Search results for "Security"
showing 10 items of 1693 documents
Macroelement Model for In-Plane and Out-of-Plane Responses of Masonry Infills in Frame Structures
2018
A new macroelement model is presented in this paper for the simulation of the in-plane (IP) and out-of-plane (OOP) response of infilled frames subjected to seismic actions. The model consists of two diagonal, one horizontal, and one vertical struts. Each strut is represented by two fiber-section beam-column elements. The model is able to capture the arching action of the wall under an OOP load as well as the interaction between the IP and OOP actions. The proposed modeling approach is sufficiently simple and efficient that it can be used for the static or dynamic analysis of an entire structural system. An experimental validation has been carried out. A further numerical study performed wit…
Fuzzy Fusion in Multimodal Biometric Systems
2007
Multimodal authentication systems represent an emerging trend for information security. These systems could replace conventional mono-modal biometric methods using two or more features for robust biometric authentication tasks. They employ unique combinations of measurable physical characteristics: fingerprint, facial features, iris of the eye, voice print, hand geometry, vein patterns, and so on. Since these traits are hardly imitable by other persons, the aim of these multibiometric systems is to achieve a high reliability to determine or verify person's identity. In this paper a multimodal biometric system using two different fingerprints is proposed. The matching module integrates fuzzy…
Discontinuous FRP-Confinement of Masonry Columns
2020
Recent seismic events, all over the world, demonstrated that masonry constructions are prone to brittle collapses when shear or compression capacity is reached. It is clear that, in many real cases, masonry columns need to be strengthened for enhancing their load-carrying capacity and to develop a more ductile response. The Fiber Reinforced Polymers (FRPs) confinement of masonry columns is a well-known technique that may produce these advantages. Unfortunately, full-wrapping insulates the column from the environment; so interstitial humidity can easily occur and cause the acceleration of the masonry's decay. In order to prevent it, partial-confinement is commonly assessed instead of total-j…
Lessons Learned on the Tensile and Bond Behavior of Fabric Reinforced Cementitious Matrix (FRCM) Composites
2020
Fabric Reinforced Cementitious Matrix (FRCM) composites represent an effective, compatible and cost-efficient solution for strengthening and retrofitting existing structures. A strong research effort was done to investigate the tensile and bond properties of these materials, as well as the overall behaviour of strengthened members. A Round Robin Test was organized by Rilem TC 250-CSM on 28 FRCM composites comprising basalt, carbon, glass, PBO, aramid and steel textiles, embedded in either cement, lime or geopolymer mortars, to collect an experimental dataset and define test protocols. This paper collects the outcomes of this study to highlight fundamental properties of FRCM and to investiga…
Constitutive Numerical Model of FRCM Strips Under Traction
2020
In this paper, the tensile behavior of Fiber Reinforced Cementitious Matrix (FRCM) strips is investigated through Finite Element (FE) models. The most adopted numerical modeling approaches for the simulation of the fiber-matrix interface law are described. Among them, the cohesive model is then used for the generation of FE models which are able to simulate the response under traction of FRCM strips tested in laboratory whose results are available in the technical literature. Tests on basalt, PBO and carbon coated FRCM specimens are taken into account also considering different mechanical ratios of the textile reinforcement. The comparison between FE results and experimental data allows val…
Numerical Modeling Approaches of FRCMs/SRG Confined Masonry Columns
2019
The Fabric Reinforced Cementitious Matrices (FRCMs) and Steel Reinforced Grout (SRG) are a promising strengthening solution for existing masonry since inorganic matrix is considerably compatible with historical substrates. The present paper is focused on a Finite Element (FE) analysis of masonry columns confined with FRCM composites developed by Abaqus-code. The masonry columns were modelled using a macro model approach. The model was performed by using the following functions Concrete Damage Plasticity (CDP) and the Plastic (P) in order to describe the constitutive laws of material for masonry columns and external reinforcement, respectively. Typical failures of FRCM-systems are slippage o…
Energy-Efficient Resource Optimization with Wireless Power Transfer for Secure NOMA Systems
2018
In this paper, we investigate resource allocation algorithm design for secure non-orthogonal multiple access (NOMA) systems empowered by wireless power transfer. With the consideration of an existing eavesdropper, the objective is to obtain secure and energy efficient transmission among multiple users by optimizing time, power and subchannel allocation. Moreover, we also take into consideration for the practical case that the statistics of the channel state information of the eavesdropper is not available. In order to address the optimization problem and its high computational complexity, we propose an iterative algorithm with guaranteed convergence to deliver a suboptimal solution for gene…
Revenue-based adaptive deficit round robin
2005
This paper presents an adaptive resource allocation model that is based on the DRR queuing policy. The model ensures QoS requirements and tries to maximize a service provider's revenue by manipulating quantum values of the DRR scheduler. To calculate quantum values, it is proposed to use the revenue criterion that controls the allocation of free resources. The simulation considers a single node with the implemented model that serves several service classes with different QoS requirements and traffic characteristics. It is shown that the total revenue can be increased due to the allocation of unused resources to more expensive service classes. At the same time, bandwidth and delay guarantees…
Accelerating Application Migration in HPC
2016
It is predicted that the number of cores per node will rapidly increase with the upcoming era of exascale supercomputers. As a result, multiple applications will have to share one node and compete for the (often scarce) resources available on this node. Furthermore, the growing number of hardware components causes a decrease in the mean time between failures. Application migration between nodes has been proposed as a tool to mitigate these two problems: Bottlenecks due to resource sharing can be addressed by load balancing schemes which migrate applications; and hardware errors can often be tolerated by the system if faulty nodes are detected and processes are migrated ahead of time.
A two-layer security model for accessing multimedia content in social networks
2016
La seguridad de un sitio web es hoy en día una de las principales preocupaciones de los administradores de sistemas. La seguridad es también el reto más importante al que se enfrentan los desarrolladores web a la hora de diseñar una plataforma fiable que ofrezca servicios a los usuarios públicos. Es bien sabido que el contenido multimedia en la web está en continuo crecimiento y, recientemente, este tipo de medios se utiliza cada vez más en las redes sociales. El acceso a los contenidos multimedia en el contexto de las redes sociales debe ser fácil y seguro. En este artículo se presenta un modelo de seguridad con capacidad semántica para el acceso a contenidos multimedia en las redes social…