• Title/Summary/Keyword: Compliance Behaviour

Search Result 24, Processing Time 0.023 seconds

A Study on the Rheological Behavior Properties of Short-term Aged Asphalt Binder (단기노화 된 아스팔트 바인더의 유변학적 거동 특성에 관한 연구)

  • Park, Tae-Soon
    • International Journal of Highway Engineering
    • /
    • v.7 no.4 s.26
    • /
    • pp.203-210
    • /
    • 2005
  • The penetration and viscosity tests have been used for the evaluation of the aged asphalt binder performance change. The improved test method has been required because the conventional tests could not evaluate the viscoelastic characteristics and the real behaviour of the aged asphalt binder. The conventional test methods using a different short term aged asphalt binder were tested and the test results were expressed as the penetration index and the residual penetration. The oscillatory and rotational mode tests were performed to find out the rheological characteristics of the short term aged asphalt binder in this study. The test results showed that the change of testing frequency, the speed of the vehicle effects the complex modules and phase angles. The creep compliance and shear viscosity also showed the different test results when the short term aged asphalt binders were tested. The rheological behavior should consider when the pavement design is conducted.

  • PDF

Numerical simulation of hollow steel profiles for lightweight concrete sandwich panels

  • Brunesi, E.;Nascimbene, R.;Deyanova, M.;Pagani, C.;Zambelli, S.
    • Computers and Concrete
    • /
    • v.15 no.6
    • /
    • pp.951-972
    • /
    • 2015
  • The focus of the present study is to investigate both local and global behaviour of a precast concrete sandwich panel. The selected prototype consists of two reinforced concrete layers coupled by a system of cold-drawn steel profiles and one intermediate layer of insulating material. High-definition nonlinear finite element (FE) models, based on 3D brick and 2D interface elements, are used to assess the capacity of this technology under shear, tension and compression. Geometrical nonlinearities are accounted via large displacement-large strain formulation, whilst material nonlinearities are included, in the series of simulations, by means of Von Mises yielding criterion for steel elements and a classical total strain crack model for concrete; a bond-slip constitutive law is additionally adopted to reproduce steel profile-concrete layer interaction. First, constitutive models are calibrated on the basis of preliminary pull and pull-out tests for steel and concrete, respectively. Geometrically and materially nonlinear FE simulations are performed, in compliance with experimental tests, to validate the proposed modeling approach and characterize shear, compressive and tensile response of this system, in terms of global capacity curves and local stress/strain distributions. Based on these experimental and numerical data, the structural performance is then quantified under various loading conditions, aimed to reproduce the behaviour of this solution during production, transport, construction and service conditions.

Review of the Synthetic Rock Mass Approach (합성암반체 접근법에 대한 고찰)

  • Park, Chul-Whan;Synn, Joong-Ho;Park, Eui-Seop
    • Tunnel and Underground Space
    • /
    • v.17 no.6
    • /
    • pp.438-447
    • /
    • 2007
  • This technical report is to introduce the research on SRM (Synthetic Rock Mass) which was presented in 2007 ISRM Congress at Lisbon by Prof, Fairhurst who speak with emphasis on its importance and potential in rock engineering. The Synthetic Rock Mass approach to jointed rock mass characterization (Pierce et al. 2007) is reviewed relative to existing empirical approaches and current understanding of jointed rock mass behaviour. The review illustrates how the key factors affecting the mechanical behaviour of jointed rock masses may be considered and demonstrates that the SRM approach constitutes a significant step forward in this field. This technique, based on two well-established methods, Bonded Particle Modelling in PFC-3D (Potyondy and Cundall, 2004) and Discrete Fracture Network simulation, employs a new sliding joint model that allows for large rock volumes containing thousands of pre-existing joints to be subjected to any non-trivial stress path. Output from SRM testing includes rock mass brittleness and strength, evolution of the full compliance matrix and primary fragmentation.

Seismic retrofitting by base-isolation of r.c. framed buildings exposed to different fire scenarios

  • Mazza, Fabio;Mazza, Mirko
    • Earthquakes and Structures
    • /
    • v.13 no.3
    • /
    • pp.267-277
    • /
    • 2017
  • Base-isolation is now being adopted as a retrofitting strategy to improve seismic behaviour of reinforced concrete (r.c.) framed structures subjected to far-fault earthquakes. However, the increase in deformability of a base-isolated framed building may lead to amplification in the structural response under the long-duration horizontal pulses of high-magnitude near-fault earthquakes, which can become critical once the strength level of a fire-weakened r.c. superstructure is reduced. The aim of the present work is to investigate the nonlinear seismic response of fire-damaged r.c. framed structures retrofitted by base-isolation. For this purpose, a five-storey r.c. framed building primarily designed (as fixed-base) in compliance with a former Italian seismic code for a medium-risk zone, is to be retrofitted by the insertion of elastomeric bearings to meet the requirements of the current Italian code in a high-risk seismic zone. The nonlinear seismic response of the original (fixed-base) and retrofitted (base-isolated) test structures in a no fire situation are compared with those in the event of fire in the superstructure, where parametric temperature-time curves are defined at the first level, the first two and the upper levels. A lumped plasticity model describes the inelastic behaviour of the fire-damaged r.c. frame members, while a nonlinear force-displacement law is adopted for the elastomeric bearings. The average root-mean-square deviation of the observed spectrum from the target design spectrum together with a suitable intensity measure are chosen to select and scale near- and far-fault earthquakes on the basis of the design hypotheses adopted.

A review: Synthetic strategy control of magnetite nanoparticles production

  • Yusoff, Ahmad H.M.;Salimi, Midhat N.;Jamlos, Mohd F.
    • Advances in nano research
    • /
    • v.6 no.1
    • /
    • pp.1-19
    • /
    • 2018
  • Iron oxide nanoparticles excite researcher interest in biomedical applications due to their low cost, biocompatibility and superparamagnetism properties. Magnetic iron oxide especially magnetite ($Fe_3O_4$) possessed a superparamagnetic behaviour at certain nanosize which beneficial for drug and gene delivery, diagnosis and imaging. The properties of nanoparticles mainly depend on their synthesis procedure. There has been a massive effort in developing the best synthetic strategies to yield appropriate physico-chemical properties namely co-precipitation, thermal decomposition, microemulsions, hydrothermal and sol-gel. In this review, it is discovered that magnetite nanoparticles are best yielded by co-precipitation method owing to their simplicity and large production. However, its magnetic saturation is within range of 70-80 emu/g which is lower than thermal decomposition and hydrothermal methods (80-90 emu/g) at 100 nm. Dimension wise, less than 100 nm is produced by co-precipitation method at $70^{\circ}C-80^{\circ}C$ while thermal decomposition and hydrothermal methods could produce less than 50 nm but at very high temperature ranging between $200^{\circ}C$ and $300^{\circ}C$. Thus, co-precipitation is the optimum method for pre-compliance magnetite nanoparticles preparation (e.g., 100 nm is fit enough for biomedical applications) since thermal decomposition and hydrothermal required more sophisticated facilities.

Scattering of torsional surface waves in a three layered model structure

  • Gupta, Shishir;Pati, Prasenjit;Mandi, Anand;Kundu, Santimoy
    • Structural Engineering and Mechanics
    • /
    • v.68 no.4
    • /
    • pp.443-457
    • /
    • 2018
  • In this article, a comparative study has been made to investigate the scattering behaviour of three layered structure model on torsional surface wave. For such model intermediate layer is taken as fiber reinforced composite, resting over a dry sandy Gibson substratum and underlying by different anelastic media. We consider two distinct mediums for topmost layer. In the first case, topmost layer has been taken as fluid saturated homogeneous porous layer, while in the second case the fluid saturated porous layer has been replaced by a transversely isotropic layer. Simple form expression for the secular equation of torsional surface wave has been worked out in both the cases by executing specific boundary conditions, which comprises Whittaker's function and its derivative, for imminent result that have been elaborated asymptotically. Some special cases have been constituted which are in excellent compliance with recorded literatures. For the sake of comparative study, numerical estimation and graphical illustration have been accomplished to identify the effects of the width ratio of the layers, Biot's gravity parameter, sandy parameter, porosity parameter and other heterogeneity parameters corresponding to the layers and half spaces, horizontal compressive and tensile initial stress on the phase velocity of torsional surface wave.

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

An Exploratory Study on Digital Contents-based Life-long Sex Education Program for Persons with Mental Retardation (지적장애인 대상의 성교육 프로그램 현황과 과제 : 디지털 교육콘텐츠를 중심으로)

  • Park, Won-Hee;Choi, Yeon-Sook;Park, Seong-Taek
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.349-359
    • /
    • 2012
  • There is growing recognition that individuals with mental retardation are particularly vulnerable to sexual abuse due to multiple factors including life-long dependence on adults for care, trained compliance, social isolation, lack of education about sexuality and sexual abuse, and a societal view that devalues people with disabilities. Teaching about sexual abuse only may raise an individual's anxiety without promoting a healthy sexual identity. For many individuals with mental retardation, the provision of formal sexual health education and sexual abuse prevention training has been shown to be protective against exploitation as well as increase appropriate sexual behavior. To maximize the reach of formal sexual health education and abuse prevention promotion effort, this article suggest exploiting the internet and digital contents as delivery vehicles that have uniquely suitable communication characteristics and outstanding ability to reach large numbers of persons with mental retardation. We review the sexual health education programs, utilizing the internet and digital contents, for individuals with mental retardation. We also suggest the revised version of the Information-Motivation-Behavioral Skills (IMB) model of health behaviour change (Fisher & Fisher, 1992), and give a brief discussion of how useful this model is for constructing a life-long sex education program for persons with mental retardation.

A Study on The Relationship Between Driver Expectancy and Variable Speed Limit Under the Adverse Weather Conditions By Using A Driving Simulator (악천후 시 운전자 기대심리와 가변 제한속도간 관계정립을 위한 가상주행 시뮬레이터 연구)

  • Kim, Yongseok;Lee, Sukki;Kim, Soullam
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.6
    • /
    • pp.138-149
    • /
    • 2016
  • The study reviewed the effects of the variable speed limit under adverse weather conditions by using a driving simulator. The study assumed that the display of the reduced speed limit without any change of the weather condition and the display of the same speed limit under the change of the weather conditions violate the expectancy of drivers, so it brings the negative effects on the safety. The study regards drivers conformance as the index of the degree of the compliance of driver expectancy, and utilizes the cumulative probability density within the certain range of the speed including displayed speed limit as the quantitative measure of effectiveness. The study reviewed this assumptions by using a driving simulator. As the results, the cases assumed to violate the expectancy of drivers showed the negative effects on the driving behaviour of driver relatively.

Video Image Analysis in Accordance with Power Density of Arcing for Current Collection System in Electric Railway (전기철도 집전장치의 아크량에 따른 비디오 이미지 분석)

  • Park, Young;Lee, Kiwon;Park, Chulmin;Kim, Jae-Kwang;Jeon, Ahram;Kwon, Sam-Young;Cho, Yong Hyun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.9
    • /
    • pp.1343-1347
    • /
    • 2013
  • This paper presents an analysis methods for current collection quality in catenary system by means of video image based monitoring system. Arcing is the sparking at the interface point between pantograph and contact wire when the electric trains have traction current values at speed. Percentage of arcing at maximum line speed is measurable parameters for compliance with the requirements on dynamic behaviour of the interface between pantograph and contact wire in accordance with requirement of IEC and EN standards. The arc detector and video is installed on a train aim at the trailing contact strip according to the travel direction. The arc detector presented and measured verity of value such as the duration and power density of each arc and the video image is measured a image when the arc is occurred in pantograph. In this paper we analysis of video image in accordance with power density of arcing from arc detector and compared with video image and power density of arcing so as to produce quality of arcing from image.