44 resultados para simulated security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The literature relating to road surface failure and design is briefly reviewed and the conventional methods for assessing the road damaging effects of dynamic tire forces are examined. A new time domain technique for analyzing dynamic tire forces and four associated road damage criteria are presented. The force criteria are used to examine the road damaging characteristics of a simple tandem-axle vehicle model for a range of speed and road roughness conditions. It is concluded that for the proposed criteria, the theoretical service life of road surfaces that are prone to fatigue failure may be reduced significantly by the dynamic component of wheel forces. The damage done to approximately five per cent of the road surface area during the passage of a theoretical model vehicle at typical highway speeds may be increased by as much as four times.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents for the first time an investigation and comparison of the superjunction IGBT (SJBT) as proposed in [1,2] and the current state of art Field Stop IGBT [3,4]. Simulation results indicate the superior performance of the superjunction IGBT under switching conditions. For the same conditions, at a collector current density of 100A/cm2 and on-state voltage 1.6 V the switching off losses for a SJBT and Field-Stop IGBT are 1 and 4.5 mJ/cm 2 respectively. © 2006 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is growing interest in Discovery Services for locating RFID and supply chain data between companies globally, to obtain product lifecycle information for individual objects. Discovery Services are heralded as a means to find serial-level data from previously unknown parties, however more realistically they provide a means to reduce the communications load on the information services, the network and the requesting client application. Attempts to design a standardised Discovery Service will not succeed unless security is considered in every aspect of the design. In this paper we clearly show that security cannot be bolted-on in the form of access control, although this is also required. The basic communication model of the Discovery Service critically affects who shares what data with whom, and what level of trust is required between the interacting parties. © 2009 IEEE.