Search results for "Security"

showing 10 items of 1693 documents

Macroelement Model for In-Plane and Out-of-Plane Responses of Masonry Infills in Frame Structures

2018

A new macroelement model is presented in this paper for the simulation of the in-plane (IP) and out-of-plane (OOP) response of infilled frames subjected to seismic actions. The model consists of two diagonal, one horizontal, and one vertical struts. Each strut is represented by two fiber-section beam-column elements. The model is able to capture the arching action of the wall under an OOP load as well as the interaction between the IP and OOP actions. The proposed modeling approach is sufficiently simple and efficient that it can be used for the static or dynamic analysis of an entire structural system. An experimental validation has been carried out. A further numerical study performed wit…

Masonry infillConcrete and masonry structure0211 other engineering and technologies020101 civil engineering02 engineering and technologyCivil Engineering0201 civil engineeringConcrete and masonry structuresOut of planeOut-of-planeMechanics of MaterialGeneral Materials ScienceArching actionCivil and Structural Engineering021110 strategic defence & security studiesMasonry infillsbusiness.industryMechanical EngineeringFrame (networking)In-planeBuilding and ConstructionStructural engineeringMaterials EngineeringMasonryFiber-section elementInfilled framesSettore ICAR/09 - Tecnica Delle CostruzioniIn planeMechanics of MaterialsMasonry infills; In-plane; Out-of-plane; Arching action; Macromodel; Fiber-section elements; Concrete and masonry structures.Materials Science (all)businessFiber-section elementsGeologyMacromodel
researchProduct

Fuzzy Fusion in Multimodal Biometric Systems

2007

Multimodal authentication systems represent an emerging trend for information security. These systems could replace conventional mono-modal biometric methods using two or more features for robust biometric authentication tasks. They employ unique combinations of measurable physical characteristics: fingerprint, facial features, iris of the eye, voice print, hand geometry, vein patterns, and so on. Since these traits are hardly imitable by other persons, the aim of these multibiometric systems is to achieve a high reliability to determine or verify person's identity. In this paper a multimodal biometric system using two different fingerprints is proposed. The matching module integrates fuzzy…

Matching (statistics)AuthenticationBiometricsMultimodal biometricsbusiness.industryComputer scienceFingerprintPattern recognitionArtificial intelligenceInformation securitybusinessSpeaker recognitionHand geometry
researchProduct

Discontinuous FRP-Confinement of Masonry Columns

2020

Recent seismic events, all over the world, demonstrated that masonry constructions are prone to brittle collapses when shear or compression capacity is reached. It is clear that, in many real cases, masonry columns need to be strengthened for enhancing their load-carrying capacity and to develop a more ductile response. The Fiber Reinforced Polymers (FRPs) confinement of masonry columns is a well-known technique that may produce these advantages. Unfortunately, full-wrapping insulates the column from the environment; so interstitial humidity can easily occur and cause the acceleration of the masonry's decay. In order to prevent it, partial-confinement is commonly assessed instead of total-j…

Materials scienceGeography Planning and Development0211 other engineering and technologies020101 civil engineering02 engineering and technologySTRIPS0201 civil engineeringlaw.inventionlcsh:HT165.5-169.9BrittlenesslawStrain gaugediscontinuous confinementParametric statistics021110 strategic defence & security studiesanalysis-oriented modelbusiness.industryStructural engineeringEpoxyBuilding and Constructionlcsh:City planningFibre-reinforced plasticMasonrytestingUrban StudiesShear (geology)lcsh:TA1-2040visual_artconfinementvisual_art.visual_art_mediumlcsh:Engineering (General). Civil engineering (General)businessFRP
researchProduct

Lessons Learned on the Tensile and Bond Behavior of Fabric Reinforced Cementitious Matrix (FRCM) Composites

