270 research outputs found
Analyse de l’endommagement et ses conséquences sur les propriétés mécaniques
Le vieillissement thermique d’un jonc composite carbone/époxy a été étudié dans l’air entre 160 et 220 °C par tomographie X, microscopie optique et flexion trois points. La thermo-oxydation de la matrice affecte une couche superficielle trop fine pour pouvoir altérer les propriétés mécaniques. La thermolyse de la matrice est donc le principal mode de dégradation. Elle conduit à la formation de longs microcanaux parallèles aux fibres dans les régions les plus riches en matrice du cœur du jonc. Leur multiplication et leur coalescence entraînent une chute progressive du module d’élasticité et, dès que le taux de porosité atteint une valeur critique de l’ordre de 3,6 %, une chute catastrophique de la contrainte à rupture. Sur la base de ces résultats, des équations reliant l’évolution des propriétés mécaniques à des critères d’endommagement dérivés du taux de porosité ont été établies
Recommended from our members
PowerDuck: A GOOSE Data Set of Cyberattacks in Substations
Power grids worldwide are increasingly victims of cyberattacks, where
attackers can cause immense damage to critical infrastructure. The growing
digitalization and networking in power grids combined with insufficient
protection against cyberattacks further exacerbate this trend. Hence, security
engineers and researchers must counter these new risks by continuously
improving security measures. Data sets of real network traffic during
cyberattacks play a decisive role in analyzing and understanding such attacks.
Therefore, this paper presents PowerDuck, a publicly available security data
set containing network traces of GOOSE communication in a physical substation
testbed. The data set includes recordings of various scenarios with and without
the presence of attacks. Furthermore, all network packets originating from the
attacker are clearly labeled to facilitate their identification. We thus
envision PowerDuck improving and complementing existing data sets of
substations, which are often generated synthetically, thus enhancing the
security of power grids
Development of the One-Sided Nonlinear Adaptive Doppler Shift Estimation
The new development of a one-sided nonlinear adaptive shift estimation technique (NADSET) is introduced. The background of the algorithm and a brief overview of NADSET are presented. The new technique is applied to the wind parameter estimates from a 2-micron wavelength coherent Doppler lidar system called VALIDAR located in NASA Langley Research Center in Virginia. The new technique enhances wind parameters such as Doppler shift and power estimates in low Signal-To-Noise-Ratio (SNR) regimes using the estimates in high SNR regimes as the algorithm scans the range bins from low to high altitude. The original NADSET utilizes the statistics in both the lower and the higher range bins to refine the wind parameter estimates in between. The results of the two different approaches of NADSET are compared
When and How to Aggregate Message Authentication Codes on Lossy Channels?
Aggregation of message authentication codes (MACs) is a proven and efficient method to preserve valuable bandwidth in resource-constrained environments: Instead of appending a long authentication tag to each message, the integrity protection of multiple messages is aggregated into a single tag. However, while such aggregation saves bandwidth, a single lost message typically means that authentication information for multiple messages cannot be verified anymore. With the significant increase of bandwidth-constrained lossy communication, as applications shift towards wireless channels, it thus becomes paramount to study the impact of packet loss on the diverse MAC aggregation schemes proposed over the past 15 years to assess when and how to aggregate message authentication. Therefore, we empirically study all relevant MAC aggregation schemes in the context of lossy channels, investigating achievable goodput improvements, the resulting verification delays, processing overhead, and resilience to denial-of-service attacks. Our analysis shows the importance of carefully choosing and configuring MAC aggregation, as selecting and correctly parameterizing the right scheme can, e.g., improve goodput by 39% to 444%, depending on the scenario. However, since no aggregation scheme performs best in all scenarios, we provide guidelines for network operators to select optimal schemes and parameterizations suiting specific network settings
Past, present and future of information and knowledge sharing in the construction industry: Towards semantic service-based e-construction
The paper reviews product data technology initiatives in the construction sector and provides a synthesis of related ICT industry needs. A comparison between (a) the data centric characteristics of Product Data Technology (PDT) and (b) ontology with a focus on semantics, is given, highlighting the pros and cons of each approach. The paper advocates the migration from data-centric application integration to ontology-based business process support, and proposes inter-enterprise collaboration architectures and frameworks based on semantic services, underpinned by ontology-based knowledge structures. The paper discusses the main reasons behind the low industry take up of product data technology, and proposes a preliminary roadmap for the wide industry diffusion of the proposed approach. In this respect, the paper stresses the value of adopting alliance-based modes of operation
- …