979 resultados para mixed transfer functions


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Structural damage detection using measured dynamic data for pattern recognition is a promising approach. These pattern recognition techniques utilize artificial neural networks and genetic algorithm to match pattern features. In this study, an artificial neural network–based damage detection method using frequency response functions is presented, which can effectively detect nonlinear damages for a given level of excitation. The main objective of this article is to present a feasible method for structural vibration–based health monitoring, which reduces the dimension of the initial frequency response function data and transforms it into new damage indices and employs artificial neural network method for detecting different levels of nonlinearity using recognized damage patterns from the proposed algorithm. Experimental data of the three-story bookshelf structure at Los Alamos National Laboratory are used to validate the proposed method. Results showed that the levels of nonlinear damages can be identified precisely by the developed artificial neural networks. Moreover, it is identified that artificial neural networks trained with summation frequency response functions give higher precise damage detection results compared to the accuracy of artificial neural networks trained with individual frequency response functions. The proposed method is therefore a promising tool for structural assessment in a real structure because it shows reliable results with experimental data for nonlinear damage detection which renders the frequency response function–based method convenient for structural health monitoring.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Busway stations are the interface between passengers and services. The station is crucial to line operation as it is typically the only location where buses can pass each other. Congestion may occur here when buses manoeuvring into and out of the platform lane interfere with bus flow, or when a queue of buses forms upstream of the platform lane blocking the passing lane. Further, some systems include operation where express buses do not observe the station, resulting in a proportion of non-stopping buses. It is important to understand the operation of the station under this type of operation and its effect on busway capacity. This study uses microscopic simulation to treat the busway station operation and to analyse the relationship between station potential capacity where all buses stop, and Mixed Potential Capacity where there is a mixture of stopping and non-stopping buses. First, the micro simulation technique is used to analyze the All Stopping Buses (ASB) scenario and then statistical model is tuned and calibrated for a specified range of controlled scenarios of dwell time characteristics Subsequently, a mathematical model is developed for Mixed Stopping Buses (MSB) Potential Capacity by introducing different proportions of express (or non-stopping) buses. The proposed models for a busway station bus capacity provide a better understanding of operation and are useful to transit agencies in busway planning, design and operation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Busway stations are the interface between passengers and services. The station is crucial to line operation as it is typically the only location where buses can pass each other. Congestion may occur here when buses manoeuvring into and out of the platform lane interfere with bus flow, or when a queue of buses forms upstream of the platform lane blocking the passing lane. Further, some systems include operation where express buses do not observe the station, resulting in a proportion of non-stopping buses. It is important to understand the operation of the station under this type of operation and its effect on busway capacity. This study uses microscopic simulation to treat the busway station operation and to analyse the relationship between station potential capacity where all buses stop, and Mixed Potential Capacity where there is a mixture of stopping and non-stopping buses. First, the micro simulation technique is used to analyze the All Stopping Buses (ASB) scenario and then statistical model is tuned and calibrated for a specified range of controlled scenarios of dwell time characteristics Subsequently, a mathematical model is developed for Mixed Stopping Buses (MSB) Potential Capacity by introducing different proportions of express (or non-stopping) buses. The proposed models for a busway station bus capacity provide a better understanding of operation and are useful to transit agencies in busway planning, design and operation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Numerical study has been performed in this study to investigate the turbulent convection heat transfer on a rectangular plate mounted over a flat surface. Thermal and fluid dynamic performances of extended surfaces having various types of lateral perforations with square, circular, triangular and hexagonal cross sections are investigated. RANS (Reynolds averaged Navier–Stokes) based modified k–ω turbulence model is used to calculate the fluid flow and heat transfer parameters. Numerical results are compared with the results of previously published experimental data and obtained results are in reasonable agreement. Flow and heat transfer parameters are presented for Reynolds numbers from 2000 to 5000 based on the fin thickness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The need to attract and retain a high calibre cadre of public servants today has resulted in a renaissance of interest in public service motivation (PSM) within public management literature. This article outlines a study of PSM with graduate employees within an Australian public sector. The study extends our understanding of PSM by adopting a longitudinal, mixed method design, including surveys and individual interviews, to consider the effects of socialisation on levels of PSM. Results show an organisation's mission and values do not affect individual PSM while work type and communication style is vital and organisational socialisation can provide a negative influence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A series of Pt(II) diimine complexes bearing benzothiazolylfluorenyl (BTZ-F8), diphenylaminofluorenyl (NPh2- F8), or naphthalimidylfluorenyl (NI-F8) motifs on the bipyridyl or acetylide ligands (Pt-4−Pt-8), (i.e., {4,4′-bis[7-R1-F8-(≡)n-]bpy}Pt(7- R2-F8- ≡ -)2, where F8 = 9,9′-di(2-ethylhexyl)fluorene, bpy = 2,2′- bipyridine, Pt-4: R1 = R2 = BTZ, n = 0; Pt-5: R1 = BTZ, R2 = NI, n = 0; Pt-6: R1 = R2 = BTZ, n = 1; Pt-7: R1 = BTZ, R2 = NPh2, n = 1; Pt- 8: R1 = NPh2, R2 = BTZ, n = 1) were synthesized. Their ground-state and excited-state properties and reverse saturable absorption performances were systematically investigated. The influence of these motifs on the photophysics of the complexes was investigated by spectroscopic methods and simulated by time-dependent density functional theory (TDDFT). The intense absorption bands below 410 nm for these complexes is assigned to predominantly 1π,π* transitions localized on either the bipyridine or the acetylide ligands; while the broad low-energy absorption bands between 420 and 575 nm are attributed to essentially 1MLCT (metal-to-ligand charge transfer)/ 1LLCT (ligand-to-ligand charge transfer) transitions, likely mixed with some 1ILCT (intraligand charge transfer) transition for Pt-4−Pt-7, and predominantly 1ILCT transition admixing with minor 1MLCT/1LLCT characters for Pt-8. The different substituents on the acetylide and bipyridyl ligands, and the degrees of π-conjugation in the bipyridyl ligand influence both the 1π,π* and charge transfer transitions pronouncedly. All complexes are emissive at room temperature. Upon excitation at their respective absorption band maxima, Pt-4, Pt-6, and Pt-8 exhibit acetylide ligand localized 1π,π* fluorescence and 3MLCT/3LLCT phosphorescence in CH2Cl2, while Pt-5 manifests 1ILCT fluorescence and 3ILCT phosphorescence. However, only 1LLCT fluorescence was observed for Pt-7 at room temperature. The nanosecond transient absorption study was carried out for Pt-4−Pt-8 in CH3CN. Except for Pt-7 that contains NPh2 at the acetylide ligands, Pt-4−Pt-6 and Pt-8 all exhibit weak to moderate excited-state absorption in the visible spectral region. Reverse saturable absorption (RSA) of these complexes was demonstrated at 532 nm using 4.1 ns laser pulses in a 2 mm cuvette. The strength of RSA follows this trend: Pt-4 > Pt-5 > Pt-7 > Pt-6 > Pt-8. Incorporation of electron-donating substituent NPh2 on the bipyridyl ligand significantly decreases the RSA, while shorter π-conjugation in the bipyridyl ligand increases the RSA. Therefore, the substituent at either the acetylide ligands or the bipyridyl ligand could affect the singlet and triplet excited-state characteristics significantly, which strongly influences the RSA efficiency.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimage attack of Kelsey and Schneier, the herding attack of Kelsey and Kohno and the multicollision attack of Joux. Our attacks also apply to a large class of cascaded hash functions. Our second preimage attacks on the cascaded hash functions improve the results of Joux presented at Crypto’04. We also apply our attacks to the MD2 and GOST hash functions. Our second preimage attacks on the MD2 and GOST hash functions improve the previous best known short-cut second preimage attacks on these hash functions by factors of at least 226 and 254, respectively. Our herding and multicollision attacks on the hash functions based on generic checksum functions (e.g., one-way) are a special case of the attacks on the cascaded iterated hash functions previously analysed by Dunkelman and Preneel and are not better than their attacks. On hash functions with easily invertible checksums, our multicollision and herding attacks (if the hash value is short as in MD2) are more efficient than those of Dunkelman and Preneel.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the modern era of information and communication technology, cryptographic hash functions play an important role in ensuring the authenticity, integrity, and nonrepudiation goals of information security as well as efficient information processing. This entry provides an overview of the role of hash functions in information security, popular hash function designs, some important analytical results, and recent advances in this field.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Flexor digitorum longus transfer and medial displacement alcaneal osteotomy is a wellrecognised form of treatment or stage II posterior tibial tendon dysfunction. Although excellent short- and medium-term results have been reported, the long-term outcome is unknown. We reviewed the clinical outcome of 31 patients with a symptomatic flexible flatfoot deformity who underwent this procedure between 1994 and 1996. There were 21 women and ten men with a mean age of 54.3 years (42 to 70). The mean follow-up was 15.2 years (11.4 to 16.5). All scores improved significantly (p < 0.001). The mean American Orthopedic Foot and Ankle Society (AOFAS) score improved from 48.4 pre-operatively to 90.3 (54 to 100) at the final follow-up. The mean pain component improved from 12.3 to 35.2 (20 to 40). The mean function score improved from 35.2 to 45.6 (30 to 50). The mean visual analogue score for pain improved from 7.3 to 1.3 (0 to 6). The mean Short Form-36 physical component score was 40.6 (SD 8.9), and this showed a significant correlation with the mean AOFAS score (r = 0.68, p = 0.005). A total of 27 patients (87%) were pain free and functioning well at the final follow-up. We believe that flexor digitorum longus transfer and calcaneal osteotomy provides long-term pain relief and satisfactory function in the treatment of stage II posterior tibial tendon dysfunction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Typical wireless power transfer systems utilize series compensation circuit which is based on magnetic coupling and resonance principles that was first developed by Tesla. However, changes in coupling caused by gap distance, alignment and orientation variations can lead to reduce power transfer efficiencies and the transferred power levels. This paper proposes impedance matched circuit to reduce frequency bifurcation effect and improve on the transferred power level, efficiency and total harmonic distortion (THD) performance of the series compensation circuit. A comprehensive mathematical analysis is performed for both series and impedance matched circuits to show the frequency bifurcation effects in terms of input impedance, variations in transferred power levels and efficiencies. Matlab/Simulink results validate the theoretical analysis and shows the circuits’ THD performance when circuits are fed with power electronic converters.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Achieving high efficiency with improved power transfer range and misalignment tolerance is the major design challenge in realizing Wireless Power Transfer (WPT) systems for industrial applications. Resonant coils must be carefully designed to achieve highest possible system performance by fully utilizing the available space. High quality factor and enhanced electromagnetic coupling are key indices which determine the system performance. In this paper, design parameter extraction and quality factor optimization of multi layered helical coils are presented using finite element analysis (FEA) simulations. In addition, a novel Toroidal Shaped Spiral (TSS) coil is proposed to increase power transfer range and misalignment tolerance. The proposed shapes and recommendations can be used to design high efficiency WPT resonator in a limited space.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis investigated the complexity of busway operation with stopping and non-stopping buses using field data and microscopic simulation modelling. The proposed approach made significant recommendations to transit authorities to achieve the most practicable system capacity for existing and new busways. The empirical equations developed in this research and newly introduced analysis methods will be ideal tools for transit planners to achieve optimal reliability of busways.