2020

Fabric Reinforced Cementitious Matrix (FRCM) composites represent an effective, compatible and cost-efficient solution for strengthening and retrofitting existing structures. A strong research effort was done to investigate the tensile and bond properties of these materials, as well as the overall behaviour of strengthened members. A Round Robin Test was organized by Rilem TC 250-CSM on 28 FRCM composites comprising basalt, carbon, glass, PBO, aramid and steel textiles, embedded in either cement, lime or geopolymer mortars, to collect an experimental dataset and define test protocols. This paper collects the outcomes of this study to highlight fundamental properties of FRCM and to investiga…

Materials scienceGeography Planning and Development0211 other engineering and technologies020101 civil engineering02 engineering and technologytensile tests0201 civil engineeringlcsh:HT165.5-169.9shear bond testsUltimate tensile strengthmedicineretrofitting; round robin test (RRT); shear bond tests; steel reinforced grout (SRG); strengthening; tensile tests; textile reinforced mortar (TRM)Composite materialCement021110 strategic defence & security studiesBond strengthretrofittingStiffnessBuilding and Constructionlcsh:City planningtextile reinforced mortar (TRM)Urban StudiesGeopolymerAramidlcsh:TA1-2040strengtheninground robin test (RRT)Round robin testRetrofitting Round Robin Test (RRT) Steel Reinforced Grout (SRG) Strengthening Shear bond tests Textile Reinforced Mortar (TRM) Tensile testsmedicine.symptomMortarlcsh:Engineering (General). Civil engineering (General)steel reinforced grout (SRG)
researchProduct

Constitutive Numerical Model of FRCM Strips Under Traction

2020

In this paper, the tensile behavior of Fiber Reinforced Cementitious Matrix (FRCM) strips is investigated through Finite Element (FE) models. The most adopted numerical modeling approaches for the simulation of the fiber-matrix interface law are described. Among them, the cohesive model is then used for the generation of FE models which are able to simulate the response under traction of FRCM strips tested in laboratory whose results are available in the technical literature. Tests on basalt, PBO and carbon coated FRCM specimens are taken into account also considering different mechanical ratios of the textile reinforcement. The comparison between FE results and experimental data allows val…

Materials scienceGeography Planning and DevelopmentTraction (engineering)0211 other engineering and technologiesNumerical modelingFRCM tensile behavior numerical modeling experimental tests interface modeling020101 civil engineering02 engineering and technologySTRIPSFRCM0201 civil engineeringlaw.inventionlcsh:HT165.5-169.9lawUltimate tensile strengthmedicinetensile behaviorComposite material021110 strategic defence & security studiesStiffnessexperimental testsBuilding and Constructionlcsh:City planningFinite element methodUrban StudiesTensile behaviornumerical modelinglcsh:TA1-2040experimental tests; FRCM; interface modeling; numerical modeling; tensile behaviorFe modelmedicine.symptominterface modelinglcsh:Engineering (General). Civil engineering (General)Frontiers in Built Environment
researchProduct

Numerical Modeling Approaches of FRCMs/SRG Confined Masonry Columns

2019

The Fabric Reinforced Cementitious Matrices (FRCMs) and Steel Reinforced Grout (SRG) are a promising strengthening solution for existing masonry since inorganic matrix is considerably compatible with historical substrates. The present paper is focused on a Finite Element (FE) analysis of masonry columns confined with FRCM composites developed by Abaqus-code. The masonry columns were modelled using a macro model approach. The model was performed by using the following functions Concrete Damage Plasticity (CDP) and the Plastic (P) in order to describe the constitutive laws of material for masonry columns and external reinforcement, respectively. Typical failures of FRCM-systems are slippage o…

Materials sciencemasonry columnsGeography Planning and Development0211 other engineering and technologiesfabric/matrix bond020101 civil engineering02 engineering and technologyengineering.material0201 civil engineeringFRCM systemslcsh:HT165.5-169.9Matrix (mathematics)Overlap zone021110 strategic defence & security studiesbusiness.industryGroutBuilding and ConstructionStructural engineeringMasonrylcsh:City planningFinite element methodUrban Studiesnumerical modelinglcsh:TA1-2040confinementengineeringCementitiousSlippagebusinesslcsh:Engineering (General). Civil engineering (General)Failure mode and effects analysisFrontiers in Built Environment
researchProduct

