Sort by:
Publication Type:
Open access:
Publication Date:
Periodicals:
Search results
Online since: August 2013
Authors: Corrado lo Storto
Data Envelopment Analysis
Data Envelopment Analysis identifies the efficient units from a set and combine them to generate an efficient frontier that is used as a benchmark to measure the relative efficiency of inefficient units.
Sinuany-Stern: Review of ranking methods in the data envelopment analysis context.
Hogan, Data envelopment analysis: critique and extensions, in: Measuring Efficiency: an Assessment of data Envelopment Analysis, edited by R.H.
Cook: Preference voting and project ranking using data envelopment analysis and cross-evaluation.
Green: Comparing products using data envelopment analysis.
Sinuany-Stern: Review of ranking methods in the data envelopment analysis context.
Hogan, Data envelopment analysis: critique and extensions, in: Measuring Efficiency: an Assessment of data Envelopment Analysis, edited by R.H.
Cook: Preference voting and project ranking using data envelopment analysis and cross-evaluation.
Green: Comparing products using data envelopment analysis.
Online since: December 2025
Authors: Frank Walther, Mustafa Mamduh Mustafa Awd
Conventional S-N testing to quantify this scatter is
slow and costly, motivating the development of data-efficient modelling strategies.
Coaxial photo-diode thermography (650-670 nm, 1 MHz) and a high-speed data logging system captured melt-pool dynamics and pore evolution.
Priors on residual stress and defect efficacy factors derived from CT data.
Fig. 5: Comparison of surrogate (lines) and experimental data S-N curves for Ti-6Al-4V.
This translates to a 68 % cost saving and a six-month reduction in qualification lead time, underscoring the potential of data-efficient models for mission-critical AM components.
Coaxial photo-diode thermography (650-670 nm, 1 MHz) and a high-speed data logging system captured melt-pool dynamics and pore evolution.
Priors on residual stress and defect efficacy factors derived from CT data.
Fig. 5: Comparison of surrogate (lines) and experimental data S-N curves for Ti-6Al-4V.
This translates to a 68 % cost saving and a six-month reduction in qualification lead time, underscoring the potential of data-efficient models for mission-critical AM components.
Online since: October 2009
Authors: Wan Shan Wang, Hu Li, Wen Zheng Wu
Usually, the specimens datum gathered were not enough and the machining
process was finished.
For the system existing in factory such as ERP, PDM and etc, integration interfaces were provided for the systems of CAX (Computer Aided for X), ERP (Enterprise Resource Planning, ERP), PDM (Product Data Manage) and etc.
RS theory was provided by Poland scholar Pawlak Z in 1982 and are applied extensively in the knowledge expression of uncertain and imprecise knowledge, datum reduction based on information saving, approximate pattern classification, dependency diagnose in datum, decision algorithm from datum, the information quality based on coincidence indicator information and etc
The searching of similar procedure can be done by the method that is to inspect the datum standardized.
At the same time, the datum is saved to database for the further analysis in process capacity module.
For the system existing in factory such as ERP, PDM and etc, integration interfaces were provided for the systems of CAX (Computer Aided for X), ERP (Enterprise Resource Planning, ERP), PDM (Product Data Manage) and etc.
RS theory was provided by Poland scholar Pawlak Z in 1982 and are applied extensively in the knowledge expression of uncertain and imprecise knowledge, datum reduction based on information saving, approximate pattern classification, dependency diagnose in datum, decision algorithm from datum, the information quality based on coincidence indicator information and etc
The searching of similar procedure can be done by the method that is to inspect the datum standardized.
At the same time, the datum is saved to database for the further analysis in process capacity module.
Online since: October 2011
Authors: Vishal Parashar, J.L. Bhagoria, A. Rehman
The developed model was validated with a set of experimental data and appeared to be satisfactory.
DATA ANALYSIS To obtain a reliable database, each experiment was repeated three times and the mean values were calculated.
Plotting of the residuals in time order of data collection is helpful in checking independence assumption on the residuals.
Adjusted R2 for the number of predictors in the model was 89.4% both values shows that the data are fitted well.
The prediction model was then validated with another set of data.
DATA ANALYSIS To obtain a reliable database, each experiment was repeated three times and the mean values were calculated.
Plotting of the residuals in time order of data collection is helpful in checking independence assumption on the residuals.
Adjusted R2 for the number of predictors in the model was 89.4% both values shows that the data are fitted well.
The prediction model was then validated with another set of data.
Online since: February 2011
Authors: Hermawan Judawisastra, Fella Falencia, Akbar H.D. Abdullah
Characteristic strength of fiber and yarn were determined from Weibull data distribution.
Table 3 shows the tensile strength data of composites.
Hence, the tensile test data were normalized to 37% fiber volume fraction.
The actual data and normalized strength of the composites were tabulated in Table 2.
Normalized composites strength data are also depicted in Fig.6.
Table 3 shows the tensile strength data of composites.
Hence, the tensile test data were normalized to 37% fiber volume fraction.
The actual data and normalized strength of the composites were tabulated in Table 2.
Normalized composites strength data are also depicted in Fig.6.
Online since: October 2011
Authors: Li Zhang, Yan Jue Gong, Jing Wang, Hao Chen
The experimental data acquisition front-end for modal analysis and the data processing software-LMS Test.Lab impact testing are also adopted.
Lab’s PolyMAX algorithm uses FRFs data as the original data, while Least square complex exponential method of inverse Fourier (LSCE) used pulse response of FRFs transform as the original data.
After choosing the measurement data and the bandwidth, summation method was selected to display each data collection point of data Run a1 (red curve).
Fig.8 shows the first-order mode shape of data Run a1.
Reduction of structural frequency equations .
Lab’s PolyMAX algorithm uses FRFs data as the original data, while Least square complex exponential method of inverse Fourier (LSCE) used pulse response of FRFs transform as the original data.
After choosing the measurement data and the bandwidth, summation method was selected to display each data collection point of data Run a1 (red curve).
Fig.8 shows the first-order mode shape of data Run a1.
Reduction of structural frequency equations .
Online since: February 2014
Authors: Xin Min Wu, Hao Shu Wu
According to the 4G network structure of a system pattern diagrammatic drawing of IPv6
The wiretap, in a wireless link or a service within a network of tapping the user data, signaling data and control data; The camouflage, disguised as a network element intercepts user data, signaling data and control data, the pseudo terminal deception network access services; The flow analysis, active or passive flow analysis in order to obtain information on the time, speed, length, source and destination; The data integrity, modify, insert, delete, replay the user data or signaling data for data integrity; The denial of service, physically or agreement on interference to the user data, signaling data and control data in a wireless link to the correct transmission of denial of service attack; He denied, denying business expenses business users, data sources and sending or receiving the data to other users, network unit that provides the network service; The unauthorized access of user service, abuse
On the other hand in the IPv6 network security problems: Based on the rapid IPv6 packet capture and high-speed address matching technology research : uses the special-purpose card driver for high speed packet capture using protocol analysis, analytical technology makes the computation required a substantial reduction, improving the testing speed; The flow characteristic analysis based on IPv6 technology research: monitoring the network traffic, analyze the data packets, the packet according to the type, source IP address, the destination IP address, source port, destination port number and other information, the use of protocol analysis technique for the determination of IPv6 under the environment of network traffic characteristics; The IPv6 based vulnerability attack event characteristics and behavioral research: monitoring, analysis of network flow data, find out the unreasonable code, malicious code and incomplete data packet; check for network applications and data consistency, accuracy
Network layer mobility is 4G mobility management mobility key, usually involves in different segments roaming of mobile subscribers, the data link layer mobility supporting usually limit in the same network.
When establishing a connection to the IPv6, will be at the ends of the host packets on the IPSec package, intermediate router for IPSec extension header IPv6 packet transmission, through the communication terminal authentication and data encryption protection, so that the sensitive data in IPv6 network security transmission, therefore, without the need for special network application deployment of ALG ( application layer gateway ), we can guarantee the end-to-end network transparency, is beneficial to improve the network speed of service.
Analysis of IPv6 technology:Based on the rapid IPv6 packet capture and high-speed address matching analysis : uses the special-purpose card driver for high speed packet capture using protocol analysis, analytical technology makes the computation required a substantial reduction, improving the testing speed; The flow characteristic analysis based on IPv6 technology research: monitoring the network traffic, analyze the data packets, the packet according to the type, source IP address, the destination IP address, source port, destination port number and other information, the use of protocol analysis technique for the determination of IPV6 under the environment of network traffic characteristics;The IPv6 based vulnerability attack event characteristics and behavioral research: monitoring, analysis of network flow data, find out the unreasonable code, malicious code and incomplete data packet; check for network applications and data consistency, accuracy on the user's normal activity for statistical
On the other hand in the IPv6 network security problems: Based on the rapid IPv6 packet capture and high-speed address matching technology research : uses the special-purpose card driver for high speed packet capture using protocol analysis, analytical technology makes the computation required a substantial reduction, improving the testing speed; The flow characteristic analysis based on IPv6 technology research: monitoring the network traffic, analyze the data packets, the packet according to the type, source IP address, the destination IP address, source port, destination port number and other information, the use of protocol analysis technique for the determination of IPv6 under the environment of network traffic characteristics; The IPv6 based vulnerability attack event characteristics and behavioral research: monitoring, analysis of network flow data, find out the unreasonable code, malicious code and incomplete data packet; check for network applications and data consistency, accuracy
Network layer mobility is 4G mobility management mobility key, usually involves in different segments roaming of mobile subscribers, the data link layer mobility supporting usually limit in the same network.
When establishing a connection to the IPv6, will be at the ends of the host packets on the IPSec package, intermediate router for IPSec extension header IPv6 packet transmission, through the communication terminal authentication and data encryption protection, so that the sensitive data in IPv6 network security transmission, therefore, without the need for special network application deployment of ALG ( application layer gateway ), we can guarantee the end-to-end network transparency, is beneficial to improve the network speed of service.
Analysis of IPv6 technology:Based on the rapid IPv6 packet capture and high-speed address matching analysis : uses the special-purpose card driver for high speed packet capture using protocol analysis, analytical technology makes the computation required a substantial reduction, improving the testing speed; The flow characteristic analysis based on IPv6 technology research: monitoring the network traffic, analyze the data packets, the packet according to the type, source IP address, the destination IP address, source port, destination port number and other information, the use of protocol analysis technique for the determination of IPV6 under the environment of network traffic characteristics;The IPv6 based vulnerability attack event characteristics and behavioral research: monitoring, analysis of network flow data, find out the unreasonable code, malicious code and incomplete data packet; check for network applications and data consistency, accuracy on the user's normal activity for statistical
Online since: January 2020
Authors: O.Yu. Sheshukov, M.A. Mikheenkov, D.A. Lobanov
The dosage of the components of the raw mixture was carried out in accordance with the data presented in Table 6.
Figure 2 shows the data of the quantitative phase analysis of the sample on slag rubble, roasted at a temperature of 1100 °C.
Data of quantitative phase analysis of a sample for Portland cement clinker roasted at a temperature of 1100 °C.
Data of quantitative phase analysis of a sample for Portland cement clinker roasted at a temperature of 1300 °C.
Data of quantitative phase analysis of the sample on Portland cement clinker, roasted at a temperature of 1350 °C with an isothermal holding.
Figure 2 shows the data of the quantitative phase analysis of the sample on slag rubble, roasted at a temperature of 1100 °C.
Data of quantitative phase analysis of a sample for Portland cement clinker roasted at a temperature of 1100 °C.
Data of quantitative phase analysis of a sample for Portland cement clinker roasted at a temperature of 1300 °C.
Data of quantitative phase analysis of the sample on Portland cement clinker, roasted at a temperature of 1350 °C with an isothermal holding.
Online since: March 2008
Authors: Richard W. Neu
Unless noted otherwise, the majority of the data reported in this review was generated on this or
similar microstructure.
Crack nucleation is then related to the magnitude of the fatigue parameter, often calibrated to smooth specimen data.
This life fit was developed using uniaxial data from [1] and is valid for lives between 3000 and 10 6 cycles including data with strain ratios ranging from R = -1 to 0.8.
The UTRC data shown in Fig. 4 corresponds to gross slip conditions.
Future Directions Compared to most material systems, there is a good amount of fretting fatigue data coupled with microstructure-based models for duplex Ti-6Al-4V.
Crack nucleation is then related to the magnitude of the fatigue parameter, often calibrated to smooth specimen data.
This life fit was developed using uniaxial data from [1] and is valid for lives between 3000 and 10 6 cycles including data with strain ratios ranging from R = -1 to 0.8.
The UTRC data shown in Fig. 4 corresponds to gross slip conditions.
Future Directions Compared to most material systems, there is a good amount of fretting fatigue data coupled with microstructure-based models for duplex Ti-6Al-4V.
Online since: October 2010
Authors: Alfons Esderts, Rainer Masendorf, Tim Medhurst
Another source for fatigue data on this type of material
is form the FAT [5] project.
The data of the statically tested materials from Wagener's [5] tests deviates from the test data from the more recent tests.
The cyclic test data differs strongly from the data of previously tested TRIP700.
The data available was created in the same way as the current data.
The FAT [5] data is for three amounts of prestretch, 0%, 10% and 17%.
The data of the statically tested materials from Wagener's [5] tests deviates from the test data from the more recent tests.
The cyclic test data differs strongly from the data of previously tested TRIP700.
The data available was created in the same way as the current data.
The FAT [5] data is for three amounts of prestretch, 0%, 10% and 17%.