2,843 research outputs found

    Modelling of chloride transport in non-saturated concrete : from microscale to macroscale

    Full text link
    Corrosion of steel bars embedded in concrete has a great influence on structural performance and durability of reinforced concrete. Chloride penetration is considered to be a primary cause of concrete deterioration in a vast majority of structures. Therefore, modelling of chloride penetration into concrete has become an area of great interest. The present work focuses on modelling of chloride transport in concrete. The differential macroscopic equations which govern the problem were derived from the equations at the microscopic scale by comparing the porous network with a single equivalent pore whose properties are the same as the average properties of the real porous network. The resulting transport model, which accounts for diffusion, migration, advection, chloride binding and chloride precipitation, consists of three coupled differential equations. The first equation models the transport of chloride ions, while the other two model the flow of the pore water and the heat transfer. In order to calibrate the model, the material parameters to determine experimentally were identified. The differential equations were solved by means of the finite element method. The classical Galerkin method was employed for the pore solution flow and the heat transfer equations, while the streamline upwind Petrov Galerkin method was adopted for the transport equation in order to avoid spatial instabilities for advection dominated problems. The finite element codes are implemented in Matlab® . To retrieve a good understanding of the influence of each variable and parameter, a detailed sensitivity analysis of the model was carried out. In order to determine the diffusive and hygroscopic properties of the studied concretes, as well as their chloride binding capacity, an experimental analysis was performed. The model was successfully compared with experimental data obtained from an offshore oil platform located in Brazil. Moreover, apart from the main objectives, numerous results were obtained throughout this work. For instance, several diffusion coefficients and the relation between them are discussed. It is shown how the electric field set up between the ionic species depends on the gradient of the species’ concentrations. Furthermore, the capillary hysteresis effects are illustrated by a proposed model, which leads to the determination of several microstructure properties, such as the pore size distribution and the tortuosity-connectivity of the porous network. El fenómeno de corrosión del acero de refuerzo embebido en el hormigón ha tenido gran influencia en estructuras de hormigón armado, tanto en su funcionalidad estructural como en aspectos de durabilidad. La penetración de cloruros en el interior del hormigón esta considerada como el factor principal en el deterioro de la gran mayoría de estructuras. Por lo tanto, la modelización numérica de dicho fenómeno ha generado gran interés. El presente trabajo de investigación se centra en la modelización del transporte de cloruros en el interior del hormigón. Las ecuaciones diferenciales que gobiernan los fenómenos a nivel macroscópico se deducen de ecuaciones planteadas a nivel microscópico. Esto se obtiene comparando la red porosa con un poro equivalente, el cual mantiene las mismas propiedades de la red porosa real. El modelo está constituido por tres ecuaciones diferenciales acopladas que consideran el transporte de cloruros, el flujo de la solución de poro y la transferencia de calor. Con estas ecuaciones se tienen en cuenta los fenómenos de difusión, migración, advección, combinación y precipitación de cloruros. El análisis llevado a cabo en este trabajo ha definido los parámetros necesarios para calibrar el modelo. De acuerdo con ellas, se seleccionaron los ensayos experimentales a realizar. Las ecuaciones diferenciales se resolvieron mediante el método de elementos finitos. El método clásico de Galerkin se empleó para solucionar las ecuaciones de flujo de la solución de poro y de la transferencia de calor, mientras que el método streamline upwind Petrov-Galerkin se utilizó para resolver la ecuación de transporte de cloruros con la finalidad de evitar inestabilidades espaciales en problemas con advección dominante. El código de elementos finitos está implementado en Matlab® . Con el objetivo de facilitar la comprensión del grado de influencia de cada variable y parámetro, se realizó un análisis de sensibilidad detallado del modelo. Se llevó a cabo una campaña experimental sobre los hormigones estudiados, con el objeto de obtener sus propiedades difusivas, químicas e higroscópicas. El modelo se contrastó con datos experimentales obtenidos en una plataforma petrolera localizada en Brasil. Las simulaciones numéricas corroboraron los datos experimentales. Además, durante el desarrollo de la investigación se obtuvieron resultados paralelos a los planteados inicialmente. Por ejemplo, el análisis de diferentes coeficientes de difusión y la relación entre ellos. Así como también se observó que el campo eléctrico establecido entre las especies iónicas disueltas en la solución de poro depende del gradiente de concentración de las mismas. Los efectos de histéresis capilar son expresados por el modelo propuesto, el cual conduce a la determinación de una serie de propiedades microscópicas, tales como la distribución del tamaño de poro, además de la tortuosidad y conectividad de la red porosa

    SoK: Analyzing Adversarial Examples: A Framework to Study Adversary Knowledge

    Full text link
    Adversarial examples are malicious inputs to machine learning models that trigger a misclassification. This type of attack has been studied for close to a decade, and we find that there is a lack of study and formalization of adversary knowledge when mounting attacks. This has yielded a complex space of attack research with hard-to-compare threat models and attacks. We focus on the image classification domain and provide a theoretical framework to study adversary knowledge inspired by work in order theory. We present an adversarial example game, inspired by cryptographic games, to standardize attacks. We survey recent attacks in the image classification domain and classify their adversary's knowledge in our framework. From this systematization, we compile results that both confirm existing beliefs about adversary knowledge, such as the potency of information about the attacked model as well as allow us to derive new conclusions on the difficulty associated with the white-box and transferable threat models, for example, that transferable attacks might not be as difficult as previously thought

    Treatment of Acute Promyelocytic Leukemia with High White Cell Blood Counts.