Energy-Efficient Resource Optimization with Wireless Power Transfer for Secure NOMA Systems

2018

In this paper, we investigate resource allocation algorithm design for secure non-orthogonal multiple access (NOMA) systems empowered by wireless power transfer. With the consideration of an existing eavesdropper, the objective is to obtain secure and energy efficient transmission among multiple users by optimizing time, power and subchannel allocation. Moreover, we also take into consideration for the practical case that the statistics of the channel state information of the eavesdropper is not available. In order to address the optimization problem and its high computational complexity, we propose an iterative algorithm with guaranteed convergence to deliver a suboptimal solution for gene…

Mathematical optimizationOptimization problemIterative methodComputer sciencewireless power transfer02 engineering and technologysecuritylangaton tiedonsiirto0203 mechanical engineeringoptimointi0202 electrical engineering electronic engineering information engineeringWirelessResource managementresource managementreceiversta213business.industryturvallisuusNOMA020206 networking & telecommunications020302 automobile design & engineeringwireless communicationChannel state informationlangaton viestintäResource allocationbusinessoptimizationEfficient energy use
researchProduct

Revenue-based adaptive deficit round robin

2005

This paper presents an adaptive resource allocation model that is based on the DRR queuing policy. The model ensures QoS requirements and tries to maximize a service provider's revenue by manipulating quantum values of the DRR scheduler. To calculate quantum values, it is proposed to use the revenue criterion that controls the allocation of free resources. The simulation considers a single node with the implemented model that serves several service classes with different QoS requirements and traffic characteristics. It is shown that the total revenue can be increased due to the allocation of unused resources to more expensive service classes. At the same time, bandwidth and delay guarantees…

Mathematical optimizationService qualityQueueing theoryComputer scienceresource allocation modelQuality of serviceTotal revenueQoSDeficit round robinService providerComputer securitycomputer.software_genreScheduling (computing)DRR queuingRevenueResource allocationcomputerQueue
researchProduct

Accelerating Application Migration in HPC

2016

It is predicted that the number of cores per node will rapidly increase with the upcoming era of exascale supercomputers. As a result, multiple applications will have to share one node and compete for the (often scarce) resources available on this node. Furthermore, the growing number of hardware components causes a decrease in the mean time between failures. Application migration between nodes has been proposed as a tool to mitigate these two problems: Bottlenecks due to resource sharing can be addressed by load balancing schemes which migrate applications; and hardware errors can often be tolerated by the system if faulty nodes are detected and processes are migrated ahead of time.

Mean time between failuresComputer sciencebusiness.industry020206 networking & telecommunications02 engineering and technologyLoad balancing (computing)Computer securitycomputer.software_genreShared resourceVirtual machine0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputerComputer network
researchProduct

A two-layer security model for accessing multimedia content in social networks

2016

La seguridad de un sitio web es hoy en día una de las principales preocupaciones de los administradores de sistemas. La seguridad es también el reto más importante al que se enfrentan los desarrolladores web a la hora de diseñar una plataforma fiable que ofrezca servicios a los usuarios públicos. Es bien sabido que el contenido multimedia en la web está en continuo crecimiento y, recientemente, este tipo de medios se utiliza cada vez más en las redes sociales. El acceso a los contenidos multimedia en el contexto de las redes sociales debe ser fácil y seguro. En este artículo se presenta un modelo de seguridad con capacidad semántica para el acceso a contenidos multimedia en las redes social…

Media type:CIENCIAS TECNOLÓGICAS [UNESCO]MultimediaSocial networkComputer sciencebusiness.industryTwo layeruser behaviorFace (sociological concept)020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer security modelUNESCO::CIENCIAS TECNOLÓGICAScomputer.software_genreComputer securityWorld Wide Webreference pattern0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSingle sign-onMulti-frequency networksocial networkbusinesscomputer
researchProduct