GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Polymer and Materials Science  (28)
  • Engineering General  (7)
  • Computer science -- Congresses.  (2)
  • Decision making-Congresses.  (2)
  • 1
    Keywords: Computer science -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1263 pages)
    Edition: 1st ed.
    ISBN: 9788132216650
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.243
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Committee -- Contents -- 1 Image and Template Security for Palmprint -- Abstract -- 1…Introduction -- 2…Image Protection -- 2.1 Chaotic Mixing -- 2.2 Watermarking -- 3…Template Security -- 3.1 Proposed System -- 4…Conclusion -- References -- 2 Extending Network Lifetime by Time-Constrained Data Aggregation in Wireless Sensor Networks -- Abstract -- 1…Introduction -- 2…Related Work -- 3…System Model and Problem Definition -- 4…Solution and Implementation -- 5…Conclusion -- References -- 3 The Complex Network Analysis of Power Grid: A Case Study of the West Bengal Power Network -- Abstract -- 1…Introduction -- 2…Fundamentals of Power System as a Graph Theoretic Model -- 3…Modeling the Topology of Power Grid as a Complex Network -- 3.1 Topological Analysis of Power Grid -- 3.1.1 Number of Links (m) -- 3.1.2 Average Nodal Degree ( \langle k \rangle ) -- 3.1.3 Ratio Parameter (r) -- 3.1.4 Pearson Coefficient ( \rho ) -- 3.1.5 Degree Distribution -- 3.1.6 Clustering Coefficient -- 3.1.7 Average Shortest Path -- 3.2 Random Graphs (ER) -- 3.3 Preferential Attachment (PA) -- 4…Experimental Results and Discussions -- 5…Conclusions -- References -- 4 Comparison and Analysis of Node Deployment for Efficient Coverage in Sensor Network -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 2.1 Efficient Coverage Area Ratio Calculation -- 2.2 Sensor and Coverage Model -- 3…Sensor Node Deployment and Coverage Area Calculation -- 3.1 Sensor Node Deployment Based on Square Pattern -- 3.1.1 Nine Sensors at the Vertices of Square -- 3.1.2 Sensor Nodes at the Center of Sixteen Circles -- 3.2 Sensor Node Deployments Based on Triangular Pattern -- 3.2.1 Sensor Deployment at the Three Vertices of a Triangle -- 3.2.2 Sensor Deployment at Vertexes of the Rhomb -- 3.2.3 Sensor Deployment at a Meeting Circle of Six Circles. , 4…Comparison and Result Analysis -- 4.1 Total Coverage Area Versus Number of Nodes -- 4.2 Net Efficient Coverage Area Ratio Versus Number of Nodes -- 5…Conclusion -- References -- 5 Performance Analysis of Routing Protocols for VANETs with Real Vehicular Traces -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Overview of LAR, DSR, and AODV Protocols -- 4…Problem Formulation -- 4.1 Assumption -- 4.2 Intelligent Driver Model with Intersection Management -- 5…Simulation Environments and Result Analysis -- 5.1 Packet Delivery Ratio -- 6…Conclusions -- References -- 6 A Bluetooth-Based Autonomous Mining System -- Abstract -- 1…Motivation -- 2…Why a Wireless System? -- 3…Why Bluetooth? -- 4…Methodology -- 5…Flowcharts -- 6…Algorithms -- 6.1 Database Entry -- 6.2 Advance Search -- 6.3 Scanning -- 7…Results/Conclusion -- 8…Related Work -- 8.1 Tracking Systems Based on Triangulation Method -- 8.2 Tracking Systems Based on Scanning Technique -- 8.3 Epidemic Communication -- References -- 7 Transistor Representation of a Low-Power Reversible 32-Bit Comparator -- Abstract -- 1…Introduction -- 2…Reversible Logic Gates -- 3…Literature Survey -- 4…Proposed 3 x 3 Reversible Gates -- 4.1 Proposed Reversible Gate1 -- 4.2 Proposed Reversible Gate2 -- 4.3 Realization of the Classical Operations -- 5…Transistor Implementation of the Proposed Reversible Gates Using GDI Method -- 5.1 Transistor Implementation of Proposed Reversible Gate1 -- 5.2 Transistor Implementation of Proposed Reversible Gate2 -- 6…Proposed Design of 1-Bit Comparator -- 7…Realization of Proposed 4-Bit Comparator -- 7.1 Logic Diagram to Find the Greater of Two 4-Bit Numbers -- 7.2 Logic Diagram to Find the Equality of Two 4-Bit Numbers -- 7.3 Logic Diagram to Find the Smaller of Two 4-Bit Numbers -- 8…Realization of 32-Bit Comparator -- 9…Simulation Results -- 10…Conclusion. , 8 Performance Enhancement of Brillouin Distributed Temperature Sensor Using Optimized Fiber -- Abstract -- 1…Introduction -- 2…Optimization -- 3…Proposed Model -- 4…Results -- 5…Conclusion -- References -- 9 To Study the Architectural Designs of a Proposed Comprehensive Software Extractor for Reengineering Tool: A Literature Survey -- Abstract -- 1…Introduction -- 2…Functional Requirement for Reengineering Tool -- 3…Extractor in Details -- 4…Conclusions -- References -- 10 Detection of Web-Based Attacks by Analyzing Web Server Log Files -- Abstract -- 1…Introduction and Background -- 2…Web-Based Attacks -- 3…Web Server Log Files -- 4…Problem Formulations -- 4.1 iFrame Injection Attack -- 4.2 Buffer Overflow Attack -- 5…Experimental Works and Result Analysis -- 5.1 Experimental Works -- 5.1.1 iFrame Injection Attack -- 5.1.2 Buffer Overflow Attack -- 5.2 Result Analysis -- 6…Conclusion -- References -- 11 A Survey of Energy-Aware Routing Protocols and Mechanisms for Mobile Ad Hoc Networks -- Abstract -- 1…Introduction -- 2…Energy or Power Consumption in MANETs -- 3…Energy-Aware Routing Mechanisms -- 4…Routing Protocols Based on Node Energy Status -- 5…Routing Protocols Based on Transmission Power Control -- 6…Conclusion -- References -- 12 Lexical Ontology-Based Computational Model to Find Semantic Similarity -- Abstract -- 1…Introduction -- 2…Lexical Ontology and Semantic Similarity -- 2.1 Semantic Similarity Aspects Using WordNet Lexical Ontology -- 2.2 Indo WordNet Structure -- 3…Proposed Semantic Similarity Module -- 3.1 Framework for Proposed Module -- 3.2 Proposed Algorithms -- 4…Experiments and Results -- 4.1 The Benchmark Data Set -- 4.2 Results -- 5…Conclusion and Future Work -- References -- 13 Energy-Efficient Cluster-Based Aggregation Protocol for Heterogeneous Wireless Sensor Networks -- Abstract -- 1…Introduction. , 2…Review on Cluster-Based Data Aggregation Techniques -- 3…Wireless Sensor Network Model -- 4…Radio Energy Dissipation Model -- 4.1 Two-Level Heterogeneous Networks -- 5…Objective and Scope -- 5.1 Proposed Approach -- 6…Implementation and Performance Evaluation -- 7…Results -- 8…Conclusion and Future Scope -- References -- 14 Digital Watermarking Based on Magic Square and Ridgelet Transform Techniques -- Abstract -- 1…Introduction -- 2…Proposed Watermarking Algorithms -- 2.1 Magic Square Procedure -- 2.2 Method 1 -- 2.3 Method 2 -- 3…Results -- 4…Conclusion -- References -- 15 Circle of Trust: One-Hop-Trust-Based Security Paradigm for Resource-Constraint MANET -- Abstract -- 1…Introduction -- 2…The Trust-Based Security Solution -- 2.1 The Environment -- 2.2 The Trust Model and the Node Evaluation Scheme -- 2.3 The Architecture -- 3…Security Analysis of the Solution -- 3.1 The Secure Routing Protocol -- 3.2 Analysis Based on Known Attacks -- 4…Discussion -- 5…Conclusion and Future Work -- References -- 16 Design of a Biometric Security System Using Support Vector Machine Classifier -- Abstract -- 1…Introduction -- 2…Feature Extraction for the Biometric System -- 2.1 ZCPA Feature Extraction for Input Speech -- 2.2 PCA Feature Extraction for Input Image -- 3…Support Vector Machine Classifier -- 4…Working of Biometric Security System -- 5…Results -- 6…Conclusion -- Acknowledgment -- References -- 17 Impact of Distance Measures on the Performance of Clustering Algorithms -- Abstract -- 1…Introduction -- 2…Clustering Algorithms -- 3…Distance Measures -- 3.1 Euclidean Distance -- 3.2 Standardized Euclidean Distance -- 3.3 Manhattan Distance -- 3.4 Mahalanobis Distance -- 3.5 Cosine Distance -- 3.6 Correlation Distance -- 4…Experimental Results and Discussions -- 4.1 Datasets Used -- 4.2 Evaluation on Clustering Efficiency -- 5…Conclusions -- References. , 18 Gender Identification Using Gait Biometrics -- Abstract -- 1…Introduction -- 2…Methodology -- 2.1 Silhouette Extraction -- 2.1.1 Feature Extraction -- 3…Network Structure -- 3.1 Feed-Forward Back-Propagation Neural Network -- 3.2 Cascade-Forward (CF) Back-Propagation Network -- 4…Computational Analysis -- 5…Conclusion and Future Work -- References -- 19 A Survey on Business Context -- Abstract -- 1…Introduction -- 2…Context -- 3…Context Awareness -- 3.1 Sensor and Context Types -- 4…Business Context -- 4.1 Business Context Awareness -- 5…Context Modeling -- 5.1 Key Value Models -- 5.2 Markup Scheme Models -- 5.3 Graphical Models -- 5.4 Object-Oriented Models -- 5.5 Logic-Based Models -- 5.6 Ontology-Based Models -- 5.7 Guideline for Business Context Modeling -- 6…Conclusion -- Acknowledgment -- References -- 20 Enhanced Caching for Geocast Routing in Vehicular Ad Hoc Network -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Work -- 3.1 Protocol Design -- 3.2 Improved Caching Technique -- 3.3 Transmission with Full Radio Transmission Range Power -- 4…Simulation Results and Performance Analysis -- 5…Conclusion and Future Work -- References -- 21 Cooperation Enforcement and Collaboration Inducement in Mobile Ad Hoc Networks -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Trust, Activity, and Strategy -- 3.1 Evaluating Trust Level -- 3.2 Evaluating Activity Level -- 3.3 Strategy Coding -- 4…Game Model Based on Trust and Activity -- 4.1 The Game on Network -- 4.2 Payoff for Participants -- 4.3 The Fitness Function -- 5…The Tournament -- 6…Evolution of Strategy Using Genetic Algorithm -- 7…Experiments -- 8…Conclusions and Future Work -- References -- 22 Uncoupling of Mobile Cloud Computing Services: An Architectural Perspective -- Abstract -- 1…Introduction -- 2…Overview of Tuple Space Model. , 3…Proposed Approach of Uncoupling of Mobile Cloud Computing Services.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Decision making-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (694 pages)
    Edition: 1st ed.