    Get PDF
    Acute promyelocytic leukemia (APL) with WBC above 10 G/L has long been considered, even in the all-trans retinoic acid (ATRA) era, to carry a relatively poor prognosis (compared to APL with WBC below 10 G/L), due to increased early mortality and relapse. However, early deaths can to a large extent be avoided if specific measures are rapidly instigated, including prompt referral to a specialized center, immediate onset of ATRA and chemotherapy, treatment of coagulopathy with adequate platelet transfusional support, and prevention and management of differentiation syndrome. Strategies to reduce relapse rate include chemotherapy reinforcement with cytarabine and/or arsenic trioxide during consolidation, prolonged maintenance treatment, especially with ATRA and low dose chemotherapy, and possibly, although this is debated, intrathecal prophylaxis to prevent central nervous system relapse. By applying those measures, outcomes of patients with high risk APL have considerably improved, and have become in many studies almost similar to those of standard risk APL patients

    Leveraging Optimization for Adaptive Attacks on Image Watermarks

    Full text link
    Untrustworthy users can misuse image generators to synthesize high-quality deepfakes and engage in unethical activities. Watermarking deters misuse by marking generated content with a hidden message, enabling its detection using a secret watermarking key. A core security property of watermarking is robustness, which states that an attacker can only evade detection by substantially degrading image quality. Assessing robustness requires designing an adaptive attack for the specific watermarking algorithm. When evaluating watermarking algorithms and their (adaptive) attacks, it is challenging to determine whether an adaptive attack is optimal, i.e., the best possible attack. We solve this problem by defining an objective function and then approach adaptive attacks as an optimization problem. The core idea of our adaptive attacks is to replicate secret watermarking keys locally by creating surrogate keys that are differentiable and can be used to optimize the attack's parameters. We demonstrate for Stable Diffusion models that such an attacker can break all five surveyed watermarking methods at no visible degradation in image quality. Optimizing our attacks is efficient and requires less than 1 GPU hour to reduce the detection accuracy to 6.3% or less. Our findings emphasize the need for more rigorous robustness testing against adaptive, learnable attackers.Comment: ICLR'2

    Analyzing Adversarial Examples: A Framework to Study Adversary Knowledge

    Get PDF
    Adversarial examples are malicious inputs to trained machine learning models supplied to trigger a misclassification. This type of attack has been studied for close to a decade, and we find that there is a lack of study and formalization of adversary knowledge when mounting attacks. This has yielded a complex space of attack research with hard-to-compare threat models and attacks. We solve this in the image classification domain by providing a theoretical framework to study adversary knowledge inspired by work in order theory. We present an adversarial example game, based on cryptographic games, to standardize attack procedures. We survey recent attacks in the image classification domain that showcase the current state of adversarial example research. Together with our formalization, we compile results that both confirm existing beliefs about adversary knowledge, such as the potency of information about the attacked model as well as allow us to derive new conclusions on the difficulty associated with the white-box and transferable threat models, for example, transferable attacks might not be as difficult as previously thought

    A European survey on the detection and management of iron overload in transfusion-dependent patients with MDS

    Get PDF
    International audienceTo better understand the detection and management of iron overload in transfusion-dependent patients with myelodysplastic syndromes (MDS), a 15-min web- or paper-based survey was conducted among 338 European physicians from 27 countries. Respondents had a mean of 18 years of clinical experience. Forty-six percent and 27% of physicians noted that detecting and treating iron overload were either "very important" or "important," respectively. The main reason for not actively exploring iron overload was related to poor patient prognosis, while the main reasons for not initiating iron chelation therapy were poor patient prognosis and older patient age. Thirty-seven percent and 31% of physicians believed that treating iron overload in these patients was "very important" or "important," respectively. Ninety percent of physicians prescribed iron chelation therapy, and 38% of transfusion-dependent patients received iron chelation therapy. The key reasons for not initiating iron chelation therapy were related to poor patient prognosis (72%), patient age ≥85 years (50%), and comorbidities (34%). The views of these experienced MDS physicians reflect available international MDS treatment guidelines

    Modelling of chloride transport in non-saturated concrete : from microscale to macroscale

    Get PDF
    A model for chloride transport in concrete is proposed. The model accounts for transport several transport mechanisms such as diffusion, advection, migration, etc. This work shows the chloride transport equations at the macroscopic scale in non-saturated concrete. The equations involve diffusion, migration, capillary suction, chloride combination and precipitation mechanisms. The material is assumed to be infinitely rigid, though the porosity can change under influence of chloride binding and precipitation. The involved microscopic and macroscopic properties of the materials are measured by standardized methods. The variables which must be imposed on the boundaries are temperature, relative humidity and chloride concentration. The output data of the model are the free, bound, precipitated and total chloride ion concentrations, as well as the pore solution content and the porosity. The proposed equations are solved by means of the finite element method (FEM) implemented in MATLAB (classical Galerkin formulation and the streamline upwind Petrov-Galerkin (SUPG) method to avoid spatial instabilities for advection dominated flows)
    • …
    corecore