• Title/Summary/Keyword: Time dependent behaviour

Search Result 86, Processing Time 0.021 seconds

Estimation of Transient Creep Crack-tip Stress Fields for SE(B) specimen under Elastic-Plastic-Creep Conditions (탄성-소성-크리프 상태에서 SE(B) 시편의 천이크리프 균열 선단 응력장 평가)

  • Lee, Han-Sang;Je, Jin-Ho;Kim, Dong-Jun;Kim, Yun-Jae
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.39 no.10
    • /
    • pp.1001-1010
    • /
    • 2015
  • This paper estimates the time-dependent crack-tip stress fields under elastic-plastic-creep conditions. We perform Finite-Element (FE) transient creep analyses for a Single-Edge-notched-Bend (SEB) specimen. We investigate the effect of the initial plasticity on the transient creep by systematically varying the magnitude of the initial step-load. We consider both the same stress exponent and different stress exponent in the power-law creep and plasticity to determine the elastic-plastic-creep behaviour. To estimation of the crack-tip stress fields, we compare FE analysis results with those obtained numerically formulas. In addition, we propose a new equation to predict the crack-tip stress fields when the creep exponent is different from the plastic exponent.

Rock burst criteria of deep residual coal pillars in an underground coal mine: a case study

  • Qiu, Pengqi;Wang, Jun;Ning, Jianguo;Liu, Xuesheng;Hu, Shanchao;Gu, Qingheng
    • Geomechanics and Engineering
    • /
    • v.19 no.6
    • /
    • pp.499-511
    • /
    • 2019
  • The reliability of reinforced concrete structures is frequently compromised by the deterioration caused by reinforcement corrosion. Evaluating the effect caused by reinforcement corrosion on structural behaviour of corrosion damaged concrete structures is essential for effective and reliable infrastructure management. In lifecycle management of corrosion affected reinforced concrete structures, it is difficult to correctly assess the lifecycle performance due to the uncertainties associated with structural resistance deterioration. This paper presents a stochastic deterioration modelling approach to evaluate the performance deterioration of corroded concrete structures during their service life. The flexural strength deterioration is analytically predicted on the basis of bond strength evolution caused by reinforcement corrosion, which is examined by the experimental and field data available. An assessment criterion is defined to evaluate the flexural strength deterioration for the time-dependent reliability analysis. The results from the worked examples show that the proposed approach is capable of evaluating the structural reliability of corrosion damaged concrete structures.

Smart monitoring analysis system for tunnels in heterogeneous rock mass

  • Kim, Chang-Yong;Hong, Sung-Wan;Bae, Gyu-Jin;Kim, Kwang-Yeom;Schubert, Wulf
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2003.11a
    • /
    • pp.255-261
    • /
    • 2003
  • Tunnelling in poor and heterogeneous ground is a difficult task. Even with a good geological investigation, uncertainties with respect to the local rock mass structure will remain. Especially for such conditions, a reliable short-term prediction of the conditions ahead and outside the tunnel profile are of paramount importance for the choice of appropriate excavation and support methods. The information contained in the absolute displacement monitoring data allows a comprehensive evaluation of the displacements and the determination of the behaviour and influence of an anisotropic rock mass. Case histories and with numerical simulations show, that changes in the displacement vector orientation can indicate changing rock mass conditions ahead of the tunnel face (Schubert & Budil 1995, Steindorfer & Schubert 1997). Further research has been conducted to quantify the influence of weak zones on stresses and displacements (Grossauer 2001). Sellner (2000) developed software, which allows predicting displacements (GeoFit$\circledR$). The function parameters describe the time and advance dependent deformation of a tunnel. Routinely applying this method at each measuring section allows determining trends of those parameters. It shows, that the trends of parameter sets indicate changes in the stiffness of the rock mass outside the tunnel in a similar way, as the displacement vector orientation does. Three-dimensional Finite Element simulations of different weakness zone properties, thicknesses, and orientations relative to the tunnel axis were carried out and the function parameters evaluated from the results. The results are compared to monitoring results from alpine tunnels in heterogeneous rock. The good qualitative correlation between trends observed on site and numerical results gives hope that by a routine determination of the function parameters during excavation the prediction of rock mass conditions ahead of the tunnel face can be improved. Implementing the rules developed from experience and simulations into the monitoring data evaluation program allows to automatically issuing information on the expected rock mass quality ahead of the tunnel.

  • PDF

Excess Pore Water Pressure Response in Soft Clay under Embankment (성토하부 연약지반에서의 과잉간극수압 거동)

  • Kim, Yun-Tae;Kim, Nak-Kyung
    • Journal of the Korean Geotechnical Society
    • /
    • v.18 no.3
    • /
    • pp.105-112
    • /
    • 2002
  • Increases in excess pore water pressure without change of surcharge load were reported in clay underneath embankment at Berthierville and Olga sites after the end of construction. These abnormal phenomena could not be explained by classical consolidation theory. This paper presents a nonlinear viscoplastic model to interpret an increase in pore water pressure on natural clay, The proposed model can consider the combined processes of pore water pressure dissipation according to Darcy's law and pore water pressure generation due to viscoplastic strain, as well as time-dependent viscoplastic behaviour and strain rate dependency of preconsolidation pressure. The calculated results using numerical analysis are compared with measured ones under embankments built on soft clay at Berthierville and Olga in Quebec, Canada. It may be possible to explain the phenomenon of excess pore water pressure increase after the end of construction using the proposed nonlinear viscoplastic model.

An Entropy Masking Model for Image and Video Watermarking (영상 워터마킹을 위한 엔트로피 마스킹 모델)

  • Kim, Seong-Whan;Shan Suthaharan
    • The KIPS Transactions:PartB
    • /
    • v.10B no.5
    • /
    • pp.491-496
    • /
    • 2003
  • We present a new watermark design tool for digital images and digital videos that are based on human visual system (HVS) characteristics. In this tool, basic mechanisms (inhibitory and excitatory behaviour of cells) of HVS are used to determine image dependent upper bound values on watermark insertion. This allows us to insert maximai allowable transparent watermark, which in turn is extremely hard to attack with common image processing, Motion Picture Experts Group (MPEG) compression. As the number of details (e.g. edges) increases in an image, the HVS decrease its sensitivity to the details. In the same manner, as the number of motion increases in a video signal, the HVS decrease its sensitivity to the motions. We model this decreased sensitivity to the details and motions as an (motion) entropy masking. Entropy masking model can be efficiently used to increase the robustness of image and video watermarks. We have shown that our entropy-masking model provides watermark scheme with increased transparency and henceforth increased robustness.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.