparison showed that ambient temperature design rules for compression members can be used to predict the residual compression capacities of fire exposed short or laterally restrained cold-formed steel columns provided the maximum temperature experienced by the columns can be estimated after a fire event. Such residual capacity assessments will allow structural and fire engineers to make an accurate prediction of the safety of fire exposed buildings. This paper presents the details of this experimental study and the results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cold-formed steel sections are commonly used in low-rise commercial and residential buildings. During fire events, cold-formed steel structural elements in these buildings can be exposed to elevated temperatures. Hence after such events there is a need to evaluate their residual strengths. However, only limited information is available in relation to the residual strength of fire exposed cold-formed steel sections. This research is aimed at investigating the distortional buckling capacities of fire exposed cold-formed lipped channel sections. A series of compression tests of fire exposed, short lipped channel columns made of varying steel grades and thicknesses was undertaken in this research. Test columns were first exposed to different elevated temperatures up to 800 oC, and then tested to failure after cooling down. Suitable finite element models were developed with post-fire mechanical properties to simulate the behaviour of tested columns and were validated using test results. The residual compression capacities of short columns were also predicted using the current cold-formed steel standards and compared with test and finite element analysis results. This comparison showed that ambient temperature design rules for columns can be used to predict the residual compression capacities of fire exposed short or laterally restrained cold-formed steel columns provided the maximum temperature experienced by the column can be estimated after a fire event. Such residual capacity assessments will allow engineers to evaluate the safety of fire exposed buildings. This paper presents the details of this experimental study, finite element analyses and the results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Novel computer vision techniques have been developed to automatically detect unusual events in crowded scenes from video feeds of surveillance cameras. The research is useful in the design of the next generation intelligent video surveillance systems. Two major contributions are the construction of a novel machine learning model for multiple instance learning through compressive sensing, and the design of novel feature descriptors in the compressed video domain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cane fibre content has increased over the past ten years. Some of that increase can be attributed to new varieties selected for release. This paper reviews the existing methods for quantifying the fibre characteristics of a variety, including fibre content and fibre quality measurements – shear strength, impact resistance and short fibre content. The variety selection process is presented and it is reported that fibre content has zero weighting in the current selection index. An updated variety selection approach is proposed, potentially replacing the existing selection process relating to fibre. This alternative approach involves the use of a more complex mill area level model that accounts for harvesting, transport and processing equipment, taking into account capacity, efficiency and operational impacts, along with the end use for the bagasse. The approach will ultimately determine a net economic value for the variety. The methodology lends itself to a determination of the fibre properties that have a significant impact on the economic value so that variety tests can better target the critical properties. A low-pressure compression test is proposed as a good test to provide an assessment of the impact of a variety on milling capacity. NIR methodology is proposed as a technology to lead to a more rapid assessment of fibre properties, and hence the opportunity to more comprehensively test for fibre impacts at an earlier stage of variety development.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Enhancing quality of food products and reducing volume of waste during mechanical operations of food industry requires a comprehensive knowledge of material response under loadings. While research has focused on mechanical response of food material, the volume of waste after harvesting and during processing stages is still considerably high in both developing and developed countries. This research aims to develop and evaluate a constitutive model of mechanical response of tough skinned vegetables under postharvest and processing operations. The model focuses on both tensile and compressive properties of pumpkin flesh and peel tissues where the behaviours of these tissues vary depending on various factors such as rheological response and cellular structure. Both elastic and plastic response of tissue were considered in the modelling process and finite elasticity combined with pseudo elasticity theory was applied to generate the model. The outcomes were then validated using the published results of experimental work on pumpkin flesh and peel under uniaxial tensile and compression. The constitutive coefficients for peel under tensile test was α = 25.66 and β = −18.48 Mpa and for flesh α = −5.29 and β = 5.27 Mpa. under compression the constitutive coefficients were α = 4.74 and β = −1.71 Mpa for peel and α = 0.76 and β = −1.86 Mpa for flesh samples. Constitutive curves predicted the values of force precisely and close to the experimental values. The curves were fit for whole stress versus strain curve as well as a section of curve up to bio yield point. The modelling outputs had presented good agreement with the empirical values and the constructive curves exhibited a very similar pattern to the experimental curves. The presented constitutive model can be applied next to other agricultural materials under loading in future.