3,050 research outputs found

    Mechanical properties of the concrete containing porcelain waste as sand

    Get PDF
    The demand of concrete have been increases on a daily bases which consume a lot of natural resource such as sand and gravel, there is an immediate need for finding suitable alternative which can be used to replace sand partially with another materials with high propor-tion . Ceramic waste is one of the strongest research areas that include the activity of replacement in all the sides of construction materi-als. This research aims to improve the performance of concrete using ceramic waste, and demonstrate the performance of mechanical properties to the concrete with partial replacement of sand by using waste porcelain. For these, we analyzed the mechanical properties of the concrete such as compressive strength, split tensile and flexural strength, the specimen were measured based on 10% ,20% ,30% ,40%, and 50% weight ratio of replace sand with waste porcelain at different time under water for 7 days , 28 days , 60 days . The optimum consideration were given to mechanical properties of the concrete, at different amount of ceramic waste as sand

    Boosting Multi-Core Reachability Performance with Shared Hash Tables

    Get PDF
    This paper focuses on data structures for multi-core reachability, which is a key component in model checking algorithms and other verification methods. A cornerstone of an efficient solution is the storage of visited states. In related work, static partitioning of the state space was combined with thread-local storage and resulted in reasonable speedups, but left open whether improvements are possible. In this paper, we present a scaling solution for shared state storage which is based on a lockless hash table implementation. The solution is specifically designed for the cache architecture of modern CPUs. Because model checking algorithms impose loose requirements on the hash table operations, their design can be streamlined substantially compared to related work on lockless hash tables. Still, an implementation of the hash table presented here has dozens of sensitive performance parameters (bucket size, cache line size, data layout, probing sequence, etc.). We analyzed their impact and compared the resulting speedups with related tools. Our implementation outperforms two state-of-the-art multi-core model checkers (SPIN and DiVinE) by a substantial margin, while placing fewer constraints on the load balancing and search algorithms.Comment: preliminary repor

    Artificial intelligence in the cyber domain: Offense and defense

    Get PDF
    Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis. In the cybersecurity domain, AI-based techniques can provide better cyber defense tools and help adversaries improve methods of attack. However, malicious actors are aware of the new prospects too and will probably attempt to use them for nefarious purposes. This survey paper aims at providing an overview of how artificial intelligence can be used in the context of cybersecurity in both offense and defense.Web of Science123art. no. 41
    • …
    corecore