    ISBN: 9789811625022
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1391
    DDC: 327.120971
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- Editors and Contributors -- Decision Support System -- Recommended Model of Pollution Information Based on Collaborative Filtering Algorithm -- 1 Introduction -- 2 Calculation of the Similarity of Pollution Information -- 3 Default Prediction Complement -- 4 Obtaining the Similarity Matrix Between Users -- 5 The Solution of the Model -- 6 Analysis of Model Results -- References -- Research on the Evaluation of TCM Service Level in Various Regions of China -- 1 Introduction -- 2 Data Sources and Methods -- 2.1 Data Sources -- 2.2 Methods -- 3 Results -- 3.1 Principal Component Analysis -- 3.2 Cluster Analysis -- 4 Discussion -- 4.1 Regional Disparities in TCM Service Levels -- 4.2 The Effect of Health Services is not Commensurate with the Level of Economic Development -- References -- A Method for Evaluating Health Status of Rail Transit Signaling Equipment Based on Group Decision -- 1 Introduction -- 2 Related Work -- 3 Establishing Rules for an Evaluation System -- 3.1 Defining an Evaluation Organization -- 3.2 Defining the Evaluation Scope -- 3.3 Establishing the Weight Coefficient Vector -- 3.4 Establishing Alarm Rules to Monitor Equipment Faults -- 3.5 Setting Parameters for an Equipment Type -- 4 Implementation of an Evaluation System -- 4.1 Fault Monitoring Cycle -- 4.2 Health Evaluation Cycle -- 5 Conclusion -- References -- Intelligent Decision Support System for Precision Medicine (IDSS 4 PM) -- 1 Introduction -- 2 Theoretical Foundation-Simon's Model of Decision-Making -- 3 Intelligent Decision Support Systems (IDSSs) -- 4 Precision Medicine: An Emerging Approach in Medical Decision-Making -- 5 How Technologies Are Advancing Precision Medicine? -- 5.1 Business Analytics -- 5.2 Cognitive Computing -- 6 Theory Practice and Discussion -- 7 Characteristics of IDSS 4 PM -- 8 Conclusion. , References -- A Study of Result-Oriented Performance Appraisal-Taking Huawei as an Example -- 1 Introduction -- 2 Increasing Flexibility of Bonus Package -- 2.1 Reducing Long-Term Returns and Increasing Short-Term Returns -- 2.2 Widening the Gap and Clarifying the Hierarchy -- 2.3 Awarding the Current Contribution Immediately -- 3 Abandoning the Cumbersome Human Resource Assessment -- 3.1 Assessment by Objectives -- 3.2 Avoiding Establishing KPI Indicators in Isolation for Each Department -- 4 Taking the Responsibility and Result-Oriented Method -- 4.1 Good Performance and Good Return -- 4.2 Combination of Performance Evaluation and Reverse Evaluation -- 4.3 Eliminating Pretending Hard-Working -- 5 The Conclusion -- References -- Under a Management Perspective: Analysis of the Relationship Between Trust and Behavior Decision-Making -- 1 Introduction -- 2 Data and Measurement -- 2.1 Data Sources -- 2.2 Variable Description and Reliability Validity Test -- 3 Data Analysis and Discussion -- 3.1 The Difference of Public Trust Under Different Demographic Variables -- 3.2 The Differences in the Ways of Public Behavior Decision-Making Under Different Demographic Variables -- 3.3 The Relationship Between Trust and Behavior Decision-Making -- 4 Conclusion -- References -- Research on the Regulation of Industrial Structure in the Mid-Southern Liaoning Urban Agglomeration from the Perspective of Spatial Connection -- 1 Introduction -- 2 Research Area and Data Sources -- 2.1 Overview of the Study Area -- 2.2 Data Sources -- 3 Research Method -- 3.1 Spatial Shift-Share Model -- 3.2 Determination and Improvement of Spatial Weight -- 4 Result Analysis -- 4.1 Analysis of the Temporal and Spatial Pattern of Urban Spatial Interaction -- 4.2 Analysis of Shift Share of Industrial Structure -- 5 Conclusions -- References. , Research on the Influence Mechanism of Family-Supportive Supervisor Behaviors on Employees' Intention to Stay from the Perspective of Dual Scenario Embeddedness -- 1 Introduction -- 2 Theoretical Basis and Research Hypothesis -- 2.1 FSSB and Employees' Intention to Stay -- 2.2 The Mediating Role of Dual Scenario Embeddedness -- 2.3 The Moderating Role of Employees' Gratitude as a Trait -- 3 Study Design -- 3.1 Participants and Survey Methods -- 3.2 Variable Measurement -- 4 Research Results -- 4.1 Descriptive Statistical Analysis -- 4.2 Discrimination Validity Analysis and Common Method Test -- 4.3 Hypothesis Testing -- 5 Conclusion -- 5.1 Theoretical Contribution -- 5.2 Management Implications -- 5.3 Research Limitations and Prospects -- References -- Policy Burden, Industry Competition, and Corporate Risk-Taking -- 1 Introduction -- 2 Theoretical Analysis and Research Hypothesis -- 2.1 Policy Burden and Corporate Risk-Taking -- 2.2 The Regulating Effect of Industry Competition -- 3 Research Design -- 3.1 Sample Selection and Data Sources -- 3.2 Variable Selection and Model Design -- 4 Empirical Results -- 4.1 Descriptive Statistics -- 4.2 Analysis of Regression Results -- 5 Endogenous Control and Robustness Test -- 5.1 Endogenous Problems -- 5.2 Robustness Analysis -- 6 Research Conclusions -- References -- Blended Teaching Mode of Tourism English Based on TPACK -- 1 Introduction -- 2 TPACK Theory -- 3 ESP and Tourism English -- 4 Research Design -- 4.1 Design Concept -- 4.2 Problem Design -- 4.3 Subjects and Teaching Contents -- 4.4 Research Steps -- 5 Experimental Conclusion -- References -- Technology and Innovation Management -- Research on Privacy Protection of Internet of Things Search Data Based on Fine-Grained Authorization -- 1 Introduction -- 2 Background Knowledge -- 2.1 Secret Search -- 2.2 Attribute-Based Encryption Scheme. , 3 System Program -- 3.1 System Architecture -- 3.2 Program Process -- 4 Safety and Performance Analysis -- 4.1 Security Analysis -- 4.2 Performance Analysis -- 5 Concluding Remarks -- References -- Design of Emergency Rescue Deduction System for Bus Fire Accident Based on Virtual Reality -- 1 Introduction -- 2 The Functional Requirements of Deducing System -- 3 The Design of Deduce System Architecture -- 4 Function Design of Deducing System -- 4.1 Scene Editing Module -- 4.2 Deduce Management Module -- 4.3 Client Operation Module -- 5 Composition of the Deduction System -- 6 Conclusion -- References -- Application of Game Theory in the Field of Technology Innovation -- 1 Introduction -- 2 The Application of Oligopoly Model in Technological Innovations -- 2.1 The Development of Cournot Model in Technological Innovations -- 2.2 Application and Development of Stackelberg in Technological Innovations -- 2.3 Application of Option Game Oligopoly Model in Technology Innovations -- 3 Research on Evolutionary Game Model in Technological Innovations -- 3.1 The Application of Evolutionary Game in Technological Innovations -- 3.2 The Development of Evolutionary Game Model in Technological Innovations -- 4 The Development Direction of Game Theory in Technological Innovations -- References -- Research on Innovation Mechanism of Corporate Volunteering in China -- 1 Introduction -- 2 The Concept and Connotation of Corporate Volunteering -- 3 The Status Quo of Volunteering in Chinese Enterprises -- 3.1 The Integration of Business Objectives Is Important for the Business Development Plan -- 3.2 Win the Sense of Belonging of Employees and the Identity of External Customers -- 3.3 Corporate Public Services Take from Society and Use for Society -- 3.4 Volunteering of Different Enterprises Vary Greatly -- 3.5 Long-Term Development of Volunteering Projects. , 3.6 Undertaking Government Public Service -- 4 Problems in the Development of Enterprise Volunteering in China -- 4.1 Insufficient Government Guidance -- 4.2 Information Guidance is not Strong -- 4.3 Lack of Corporate Volunteering Standards -- 4.4 Imbalance Between Long-Term and Short-Term Benefits -- 5 Development Trend of Corporate Volunteering -- 5.1 Internetization of Corporate Volunteering -- 5.2 Normalization of Corporate Volunteering -- 5.3 Diversification of Corporate Volunteering -- 5.4 Establish Self-organization of Corporate Volunteers -- 5.5 Corporate Volunteering Are Becoming More Standardized and Strict -- 6 Innovation of Corporate Volunteering Mechanism -- 6.1 Building Communication Network and Innovating Corporate Volunteering Mechanism -- 6.2 Taxation Policy -- 6.3 Expense Subsidies -- 6.4 Performance Evaluation -- 6.5 Establish a Sound Education and Training Mechanism -- 6.6 Establish a Sound Guarantee Mechanism to Protect the Volunteering of Enterprises -- References -- Research on the Differential Incentive Effect of Patent Pool on Specific Technology Learning -- 1 Research Background -- 2 Theoretical Analysis and Research Hypothesis -- 2.1 The Impact of Patent Pool Formation on Specific Technology Learning -- 3 Research Design -- 3.1 Data and Samples -- 3.2 Variables and Their Measurement -- 4 Empirical Results and Analysis -- 4.1 Descriptive Statistical Analysis -- 4.2 Hypothesis Testing -- 5 Conclusion and Inspiration -- 5.1 Research Conclusion -- 5.2 Management Suggestions -- References -- Research on Present Situation and the Countermeasure Analysis of Football Training in University -- 1 Introduction -- 2 The Present Situation of Campus Football Training in China -- 3 Problems in the Development of Campus Football Activities in China -- 3.1 Students' Poor Awareness for Football Activities. , 3.2 Unreasonable Arrangement of Football Activities.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Decision making-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (398 pages)
    Edition: 1st ed.
    ISBN: 9789811393303
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1005
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Data Science and Analytics -- Quality Index Evaluation Model Based on Index Screening Model -- 1 Introduction -- 2 Three-Parameter Interval Principal Component Analysis -- 2.1 Principal Component Analysis -- 2.2 Calculation Steps -- 2.3 M-PCA Three-Parameter Interval Principal Component Analysis -- 2.4 Calculation Steps -- 2.5 The Determination of Subjective Index Weight Based on Analytic Hierarchy Process -- 2.6 Index Evaluation -- 3 Analysis of Examples -- 4 Conclusion -- References -- Selection of Software Development Methodologies (SDMs) Using Bayesian Analysis -- 1 Introduction -- 2 Proposed Work -- 3 Proposed Model -- 3.1 Experimental Result -- 4 Conclusion -- 5 Future Scope -- References -- Role of Social Media in Employer Branding-A Study on Selected Engineering Colleges (Private) in Bhubaneswar -- 1 Introduction -- 2 Objective -- 3 Methodology -- 4 Literature Review -- 4.1 Employer Branding -- 5 Cases of Private Institute -- 5.1 Case 1: Institute of Technical Education and Research, SOA University, Bhubaneswar -- 5.2 Case 2: Centurion University of Technology and Management (CUTM), Bhubaneswar -- 5.3 Case 3: Silicon Institute of Technology -- 5.4 Case 4: Gandhi Engineering College (GEC) Bhubaneswar -- 5.5 Case 5: Hi-Tech Institute of Technology (HIT), Bhubaneswar -- 6 Conclusion of the Study -- References -- A Novel Approach for Artifact Removal from Brain Signal -- 1 Introduction -- 2 Overview of Proposed Method -- 2.1 Kurtosis -- 2.2 Multiscale Entropy (MSE) -- 2.3 Artifact Channel Identification -- 2.4 Artifact Denoising -- 3 Results and Discussion -- 4 Conclusion -- References -- A Novel Approach to Heterogeneous Multi-class SVM Classification -- 1 Introduction -- 2 Literature Review -- 3 Classification Problem -- 4 Proposed Novel Approach for Heterogeneous Data. , 5 Experimental Results -- 6 Conclusion -- References -- An Empirical Study of Big Data: Opportunities, Challenges and Technologies -- 1 Introduction -- 2 Importance of Big Data -- 2.1 Importance to National Development -- 2.2 Importance to Industrialized Upgrades -- 2.3 Importance to Technical Research -- 2.4 Importance to Interdisciplinary Research -- 2.5 Importance to Better Predict the Future -- 3 Big Data Characteristics -- 3.1 Volume -- 3.2 Velocity -- 3.3 Variety -- 3.4 Veracity -- 3.5 Validity -- 3.6 Volatility -- 3.7 Value -- 4 Hadoop: Way to Process Big Data -- 4.1 Hadoop Distributed File System -- 4.2 MapReduce -- 5 Challenges of Big Data -- 5.1 Data Challenges -- 5.2 Processing Challenges -- 5.3 Management Challenges -- 6 Big Data Techniques -- 7 Big Data Hadoop-Based Tools -- 7.1 Apache Hadoop -- 7.2 Apache Mahout -- 7.3 Storm -- 7.4 S4 -- 7.5 Apache Kafka -- 8 Conclusion -- References -- Forecasting World Petroleum Fuel Crisis by Nonlinear Autoregressive Network -- 1 Introduction -- 2 Data Sources -- 3 Methodology -- 3.1 Time Series Prediction Using Artificial Neural Network (ANN) -- 3.2 Comparisons of General Prediction Models -- 3.3 Predictive Model Flow Control Diagram -- 3.4 Predictive Model Structure -- 4 Performance Measurement -- 5 Result and Analysis -- 6 Comparison and Discussion -- 7 Hypothesis Testing -- 8 Conclusion -- References -- Stock Market Price Prediction Employing Artificial Neural Network Optimized by Gray Wolf Optimization -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Dataset -- 3.2 Normalization -- 3.3 Artificial Neural Network -- 3.4 Gray Wolf Optimization -- 4 Proposed Approach -- 5 Experimental Setup and Simulation Result -- 6 Conclusion -- References -- Analysis of Techniques for Credit Card Fraud Detection: A Data Mining Perspective -- 1 Introduction -- 2 Literature Review. , 2.1 Dataset Collection -- 2.2 Various Methodology of Fraud Detection in Credit Card -- 3 Challenges in Credit Card Fraud Detection -- 4 Conclusion -- References -- Predictive Analytics for Weather Forecasting Using Back Propagation and Resilient Back Propagation Neural Networks -- 1 Introduction -- 2 Related Works -- 3 Supervised Learning Algorithms -- 4 Artificial Neural Network -- 4.1 Back Propagation Algorithm -- 4.2 Resilient Back Propagation -- 5 Results and Discussion -- 5.1 Backprop and Rprop Implemented in RStudio -- 5.2 Receiver Operating Characteristic Curve (ROC) and Area Under Curve (AUC) -- 5.3 ggplot -- 6 Conclusion -- Appendix -- References -- Analysis of the Leadership of Undergraduate Freshmen in Military Schools from the Perspective of Space -- 1 Introduction -- 2 Research Methods -- 2.1 Research Tools -- 2.2 Research Procedures -- 3 The Results Analysis -- 3.1 Reliability and Validity Test -- 3.2 Overall Analysis of Leadership -- 3.3 Analysis of the Correlation Between Leadership and Per Capita Income -- 3.4 Analysis of the Correlation Between Leadership and Per Capita Income -- 4 Result Analysis -- 5 Concluding Remarks -- References -- Correlation Analysis for CSI300 Index Return and Realized Volatility -- 1 Introduction -- 2 Model Construction -- 2.1 Model Realized Estimate -- 2.2 Edge Distribution Model Construction -- 2.3 Construction of Time Change D-Vine Copula -- 3 Empirical Analysis -- 3.1 Characteristic Analysis -- 3.2 Parameter Estimation -- 3.3 Parameter Estimation for Continuous-Time Volatility and the Jump Volatility Models -- 3.4 Correlation Analysis -- 4 Conclusion -- References -- Prescription Basket Analysis: Identifying Association Rule Among Drugs in Prescription of Dentist in Bhubaneswar City -- 1 Introduction -- 2 Research Methodology -- 3 Data Analysis and Results -- 4 Conclusion -- References. , Decision Science and Management -- Impact of Decision Science on e-Governance: A Study on Odisha Land Records System -- 1 Introduction -- 1.1 e-Governance -- 1.2 Odisha Right to Public Services Act -- 2 Literature Review -- 2.1 Brainstorming -- 2.2 Committee Meetings -- 2.3 Delphi -- 2.4 Electronic Meeting -- 2.5 Survey -- 2.6 Decision Tree and Decision Tables -- 2.7 Game Theory -- 2.8 Simulation -- 3 Decision Science for e-Governance -- 3.1 Risk Analysis -- 3.2 Decision Analysis -- 3.3 Cost-Effectiveness Analysis -- 4 Key Findings of the Paper -- 5 Conclusion -- References -- HR Value Proposition Using Predictive Analytics: An Overview -- 1 Introduction -- 2 Data Analytics -- 2.1 Descriptive Analytics -- 2.2 Predictive Analytics -- 2.3 Prescriptive Analytics -- 3 Literature Review -- 3.1 HR Analytics -- 4 Findings and Discussion -- 4.1 Importance of Analytics in HR -- 5 Conclusions -- 6 Originality -- 7 Declaration -- References -- Determination of Time-Dependent Quadratic Demand by Using Optimal Ordering Policy, Salvage Value Under Partial Backlogging, Time-Proportional Deterioration, Time-Varying Holding Cost -- 1 Introduction -- 2 Assumptions -- 3 Modeling -- 3.1 Notations -- 3.2 Mathematical Formulation -- 4 Numerical Examples -- 5 Sensitivity Analysis -- 6 Conclusions -- References -- Inventory Control for Materials Management Functions-A Conceptual Study -- 1 Introduction -- 2 Review of the Literature -- 2.1 Inventory Management -- 2.2 Material Management -- 3 Conclusion -- References -- ACO-Based Secure Routing Protocols in MANETs -- 1 Introduction -- 2 Ant Colony Optimization -- 3 Security Aware ACO Routing Protocols -- 3.1 Secure Antnet Routing Algorithm for Scalable Ad Hoc Networks Using Elliptic Curve Cryptography -- 3.2 Secure Power Aware Ant Routing Algorithm -- 3.3 Swarm-Based Detection and Defence Technique. , 3.4 Detection and Prevention of Blackhole Attack in MANET Using ACO Routing -- 3.5 Autonomous Bio-inspired Public Key Management Protocol -- 3.6 ANT-Based Trustworthy Routing -- 3.7 Pair-Wise Key Agreement and Hop-by-Hop Authentication Protocol -- 4 Comparison and Analysis of Security Aware ACO Routing Protocols -- 5 Conclusion and Future Work -- References -- An Approach Toward Integration of Big Data into Decision Making Process -- 1 Introduction -- 2 Background -- 3 Challenges During Big Data Analytics for Decision Making -- 4 Integrated Framework of Big Data Analytics with Decision Making Process -- 4.1 Proposed Approach -- 5 Conclusion and Future Aspects -- References -- Big Data Analysis and Classification of Biomedical Signal Using Random Forest Algorithm -- 1 Introduction -- 2 Proposed Methodology -- 3 Preprocessing of the Signal -- 4 Feature Extraction -- 5 Random Forest -- 6 Classification Result -- 7 Conclusion -- References -- An Intelligent Framework for Analysing Terrorism Actions Using Cloud -- 1 Introduction -- 2 Motivation -- 3 Objective -- 4 Literature Review -- 5 Comparison of Models -- 6 Conclusion -- References -- Research on Optimization of J Company Warehouse Storage Process -- 1 Introduction -- 2 Analysis on the Current Situation of J Company -- 2.1 Warehouse Storage Process -- 2.2 Problems with Warehouse Storage Process -- 3 Optimized Warehouse Storage Process -- 4 Petri Net Model -- 5 Conclusion -- References -- The Influence of Psychological Contract on the Willingness to Share Tacit Knowledge -- 1 Introduction -- 2 Psychological Contract -- 2.1 Knowledge Sharing -- 2.2 Hypothesis -- 3 Method -- 3.1 Measurement Tools -- 4 Result -- 5 Hypothesis Testing -- 6 Discussion -- 7 Limitations and Future Research -- References -- Research on the Role of Government Management in Chinese Public Indemnificatory Housing System. , References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Information technology -- Congresses. ; Computer science -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (858 pages)
    Edition: 1st ed.
    ISBN: 9788132217596
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.255
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Organizing Committee -- Contents -- Part ISignal and Image Processing -- 1 The PSF Measurement for Motion-Blurred Image Based on Analyzing the Frequency Spectrum -- Abstract -- 1…Introduction -- 2…Theoretical Analysis -- 2.1 The Relationship Between the PSF and Blurred Image Spectrum -- 2.2 Snake Model -- 2.3 Hough Transform in Polar Coordinate -- 3…The Point Spread Function Measurement for Motion-Blurred Image -- 3.1 The Steps for Solving Point Spread Function -- 3.2 Analysis of Experimental Results -- 4…Conclusion -- References -- 2 EBR Analysis of Digital Image Watermarking -- Abstract -- 1…Introduction -- 2…Watermarking Communication Model -- 3…Analysis of Watermarking Channel -- 4…Payload Capacity and EBR of Watermark Detection -- 5…Conclusions -- Acknowledgments -- References -- 3 Image Descriptors Based on Statistical Thermodynamics and Applications -- Abstract -- 1…Introduction -- 2…Research Ideas and the Main Content -- 2.1 Image Descriptor -- 2.2 Image Descriptor: Image Energy -- 2.3 Image Descriptor: Image Mass -- 2.4 Image Descriptor: Image Pressure -- 2.5 Image Descriptor: Image Temperature -- 3…Experiments and Analysis -- 3.1 Description of the Digital Image -- 3.2 Clustering Applications -- 3.3 Content-Based Image Retrieval -- 4…Conclusions -- Acknowledgments -- References -- 4 A Novel Image Retrieval Method Based on Fractal Code and Fuzzy Set -- Abstract -- 1…Introduction -- 2…Fractal Coding -- 3…Fuzzy Set Measure -- 3.1 Fuzzy Classifier -- 3.2 Proposed Algorithm -- 4…Similarity Measure -- 5…Experiment -- 6…Conclusion -- References -- 5 Velocity Evaluation in Traffic Accidents Occurred at the Road Intersection Based on Image Processing -- Abstract -- 1…Introduction -- 2…Algorithm Principle -- 3…Main Steps of Algorithm -- 3.1 Obtain Frame Sequences -- 3.2 Accurate Velocity of the Vehicle Calculation. , 3.3 Range Velocity of the Vehicle Calculation -- 4…Conclusion -- References -- 6 A Hybrid Method for Extracting Liver from 3D CT Image -- Abstract -- 1…Introduction -- 2…Related Research -- 3…Proposed Method -- 3.1 Three-Dimensional Region-Growing Algorithm -- 3.2 Image Morphology -- 4…Experimental Results -- 5…Summary -- References -- 7 A New Image-Fusion Technique Based on Blocked Sparse Representation -- Abstract -- 1…Introduction -- 2…Sparse-Coding Model -- 2.1 Selection of the Dictionary -- 2.2 Sparse Coding of Signals -- 3…Proposed Fusion Scheme -- 3.1 Fusion Framework Based on Sparse Coding -- 3.2 Fusion Rule -- 4…Experimental Results -- 5…Conclusion -- Acknowledgments -- References -- 8 The Studying of the Restoration of Defocused Images -- Abstract -- 1…Introduction -- 2…Disk Defocus Model -- 3…Gauss Defocus Model -- 4…Improved Defocus Model -- 5…Conclusion -- References -- 9 High-Order Total Variation-Based Image Restoration with Spatially Adapted Parameter Selection -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 3…Implementation Details -- 4…Numerical Experiments -- Acknowledgments -- References -- 10 Research of Vehicle Identification Based on Adaptive Corner Detection -- Abstract -- 1…Introduction -- 2…Adaptive Harris Corner Detection -- 2.1 Harris Corner Detection Principle -- 2.2 Adaptive Harris Corner Detection Algorithm -- 3…Vehicle Classification and Recognition -- 3.1 Vehicle Matching Based on Hausdorff Distance -- 3.2 Experimental simulation and analysis -- 4…Conclusion -- References -- 11 Knowledge-Aided Bayesian Optimum Radar Detector -- Abstract -- 1…Introduction -- 2…Bayesian Optimum Radar Detector -- 3…Estimation Method for Detector Priori Distribution Parameter -- 3.1 PDF Fit-Based Method -- 3.2 Method of Fractional Moment -- 3.3 Method Based on Maximal Likelihood Estimation. , 4…KA-BORD Algorithm Performance Analysis -- 4.1 Algorithm Performance Analysis Based on Computer Simulation Data -- 4.2 Algorithm Performance Analysis Based on Sea-Clutter-Measured Data -- 5…Conclusion -- References -- Part IIComputer Security -- 12 An Improvement of an Identity-Based Key-insulated Signcryption -- Abstract -- 1…Introduction -- 2…Analysis of the Chen et al.'s Scheme -- 2.1 Review of the Chen et al.'s Scheme -- 2.2 Analysis -- 3…An Improved Scheme -- 3.1 Security Proof -- 4…Conclusion -- Acknowledgments -- References -- 13 Stability Analysis of a Rapid Scanning Worm Propagation Model with Quarantine Strategy -- Abstract -- 1…Introduction -- 2…Mathematical Model Formulation -- 3…The Stability Analysis for Equilibriums -- 3.1 Worm-Free Equilibrium and Its Stability -- 3.2 Endemic Equilibrium and Its Stability -- 4…Numerical Simulations -- 5…Conclusions -- Acknowledgments -- References -- 14 A Fuzzy Bayesian Approach to Enhance SCADA Network Security -- Abstract -- 1…Introduction -- 2…Architecture -- 3…Normal System Behavior Profiling -- 4…Anomaly Detection Algorithm -- 5…Simulations and Results -- Acknowledgments -- References -- 15 Trusted Network Access Authentication Scheme Based on the Label -- Abstract -- 1…Introduction -- 2…Summary of the Trusted Networks -- 3…Trusted Network Access Authentication Scheme Based on the Label -- 3.1 Scene Setting -- 3.2 Trusted Label -- 3.3 Access Authentication -- 4…Security Analysis -- 5…Conclusion -- References -- 16 A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanisms -- Abstract -- 1…Introduction -- 2…System Architecture -- 3…Authentication Process -- 3.1 Mobile User Registration -- 3.2 Authentication -- 3.3 Mobile User Unregistration -- 4…Scheme Analyze -- 4.1 Security Analyze -- 4.2 Performance Analysis -- 5…Conclusion -- Acknowledgments -- References. , 17 Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- Abstract -- 1…Introduction -- 2…Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- 2.1 Detecting Suspicious Neighbors -- 2.2 Looking for Abnormal Topology -- 2.3 Isolating False Neighbors -- 3…Simulation and Performance Analysis -- 4…Conclusion -- Acknowledgments -- References -- 18 Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network -- Abstract -- 1…Introduction -- 2…Wormhole Path-Tracking Algorithm Based on Detecting Nodes -- 2.1 The Specific Detection Algorithm Structuring -- 3…The Simulation -- 4…Conclusion -- Acknowledgments -- References -- 19 Ad hoc Eavesdropping Algorithm-Based Network Coding -- Abstract -- 1…Introduction and Related Research -- 2…Ad hoc Hacking Attack Resistance of Secure Network Coding -- 2.1 Network Model -- 2.2 Attack Model -- 2.3 Algorithm Ideas -- 2.4 Algorithm Ideas -- 3…Secure Proof -- 4…Communication Overhead -- 5…Conclusion and Outlook -- Acknowledgments -- References -- 20 Improved Halftone Visual Cryptography by Random Grids -- Abstract -- 1…Introduction -- 2…The Proposed Schemes -- 2.1 Random Position Selection -- 2.2 Homogeneous Distribution of SIPs -- 2.3 Generation of Halftone Shares -- 3…Simulation Results and Discussions -- 4…Discussions -- 5…Conclusions -- References -- 21 Statistical Tests for Combined Secret Key Sequence -- Abstract -- 1…Introduction -- 2…Binary Sequence Generation for Test -- 2.1 Combined Secret Key Generation -- 2.2 Generate and Save the Binary Sequence -- 3…Statistical Test and Assessment for CSK Sequences -- 3.1 Frequency (Monobit) Test -- 3.2 Runs Test -- 3.3 Serial Test -- 4…Conclusions -- Acknowledgments -- References -- Part IIICommunication and Networking -- 22 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- Abstract. , 1…Introduction -- 2…The Return Communication System -- 2.1 The Basic Frame of Method -- 2.2 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- 2.3 Data Interaction Process of System -- 3…The Design and Implementation of Core Modules -- 3.1 Terminal Node -- 3.2 Gateway -- 3.3 Mobile Node (Mobile) -- 4…Conclusions -- References -- 23 A Study of Smart Grid Communication Architecture -- Abstract -- 1…Introduction -- 2…SG Communications Requirements -- 3…SGICA -- 4…Information and Communication Technologies for SGICA -- 5…IP-Based Communications for SG -- 6…Summary -- Acknowledgments -- References -- 24 Green Router: Power-Efficient Router Design -- Abstract -- 1…Introduction -- 2…Architectural Design -- 3…Operation Mechanism -- 3.1 Dynamic Sleep and Wakeup -- 3.2 Dispatching Policy -- 4…Modeling and Evaluation -- 4.1 Modeling -- 4.2 Experiment and Evaluation -- 5…Conclusion -- References -- 25 Design and Implementation of Web Service for Scenario Data Service System in War Gaming -- Abstract -- 1…Introduction -- 2…Approach of Technology -- 3…Architecture of the System -- 4…Design and Implementation of Web Layer -- 4.1 Web Service Design -- 4.2 Index Service Design -- 5…Conclusion -- Acknowledgments -- References -- 26 Gateway of Internet of Things for Intelligent Warehouse Management System Based on Embedded Web Server -- Abstract -- 1…Introduction -- 2…Use Scenario and Functional Requirements of IOTGW -- 2.1 IOT Architecture of Intelligent Warehouse Management System -- 2.2 Functional Requirements of IOT Gateway -- 3…Design of Multiprotocol IOT-Gateway Based on Embedded Web Server -- 3.1 Design Elements and Principles -- 3.2 Architecture of Hardware and Software -- 4…Conclusions and Future Work -- Acknowledgments -- References -- 27 Research of Wireless Transmission Strategy for High-Speed Railway -- Abstract -- 1…Introduction. , 2…Research Environment and Content.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Electronic Resource
    Electronic Resource
    Weinheim : Wiley-Blackwell
    Angewandte Makromolekulare Chemie 205 (1993), S. 47-58 
    ISSN: 0003-3146
    Keywords: Chemistry ; Polymer and Materials Science
    Source: Wiley InterScience Backfile Collection 1832-2000
    Topics: Chemistry and Pharmacology , Physics
    Description / Table of Contents: Methylmethacrylat (MMA) mit einem Prepolymergehalt von 6-8% wurde mit unterschiedlichen Anteilen (1-20%) 2-Ethylhexylmethacrylat (EMMA), n-Hexylmethacrylat (HMA), 2-Ethylhexylacrylat (EHA) oder n-Hexylacrylat (HA) copolymerisiert. Aus den erhaltenen Copolymeren wurden Folien hergestellt, an denen der Einfluß der Copolymerstruktur auf Lichtdurchlässigkeit, Dichte und mechanische Eigenschaften ermittelt wurde. zugsfestigkeit and Speichermodul nahmen mit zunehmendem Comonomergehalt ab. Die Dehnung stieg im Fall von MMA/EHA- und MMA/HA-Copolymerfolien mit 15 und 20 Gew.-% Comonomeranteil merklich an. Mittels DMTA wurde die Erweichungstemperatur der Copolymeren bestimmt. Die HDT und die Erweichungstemperatur nahmen unter Biegebelastung mit steigendem Comonomergehalt de Copolymeren ab.
    Notes: The paper describes the fabrication of cast acrylic sheets by copolymerizing a prepolymer syrup of methyl methacrylate (MMA) with varying amounts (1-20 wt.-%) of 2-ethylhexyl methacrylate (EHMA), n-hexyl methacrylate (HMA), 2-ethylhexyl acrylate (EHA) and n-hexyl acrylate (HA). The effect of structure of copolymer on light transmittance, density and mechanical properties was evaluated. Tensile strength and storage modulus decreased with increasing comonomer content. Strain increased significantly in the case of MMA/EHA and MMA/HA copolymer sheets having 15 and 20 wt.-% of comonomer. Softening temperature of copolymer samples was determined using dynamic mechanical thermal analysis. Heat deflection temperature under flexural load and softening temperature decreased with increasing comonomer content in copolymer.
    Additional Material: 3 Ill.
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Electronic Resource
    Electronic Resource
    Chichester [u.a.] : Wiley-Blackwell
    International Journal for Numerical Methods in Engineering 10 (1976), S. 283-299 
    ISSN: 0029-5981
    Keywords: Engineering ; Engineering General
    Source: Wiley InterScience Backfile Collection 1832-2000
    Topics: Mathematics , Technology
    Notes: This paper presents the optimum design of stiffened cylindrical panels with weight as the objective function and constraints on the frequencies in the presence of initial stresses, using unconstrained minimization techniques of non-linear mathematical programming problem. The interaction between the buckling constraints and the frequency constraints in the presence of initial stresses are included in the formulation. Loss of load carrying capacity due to imperfection and due to suddenly applied loads are included in the buckling analyses. Results for cylindrical shell are obtained by setting the panel angle to 360 degrees. The relationship between the weight of the cylinder and the panel (a segment of the cylinder) is examined.
    Additional Material: 3 Ill.
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    ISSN: 0025-116X
    Keywords: Chemistry ; Polymer and Materials Science
    Source: Wiley InterScience Backfile Collection 1832-2000
    Topics: Chemistry and Pharmacology , Physics
    Notes: The kinetics of polymerization of acrylonitrile initiated by the redox system manganese (III) acetate/ethylene glycol was studied in aqueous sulfuric acid medium in the temperature range from 30 to 40°C. The effect of varying the concentrations of monomer (M), acetic acid, and sulfuric acid and the addition of some electrolytes on the rate of polymerization (Rp) was investigated. Based on the experimental observations of the dependence of (Rp) on various parameters, a suitable kinetic scheme could be proposed. The plot of Rp2[M]2 vs. [M] was found to be linear, a striking general phenomenon observed for all the substrates we have studied in this laboratory.
    Additional Material: 1 Ill.
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Electronic Resource
    Electronic Resource
    Chichester [u.a.] : Wiley-Blackwell
    International Journal for Numerical Methods in Engineering 2 (1970), S. 579-595 
    ISSN: 0029-5981
    Keywords: Engineering ; Engineering General
    Source: Wiley InterScience Backfile Collection 1832-2000
    Topics: Mathematics , Technology
    Notes: The feasibility of achieving a preassigned stress state by changing the stiffness of determinate and indeterminate pin connected structures is presented. A new force method with all element forces (or stresses or areas) as independent variables is developed. The possibility but futility of getting the element areas by inverting and pre-multiplying the coefficient matrix with the external load vector when areas are chosen as variables is shown. The relationship existing between the compatibility equations and the plastic strength of pin connected structures is illustrated. Possible design methods for trusses under single or multiplicity of load conditions, the design of truss geometry and the relations between fully stressed and minimum weight structures are examined and illustrated through several examples.
    Additional Material: 11 Ill.
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Electronic Resource
    Electronic Resource
    Chichester [u.a.] : Wiley-Blackwell
    International Journal for Numerical Methods in Engineering 6 (1973), S. 237-251 
    ISSN: 0029-5981
    Keywords: Engineering ; Engineering General
    Source: Wiley InterScience Backfile Collection 1832-2000
    Topics: Mathematics , Technology
    Notes: An integrated force method is developed for the analysis of discrete structures in which all the element forces are taken as the independent variables instead of the conventional way of treating the redundants as the prime unknowns. Computationally the integrated force method is superior to the standard force method. The analogy between Beltrami-Michell formulation for continuous problems and the present formulation for discrete structures is presented. Illustrative examples for the determination of forces and displacements are presented for pin-connected and rigid-connected frame structures for various load conditions.
    Additional Material: 6 Ill.
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Electronic Resource
    Electronic Resource
    Chichester [u.a.] : Wiley-Blackwell
    International Journal for Numerical Methods in Engineering 23 (1986), S. 2205-2212 
    ISSN: 0029-5981
    Keywords: Engineering ; Engineering General
    Source: Wiley InterScience Backfile Collection 1832-2000
    Topics: Mathematics , Technology
    Notes: A matrix formulation of structural analysis, known as the integrated force method (IFM) is an attempt to establish an approach in which internal forces are the unknowns. Gradients of such behaviour constraints as stress, displacement and frequency can be obtained in closed form via the IFM. Closed form reanalysis formulae can also be generated. Computational experiments reported here show that reanalysis and gradient generation can be performed efficiently by this approach.
    Additional Material: 3 Ill.
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...