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many species of bat use ultrasonic frequency modulated (FM) pulses to measure the distance to objects by timing the emission and reception of each pulse. Echolocation is mainly used in flight. Since the flight speed of bats often exceeds 1% of the speed of sound, Doppler effects will lead to compression of the time between emission and reception as well as an elevation of the echo frequencies, resulting in a distortion of the perceived range. This paper describes the consequences of these Doppler effects on the ranging performance of bats using different pulse designs. The consequences of Doppler effects on ranging performance described in this paper assume bats to have a very accurate ranging resolution, which is feasible with a filterbank receiver. By modeling two receiver types, it was first established that the effects of Doppler compression are virtually independent of the receiver type. Then, used a cross-correlation model was used to investigate the effect of flight speed on Doppler tolerance and range–Doppler coupling separately. This paper further shows how pulse duration, bandwidth, function type, and harmonics influence Doppler tolerance and range–Doppler coupling. The influence of each signal parameter is illustrated using calls of several bat species. It is argued that range–Doppler coupling is a significant source of error in bat echolocation, and various strategies bats could employ to deal with this problem, including the use of range rate information are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Red blood cells (RBCs) are the most common type of cells in human blood and they exhibit different types of motions and deformed shapes in capillary flows. The behaviour of the RBCs should be studied in order to explain the RBC motion and deformation mechanism. This article presents a numerical simulation method for RBC deformation in microvessels. A two dimensional spring network model is used to represent the RBC membrane, where the elastic stretch/compression energy and the bending energy are considered with the constraint of constant RBC surface area. The forces acting on the RBC membrane are obtained from the principle of virtual work. The whole fluid domain is discretized into a finite number of particles using smoothed particle hydrodynamics concepts and the motions of all the particles are solved using Navier--Stokes equations. Minimum energy concepts are used to simulate the deformed shape of the RBC model. To verify the model, the motion of a single RBC is simulated in a Poiseuille flow and the characteristic parachute shape of the RBC is observed. Further simulations reveal that the RBC shows a tank treading motion when it flows in a linear shear flow.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many species of bat use ultrasonic frequency modulated (FM) pulses to measure the distance to objects by timing the emission and reception of each pulse. Echolocation is mainly used in flight. Since the flight speed of bats often exceeds 1% of the speed of sound,Doppler effects will lead to compression of the time between emission and reception as well as an elevation of the echo frequencies, resulting in a distortion of the perceived range. This paper describes the consequences of these Doppler effects on the ranging performance of bats using different pulse designs. The consequences of Doppler effects on ranging performance described in this paper assume bats to have a very accurate ranging resolution, which is feasible with a filterbank receiver. By modeling two receiver types, it was first established that the effects of Doppler compression are virtually independent of the receiver type. Then, used a cross-correlation model was used to investigate the effect of flight speed on Doppler tolerance and range–Doppler coupling separately. This paper further shows how pulse duration, bandwidth, function type, and harmonics influence Doppler tolerance and range–Doppler coupling. The influence of each signal parameter is illustrated using calls of several bat species. It is argued that range–Doppler coupling is a significant source of error in bat echolocation, and various strategies bats could employ to deal with this problem, including the use of range rate information are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n -bit-iterated hash function based on an n -bit compression function and with an n -bit chaining value that is proven indifferentiable from a RO.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which produce the same hash value under this hash function. We then show a second preimage attack on Tav-128 which succeeds with a complexity of 262 calls to the compression function. Finally, we study the constituent functions of Tav-128 and show that the concatenation of nonlinear functions A and B produces a 64-bit permutation from 32-bit messages. This could be a useful light weight primitive for future RFID protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.