نتایج جستجو برای: concrete cracksrestoration

تعداد نتایج: 76132  

2017
He Zhu Qingbin Li Yu Hu

Cracking due to temperature and restraint in mass concrete is an important issue. A temperature stress testing machine (TSTM) is an effective test method to study the mechanism of temperature cracking. A synchronous closed loop federated control TSTM system has been developed by adopting the design concepts of a closed loop federated control, a detachable mold design, a direct measuring deforma...

2006
Debrup Chakraborty Palash Sarkar

We present PEP, which is a new construction of a tweakable strong pseudo-random permuta-tion. PEP uses a hash-encrypt-hash approach which has recently been used in the constructionof HCTR. This approach is different from the encrypt-mask-encrypt approach of constructionssuch as CMC, EME and EME∗. The general hash-encrypt-hash approach was earlier used byNaor-Reingold to provide ...

2016
Martins Pilegis Diane Gardner Robert Lark

Manufactured sand differs from natural sea and river dredged sand in its physical and mineralogical properties. These can be both beneficial and detrimental to the fresh and hardened properties of concrete. This paper presents the results of a laboratory study in which manufactured sand produced in an industry sized crushing plant was characterised with respect to its physical and mineralogical...

2007
MARK C. WILSON

My research activity so far seems to lie in two main areas, which I have called noncommutative algebra and concrete mathematics for the purposes of this summary. The following contains a description of past research and a discussion of topics on which (at date of writing) I think I would work in the next few years, if I were on a desert island (with a reasonable library). Of course, things have...

Journal: :مهندسی عمران فردوسی 0
محمدرضا اصفهانی طیبه محمدی

in this paper, using numerical methods and test results, the behavior of reinforced concrete beams strengthened with fiber-reinforced polymers (frp) is investigated. in the numerical analysis, the concrete damaged plasticity model is used for considering the nonlinear behavior and strain softening of concrete. the abaqus finite element program is utilized for the analysis of 12 flexural beams s...

Journal: :international journal of environmental research 0
m. pazoki faculty of environment, university of tehran, iran m. a. abdoli faculty of environment, university of tehran, iran r. ghasemzade faculty of environment, university of tehran, iran p. dalaei faculty of environment, university of tehran, iran m. ahmadi pari faculty of environment, university of tehran, iran

corrosion makes huge economic and ecologic damage all over the world. biologic corrosion of sewer pipes is considered as a serious limitation in economic perspectives. to prevent biologic corrosive damage, lining techniques can be applied by materials and aggregate resistant to attack bacterially in sewer pipes. the role of bacteria is that they convert sulfur compounds into sulfuric acid which...

Journal: :IACR Cryptology ePrint Archive 2017
Scott R. Fluhrer

We analyze the concrete security of a hash-based signature scheme described in the most recent Internet Draft by McGrew, Fluhrer and Curcio. We perform this analysis in the random-oracle model, where the Merkle-Damgård hash compression function is models as the random oracle. We show that, even with a large number of different keys the attacker can choose from, and a huge computational budget, ...

2016
Peter Gazi Stefano Tessaro

We study the problem of devising provably secure PRNGs with input based on the sponge paradigm. Such constructions are very appealing, as efficient software/hardware implementations of SHA-3 can easily be translated into a PRNG in a nearly black-box way. The only existing sponge-based construction, proposed by Bertoni et al. (CHES 2010), fails to achieve the security notion of robustness recent...

2012
Bogdan Groza Bogdan Warinschi

Cryptographic puzzles are moderately difficult problems that can be solved by investing non-trivial amounts of computation and/or storage. Devising models for cryptographic puzzles has only recently started to receive attention from the cryptographic community as a first step towards rigorous models and proofs of security of applications that employ them (e.g. Denial-of-service (DoS) resistance...

2009
Abdulaziz Alkussayer William H. Allen

Software security has become a crucial component of any software system in today’s market. However, the development of secure software is still a maturing process. Software architecture (SA) assessment methods have gained increasing attention in recent years. Most of these evaluation techniques are scenario-based, and thus depend heavily on the quality of the scenarios selected for their evalua...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید