139 research outputs found

    Novel direct shear apparatus to evaluate internal shear strength of geosynthetic clay liners for mining applications, A

    Get PDF
    Includes bibliographical references.2016 Fall.The use of geosynthetic clay liners (GCLs) in engineering practice has grown extensively over the past three decades due to application of this material containment applications such non-hazardous solid waste, residential and commercial wastewater management, roadways, and other civil engineering construction projects. This growth has been supported by an enhanced understanding of the engineering properties of GCL as well as hydraulic and mechanical behavior for different applications. In particular, the internal shear strength of GCLs is an important design consideration since GCLs often are installed on sloped surfaces that induced internal shear and normal stresses. The objective of this study was to develop a direct shear testing apparatus to measure the internal shear strength of GCLs for use in mining applications. The direct shear apparatus was designed to support the following testing conditions for needle-punched reinforced GCLs: hydration and testing in non-standard solutions (e.g., pH ≤ 1 or pH ≥ 12); testing under high normal stresses (up to 2000 kPa); and testing at elevated temperatures (up to 80 °C). Ultra-high molecular weight polyethylene GCL shear boxes were developed to facilitate testing 300-mm-square and 150-mm-square specimens under displacement-controlled conditions. Experiments were conducted on 150-mm-square and 300-mm-square GCL specimens to (i) evaluate gripping surface effectiveness as a function of peel strength and normal stress, (ii) assess hydration procedures to adopt into a systematic shear-testing protocol, (iii) assess stress-displacement behavior for 150-mm and 300-mm GCL shear tests, and (iv) develop failure envelopes for peak shear strength (τp) and large-displacement (τld). Shear behavior and peak and large-displacement shear strengths measured on both 150-mm and 300-mm square GCL specimens compared favorably to one another as well as to data from a previous study on a similar GCL. These comparisons validated the direct shear apparatus developed in this study and support the use of small GCL test specimens to measure internal shear behavior and shear strength of reinforced GCLs. Furthermore, the pyramid-tooth gripping plates developed to transfer shear stress from the interfaces between geotextiles of the GCL and shear platens to the internal region of a GCL were effective for a needle-punched GCL with peel strength of 2170 N/m and at normal stress ≥ 100 kPa

    Effect of batch initial velocity on the glass furnace efficiency

    Get PDF
    Glass manufacturing is a heat intensive process. There is a direct coloration between the batch distribution techniques and the furnace energy consumption, productivity, and quality of the glass manufactured. All four major segments (float, container, fibre, and specialty glasses) would benefit from using an optimised batch distribution technique where possible. Oscillating batch chargers (OBC) have been in use since the early 70s, despite their superior batch shape, coverage, and in turn positive effects on the energy consumption (Soleimanian, TMS 2013) and productivity of the furnace they are almost exclusively used in container glass manufacturing. The OBC’s main difference compared with other charging methods is its ability to directly influence the batch initial velocity. This paper reports on results achieved in two CFD models (in Flow 3D and GFM) used to study effect of the machine on the overall energy consumption in the doghouse and the melt space

    Modeling and Validation of the Dynamic Host Configuration Protocol with Colored Petri Nets

    Get PDF
    Petri Networks with a graphical language are based on mathematical logic which have many uses and have capability for modeling and validation of distributed systems and concurrent applications. Colored Petri Networks (CPNs) are a type of Petri Network models that are used in modeling of systems which contain discrete and scattered events. In general, CPNs are used to evaluate system performance and demonstrate the correctness of systems. Dynamic Host Configuration Protocol (DHCP) is one of the main systems of protocols special for servers that are used for dynamic allocation of IP to the network computers (clients). In this paper, we highlight to analyze the correctness and authenticity of DHCPs with the use of CPNs with using the CPN Tools and to prove the accuracy of our protocol's performance.DOI:http://dx.doi.org/10.11591/ijece.v2i3.48

    Anonymous Random Allocation and Its Applications

    Get PDF
    Random Allocation -the random assignment of the data to the parties- is a well-studied topic in the analysis of medical or judicial data, and the context of resource distribution. Random allocation reduces the chance of bias or corruption in the relevant applications, which makes the results more reliable. This is done by preventing a special or pre-planned assignment of the data to accommodate the assessment toward the desired results. This paper provides the first formal syntax and security notion of a random allocation scheme. Based on our new security notions of anonymity, confidentiality, and data-integrity, random allocation can cover more applications such as the distributed audit system where the confidentiality of data and the anonymity of auditors are of paramount importance. Our protocol allows the parties to stay anonymous during the concurrent executions of the protocol even if they have revealed themselves at a certain execution. The revelation property gives the possibility to the parties to claim certain advantages/faults at the end of a protocol-execution (without breaking the data-privacy or anonymity in other protocol-executions). We instantiate our syntax and prove the security based on simple cryptographic components and assumptions such as the Diffie-Hellman assumption, in the random oracle model

    Vortex : Building a Lattice-based SNARK scheme with Transparent Setup

    Get PDF
    We present the first transparent and plausibly post-quantum SNARK relying on the Ring Short Integer Solution problem (Ring-SIS), a well-known assumption from lattice-based cryptography. At its core, our proof system relies on a new linear-commitment scheme named Vortex which is inspired from the work of Orion and Brakedown. Vortex uses a hash function based on Ring-SIS derived from “SWIFFT (Lyubashevsky et al., FSE08). We take advantage of the linear structure of this particular hash function to craft an efficient self-recursion technique. Although Vortex proofs have O(n)O(\sqrt{n}) size in the witness size, we show how our self-recursion technique can be used to build a SNARK scheme based on Vortex. The resulting SNARK works over any field with reasonably large 2-adicity (also known as FFT-friendly fields). Moreover, we introduce Wizard-IOP, an extension of the concept of polynomial-IOP. Working with Wizard-IOP rather than separate polynomial-IOPs provides us with a strong tool for handling a wide class of queries, needed for proving the correct executions of the complex state machines (e.g., zk-EVM as our use-case) efficiently and conveniently

    Good Faith in the Judgments of the International Court of Justice

    Get PDF
    Good faith, as one of the fundamental principles of international law, indicates the need for fairness, honesty and reasonableness in international relations. And the International Court of Justice and other international judicial authorities have been repeatedly cited. The judges of the Court have also discussed and cited the concept of good faith in their separate opinions on various occasions. The International Court of Justice, citing the principle of good faith in the settlement of international disputes, has played an effective role in objectifying some manifestations of the principle of good faith in international law and in the process of interpreting the law, creating the law, replacing the law or removing ambiguity International law - sometimes from general principles such as good faith, has made effective inferences that are helpful in understanding the content of the manifestations of good faith and its legal criteria. In the first part of the present article, we examine the principle of good faith and its various manifestations, and in the second part, we analyze some of the cases that have been invoked in the procedures of the Permanent International Court of Justice and the International Court of Justice

    A New Hybrid model of Multi-layer Perceptron Artificial Neural Network and Genetic Algorithms in Web Design Management Based on CMS

    Get PDF
    The size and complexity of websites have grown significantly during recent years. In line with this growth, the need to maintain most of the resources has been intensified. Content Management Systems (CMSs) are software that was presented in accordance with increased demands of users. With the advent of Content Management Systems, factors such as: domains, predesigned module’s development, graphics, optimization and alternative support have become factors that influenced the cost of software and web-based projects. Consecutively, these factors have challenged the previously introduced cost estimation models. This paper provides a hybrid method in order to estimate the cost of websites designed by content management systems. The proposed method uses a combination of genetic algorithm and Multilayer Perceptron (MLP). Results have been evaluated by comparing the number of correctly classified and incorrectly classified data and Kappa coefficient, which represents the correlation coefficient between the sets. According to the obtained results, the Kappa coefficient on testing data set equals to: 0.82 percent for the proposed method, 0.06 percent for genetic algorithm and 0.54 percent for MLP Artificial Neural Network (ANN). Based on these results; it can be said that, the proposed method can be used as a considered method in order to estimate the cost of websites designed by content management systems
    corecore