نتایج جستجو برای: sulfate attack

تعداد نتایج: 139144  

Journal: :journal of electrical and computer engineering innovations 2014
fatemeh baghernejad nasour bagheri masoumeh safkhani

in this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by jannati and falahati (so-called jf). we prove that an adversary can recover key bits of jf protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. in addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

اقلیدس, ترانه, نعمتی نیا, محمد صادق, پاینده, علی,

Guess and determine attacks are general attacks on stream ciphers. These attacks are classified into ad-hoc and Heuristic Guess and Determine (HGD) attacks. One of the Advantages of HGD attack algorithm over ad-hoc attack is that it is designed algorithmically for a large class of stream ciphers while being powerful. In this paper, we use auxiliary polynomials in addition to the original equati...

Journal: :Sustainability 2023

The durability of ecological concrete in a marine environment is concern for the coastal and offshore construction industry. properties such taken from structure were studied. Specimens six-year-old submerged breakwater located East Mediterranean Sea. specimens analyzed their biological carbonate deposition cover, chloride effective diffusion, carbonation, compressive strength, mineralogy. Abou...

2018
Huaicheng Chen Chunxiang Qian Chengyao Liang Wence Kang

In this paper, a support vector machine (SVM) model which can be used to predict the compressive strength of mortars exposed to sulfate attack was established. An accelerated corrosion test was applied to collect compressive strength data. For predicting the compressive strength of mortars, a total of 638 data samples obtained from experiment was chosen as a dataset to establish a SVM model. Th...

Journal: :Applied sciences 2021

In recent years, many studies have been performed on the crack repairing technique in concrete or protection of surface against sulfate ions. Bacterial immobilization and survival rate are dominant influencing factors for repair concrete. this study, a negative pressure method (NPM) was developed to forcibly remove air porous materials concrete, which applied through bio-coating using Rhodobact...

Journal: :Construction and Building Materials 2021

The present work presents focuses on the use of different admixtures for development rendering lime-based mortars with improved adhesion and durability, as well reduction cracking. To this aim, combinations an improver (ethylene–vinyl acetate copolymer, EVA), a water repellent agent (sodium oleate), viscosity enhancer (a starch derivative) mineral admixture (pozzolanic addition nanosilica or me...

M. Abadi, S. Jalili,

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

Cognitive radio (CR) network is an excellent solution to the spectrum scarcity problem. Cooperative spectrum sensing (CSS) has been widely used to precisely detect of primary user (PU) signals. The trustworthiness of the CSS is vulnerable to spectrum sensing data falsification (SSDF) attack. In an SSDF attack, some malicious users intentionally report wrong sensing results to cheat the fusion c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید