30 research outputs found

    IMPROVEMENT OF BEARING CAPACITY OF SANDY SOIL BY GROUTING

    Get PDF
    The constructional activities in the coastal areas often demand deep foundations because of the poor engineering properties and the related problems arising from weak soil at shallow depths. The very low bearing capacity of the foundation bed causes shear failure and excessive settlements. Further, the high water table and limited depth of the top sandy layer in these areas restrict the depth of foundation thereby further reducing the safe bearing capacity. Grouting, which has several applications in the field of civil engineering, was once considered as a mysterious operation. The effectiveness of grouting requires a lot of understanding, skill, meticulous attention and an intuitive perception Grout is injected under pressure into the material to be grouted until it fills the desired volume of material around the hole or until the maximum specified pressure is attained and a specific minimum grout flow is reached. the strength improvement of loose sandy soils through cement grouting Permeation grouting is a simple method of ground improvisation technique which helps to stabilize the loose soil stratum. Permeation grouting is a process of filling the pores in the soil with the cement slurry and improves the engineering properties of the possible solutions to the foundation problems by improving the properties of soil at shallow depths by using sodium silicate. The shear strength parameters in the loose and medium dense state of the soil are investigated by plate load test on the grouted soil sample by determining the correlation between load and displacement on the grouted medium

    Development and Validation of Stability Indicating RP-HPLC Method for Estimation of Nelarabine in Bulk and Phamaceutical Dosage Form.

    Get PDF
    The quality of a drug plays an important role in ensuring the safety and efficacy of the drugs. Quality assurance and control of pharmaceutical and chemical formulations is essential for ensuring the availability of safe and effective drug formulations to consumers. Hence Analysis of pure drug substances and their pharmaceutical dosage forms occupies a pivotal role in assessing the suitability to use in patients. The quality of the analytical data depends on the quality of the methods employed in generation of the data. Hence, development of rugged and robust analytical methods is very important for statutory certification of drugs and their formulations with the regulatory authorities. The present study A new method has been developed for the estimation of Nelarabine by RPHPLC method since it is a versatile tool for the qualitative and quantitative analysis of drugs and pharmaceuticals. A simple, precise, robust, economical and accurate stability indicating RP-HPLC method was developed for the estimation of Nelarabine which can be used for the routine analysis of Nelarabine in API and Pharmaceutical dosage form

    EGFR Targeted Theranostic Nanoemulsion for Image-Guided Ovarian Cancer Therapy

    Get PDF
    Platinum-based therapies are the first line treatments for most types of cancer including ovarian cancer. However, their use is associated with dose-limiting toxicities and resistance. We report initial translational studies of a theranostic nanoemulsion loaded with a cisplatin derivative, myrisplatin and pro-apoptotic agent, C6-ceramide

    Expressive Power of the Single-Object Typed Access Matrix Model

    No full text
    The single-object typed access matrix (SOTAM) model was recently introduced in the literature by Sandhu and Suri. It is a special case of Sandhu's typed access matrix (TAM) model. In SOTAM individual commands are restricted to modifying exactly one column of the access matrix (whereas individual TAM commands in general can modify multiple columns). Sandhu and Suri have outlined a simple implementation of SOTAM in a distributed environment using the familiar client-server architecture. In particular the stipulation that each command modifies a single column of the access matrix, is reflected in the desirable property that each command modifies a single access control list corresponding to that column. In this paper we show that TAM and SOTAM are formally equivalent in their expressive power. This result establishes that SOTAM has precisely the same expressive power as TAM, while having a simple implementation at the same time. In a nutshell, this result tells us that manipula..

    On the Expressive Power of the Unary Transformation Model

    No full text
    . The Transformation Model (TRM) was recently introduced [10] in the literature by Sandhu and Ganta. TRM is based on the concept of transformation of rights. The propagation of access rights in TRM is authorized entirely by existing rights for the object in question. It has been demonstrated in the earlier work that TRM is useful for expressing various kinds of consistency, confidentiality, and integrity controls. In our previous work [10], a special case of TRM named Binary Transformation Model (BTRM) was defined. We proved that BTRM is equivalent in expressive power to TRM. This result indicates that it suffices to allow testing for only two cells of the matrix. In this paper we study the relationship between TRM and the Unary Transformation Model (UTRM). In UTRM, individual commands are restricted to testing for only one cell of the matrix (whereas individual TRM commands can test for multiple cells of the matrix). Contrary to our initial conjecture (of [10]), we found that TRM and ..

    Expressive Power of the Single-Object Typed Access Matrix Model

    No full text
    The single-object typed access matrix (SOTAM) model was recently introduced in the literature by Sandhu and Suri. It is a special case of Sandhu's typed access matrix (TAM) model. In SOTAM individual commands are restricted to modifying exactly one column of the access matrix (whereas individual TAM commands in general can modify multiple columns). Sandhu and Suri have outlined a simple implementation of SOTAM in a distributed environment using the familiar client-server architecture. In particular the stipulation that each command modifies a single column of the access matrix, is reflected in the desirable property that each command modifies a single access control list corresponding to that column. In this paper we show that TAM and SOTAM are formally equivalent in their expressive power. This result establishes that SOTAM has precisely the same expressive power as TAM, while having a simple implementation at the same time. In a nutshell, this result tells us that manipulation of acc..

    On Testing for Absence of Rights in Access Control Models

    No full text
    The well-known access control model formalized by Harrison, Ruzzo, and Ullman (HRU) does not allow testing for absence of access rights in its commands. Sandhu's Typed Access Matrix (TAM) model, which introduces strong typing into the HRU model, continues this tradition. Ammann and Sandhu have recently proposed an extension of TAM called augmented TAM (ATAM), which allows testing for absence of rights. The motivation for ATAM is to express policies for dynamic separation of duties based on transaction control expressions. In this paper we study the question of whether or not testing for absence of access rights adds fundamental expressive power. We show that TAM and ATAM are formally equivalent in their expressive power. However, our construction indicates that while testing for absence of rights is theoretically unnecessary, such testing appears to be practically beneficial
    corecore