22 research outputs found

    Experimental Study of Physio-Mechanical and Engineering Properties of Clayey Soil Incorporating Hydraulic Lime and Nano-Silica

    Get PDF
    Soil is one of the most abundant and frequently used materials in geotechnical engineering and construction. Soil is heterogenous material with different minerals some of which are classified as problematic minerals. The soil is classified as unacceptable for construction purpose if some of these minerals are present in the soil. Soil improvement utilizing nano materials is a novel technique to upgrade engineering and shear strength parameters of problematic soils. The effects of varying amounts of nano-silica and lime in clayey soil are investigated in this study. For this purpose, soil samples were moulded by incorporating 0, 3, 6, 9% nano silica and 0, 5, and 10% lime. The samples were tested for Atterberg limits, Plasticity index, optimum moisture content OMC, maximum dry density MDD, swelling, and unconfined compressive strength (UCS) at 7 and 28 days. The results revealed that addition of nano-silica in lime treated high plastic clay improved the plasticity index as well as UCS and swelling behaviour by a significant margin. Results highlighted that incorporation of nano silica reduced the plasticity index. UCS values of the soil increased by adding nano silica 28 days UCS increased by 10 times as compared to 7 days strength. The swelling in soil samples with 10% lime and 9% nano silica is reduced by almost 32% as compared to controlled samples. OMC is also increased by 17% meanwhile MDD is reduced by 9% when nano silica was added. The findings of this study can be used in any project that requires improved engineering and geotechnical properties of high plastic clayey soil for shallow foundation

    Selection of Alternative under the Framework of Single-Valued Neutrosophic Sets

    Get PDF

    On Soft BCK-Modules

    No full text
    In the current work, the Molodtsov’s idea of soft sets [14] is applied on the theory of BCK-modules [1]. The aim here, is to introduce the notion of soft BCK-modules and discuss its basic properties. In this regard, three theorems for soft BCK-modules isomorphism are developed. The notion of soft X−exactness of BCK-modules is introduced and its relation with soft X−isomorphism is studied. A transitivity between two soft X−exact sequences is also established

    The SSC of the Generalised Jahangir’s Graph Jm,k and its Algebraic Characterizations

    No full text
    In this article, we present important combinatorial and algebraicproperties of spanning simplicial complex (SSC) of the generalised Jahangir’sgraph Jm,k. We describe the relation to find f−vectors associatedto Δs(Jm,k) and determine the Hilbert series for the SR-ring KΔs(Jm,k).In the end, we present the associated primes of the facet ideal IF(Δs(Jm,k))and the Cohen-Macaulay characterization of the SR-ring of Δs(Jm,k).AMS (MOS) Subject Classification Codes: Primary 13-P10, Secondary 13-F20, 13-C14, 13-H10.Corresponding Author: Agha KashifKey Words: Simplicial Complexes, f-vectors, Spanning Trees, Face Ring, Hilbert Series, CohenMacaulay

    A Binomial Ideal on Triangulations of 2−Manifolds

    No full text
    In this paper, we introduce a binomial ideal P(Tn) on a simple graph Tn obtained from n−triangulation of a 2−manifols. It is discussed on two particular classes of n−triangulation graphs: the class Tn1 and the class Tn2 . The Gro¨bner bases of the binomial ideals P(Tn1 ) and P(Tn2 ) on n1−triangulation and n2−triangulation graphs Tn1 and Tn2 respectively are computed using a systematic way and it is shown that degree of polynomials in the Gro¨bner bases of these n−triangulation graphs is at most 5. Also, it is shown that the binomial ideals P(Tn1 ) and Tn2 are regular ideals.&nbsp

    Fuzzy Soft BCK-Modules

    No full text
    A BCK-module is an action of a BCK-algebra on an abelian group. In this paper, the theory of fuzzy soft sets is applied on BCKmodules and thereby introduced the notion of fuzzy soft BCK-module (fsX−module). In this regard, various algebraic operations between fsX−modules, like fsX− intersection, fsX−union etc, are studied. Also, fsX−homormorphisms for fsX−modules is defined and discussed. Moreover, fuzzy soft exactness of fsX−modules is introduced and discusse

    Virtual Machine’s Network Security

    Get PDF
    Network virtualization has become progressively unmistakable lately. It enables the creation of organizational frameworks that are expressly tailored to the requirements of distinctive organizational applications and facilitates the introduction of favorable circumstances for the occurrence and evaluation of new designs and conventions. Despite the extensive materiality of organizational virtualization, the widespread use of communication channels and steering devices raises a number of safety-related issues. To enable their use in real, large-scale settings, virtual organization foundations must be given security. In this paper, we see the details of industry's top practices for virtual organization security. We discuss some of the major risks, the main challenges associated with this type of climate, as well as the arrangements suggested in the text that aim to handle various security vantage points. Virtualization is a notable thought having applications in different fields of registering. This strategy takes into consideration the production of numerous virtual stages on a solitary actual framework, taking into consideration the execution of heterogeneous models on a similar equipment. It might likewise be used to streamline the use of actual assets, on the grounds that a manager can progressively make and erase virtual hubs to satisfy fluctuated degrees of need. Virtual Machine’s Network Security is an important topic in today’s world, due to the rapid increase in the use of virtual machines. Virtual machines provide a more efficient, cost effective and secure way of running applications and services. However, there are some security risks associated with virtual machines which must be tackled to ensure the safety and security of the network. This paper presents security principal known as Nonrepudiation which authenticates the delivery of messages and transaction using Digital Signature method. Furthermore, an overview of the security threats and solutions associated with virtual machines and their networks, including the different types of threats, solutions and best practices to protect against them. Additionally, the paper discusses the importance of monitoring and logging in virtual machines. Finally, the paper concludes with a few recommendations for countermeasure the security of virtual machines and their networks
    corecore