نتایج جستجو برای: sulfate attack
تعداد نتایج: 139144 فیلتر نتایج به سال:
in this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by jannati and falahati (so-called jf). we prove that an adversary can recover key bits of jf protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. in addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...
Guess and determine attacks are general attacks on stream ciphers. These attacks are classified into ad-hoc and Heuristic Guess and Determine (HGD) attacks. One of the Advantages of HGD attack algorithm over ad-hoc attack is that it is designed algorithmically for a large class of stream ciphers while being powerful. In this paper, we use auxiliary polynomials in addition to the original equati...
The durability of ecological concrete in a marine environment is concern for the coastal and offshore construction industry. properties such taken from structure were studied. Specimens six-year-old submerged breakwater located East Mediterranean Sea. specimens analyzed their biological carbonate deposition cover, chloride effective diffusion, carbonation, compressive strength, mineralogy. Abou...
In this paper, a support vector machine (SVM) model which can be used to predict the compressive strength of mortars exposed to sulfate attack was established. An accelerated corrosion test was applied to collect compressive strength data. For predicting the compressive strength of mortars, a total of 638 data samples obtained from experiment was chosen as a dataset to establish a SVM model. Th...
In recent years, many studies have been performed on the crack repairing technique in concrete or protection of surface against sulfate ions. Bacterial immobilization and survival rate are dominant influencing factors for repair concrete. this study, a negative pressure method (NPM) was developed to forcibly remove air porous materials concrete, which applied through bio-coating using Rhodobact...
The present work presents focuses on the use of different admixtures for development rendering lime-based mortars with improved adhesion and durability, as well reduction cracking. To this aim, combinations an improver (ethylene–vinyl acetate copolymer, EVA), a water repellent agent (sodium oleate), viscosity enhancer (a starch derivative) mineral admixture (pozzolanic addition nanosilica or me...
Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...
Cognitive radio (CR) network is an excellent solution to the spectrum scarcity problem. Cooperative spectrum sensing (CSS) has been widely used to precisely detect of primary user (PU) signals. The trustworthiness of the CSS is vulnerable to spectrum sensing data falsification (SSDF) attack. In an SSDF attack, some malicious users intentionally report wrong sensing results to cheat the fusion c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید