Tests of 4 simply supported unbonded prestressed truss concrete composite beams encased with circular steel tube were carried out. It is found that the ratio of the stress increment of the unbonded tendon to that of t...Tests of 4 simply supported unbonded prestressed truss concrete composite beams encased with circular steel tube were carried out. It is found that the ratio of the stress increment of the unbonded tendon to that of the tensile steel tube is 0.252 during the using stage,and the average crack space of beams depends on the ratio of the sum of the bottom chord steel tube's outside diameter and the secondary bottom chord steel tube's section area to the effective tensile concrete area. The coefficient of uneven crack distribution is 1.68 and the formula for the calculation of crack width is established. Test results indicate that the ultimate stress increment of unbonded tendon in the beams decreases in linearity with the increase of the composite reinforcement index β0. The pure bending region of beams accords with the plane section assumption from loading to failure. The calculation formula of ultimate stress increment of the unbonded tendon and the method to calculate the bearing capacity of normal section of beams have been presented. Besides,the method to calculate the stiffness of this sort of beams is brought forward as well.展开更多
In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme...In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system展开更多
文摘Tests of 4 simply supported unbonded prestressed truss concrete composite beams encased with circular steel tube were carried out. It is found that the ratio of the stress increment of the unbonded tendon to that of the tensile steel tube is 0.252 during the using stage,and the average crack space of beams depends on the ratio of the sum of the bottom chord steel tube's outside diameter and the secondary bottom chord steel tube's section area to the effective tensile concrete area. The coefficient of uneven crack distribution is 1.68 and the formula for the calculation of crack width is established. Test results indicate that the ultimate stress increment of unbonded tendon in the beams decreases in linearity with the increase of the composite reinforcement index β0. The pure bending region of beams accords with the plane section assumption from loading to failure. The calculation formula of ultimate stress increment of the unbonded tendon and the method to calculate the bearing capacity of normal section of beams have been presented. Besides,the method to calculate the stiffness of this sort of beams is brought forward as well.
基金This work was supported in part by the National Science Foundation Project of P.R.China,the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-14-046A2
文摘In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system