Institution
Bauhaus University, Weimar
Education•Weimar, Thüringen, Germany•
About: Bauhaus University, Weimar is a education organization based out in Weimar, Thüringen, Germany. It is known for research contribution in the topics: Finite element method & Isogeometric analysis. The organization has 1421 authors who have published 2998 publications receiving 104454 citations. The organization is also known as: Bauhaus-Universität Weimar & Hochschule für Architektur und Bauwesen.
Topics: Finite element method, Isogeometric analysis, Context (language use), Graphene, Fracture mechanics
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this paper, the properties of single layer Molybdenum disulfide (SLMoS2) containing point defects, such as vacancies, or extra Sulfur (S) or Moly bdenum (Mo) atoms are investigated by molecular dynamics simulations.
Abstract: In this paper, the mechanical properties of single layer Molybdenum disulfide (SLMoS2) containing point defects, such as vacancies, or extra Sulfur (S) or Molybdenum (Mo) atoms are investigated by molecular dynamics (MD) simulations. It was found that the single S vacancy is most probable as the formation energy is the lowest among all point defects. Other antisite defects having a Mo atom replaced by two S atoms are the least possible ones. The structures of antisite defects are also unstable. The Young’s modulus of planner SLMoS2 with defect is found to be within the scatter margin of pristine MoS2 sheet (without defects). The effect of temperature on each type of defect has been studied and it is found that strength is more affected by vacancies than it is by phase transition.
25 citations
••
TL;DR: In this article, the effects of various dynamical test loads on the crack identification were investigated for a time- harmonic excitation with a single frequency and a short-duration signal measured along part of the external boundary.
Abstract: Nelder-Mead (NM) and Quasi-Newton (QN) optimization methods are used for the numerical solution of crack identification problems in elastody- namics. Fracture is modeled by the eXtended Finite Element Method. The Newmark-b method with Rayleigh damping is employed for the time integra- tion. The effects of various dynamical test loads on the crack identification are investigated. For a time- harmonic excitation with a single frequency and a short-duration signal measured along part of the external boundary, the crack is detected through the solution of an inverse time-dependent problem. Com- pared to the static load, we show that the dynamic loads are more effective for crack detection problems. Moreover, we tested different dynamic loads and find that NM method works more efficient under the harmonic load than the pounding load while the QN method achieves almost the same results for both load types.
25 citations
••
TL;DR: An improved potential-based penalty function approach within an explicit three-dimensional (3D) discontinuous deformation analysis (DDA) framework for efficient and robust kinetic analysis of rock block systems is proposed.
25 citations
••
TL;DR: The following lines intend to open the discussion on the requirements and effect of the computer implementation of a constraint satisfaction approach to solve elementary design problems in architectural practice.
Abstract: We introduce some novel ideas for a constraint-based design strategy to support participatory housing planning processes in Latin America. The following lines intend to open the discussion on the requirements and effect of the computer implementation of a constraint satisfaction approach to solve elementary design problems in architectural practice. The case study applies to the building massing design problem posed by the Chilean urban regulatory framework that addresses single-family affordable houses. Two different implementation criteria are being tested in an ongoing series of trials providing further considerations. One prototype uses MAXON's CINEMA4D XPRESSO ® visual scripting environment to set up a semi-automated design environment which allows users to edit one feature-based 3D model of massing alternative at a time. The other prototype uses ILOG's OPL STUDIO ® constraint programming environment to achieve fully automated search and 2D visualization of all possible solution alternatives to separ...
24 citations
••
29 Apr 2009TL;DR: A very detailed security analysis of the DECT Standard Authentication Algorithm is given including some very effective attacks on the building blocks used for DSAA as well as a common implementation error that can practically lead to a total break of DECT security.
Abstract: Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range The cryptographic algorithms used in DECT are not publicly available In this paper we reveal one of the two algorithms used by DECT, the DECT Standard Authentication Algorithm (DSAA) We give a very detailed security analysis of the DSAA including some very effective attacks on the building blocks used for DSAA as well as a common implementation error that can practically lead to a total break of DECT security We also present a low cost attack on the DECT protocol, which allows an attacker to impersonate a base station and therefore listen to and reroute all phone calls made by a handset
24 citations
Authors
Showing all 1443 results
Name | H-index | Papers | Citations |
---|---|---|---|
Timon Rabczuk | 99 | 727 | 35893 |
Adri C. T. van Duin | 79 | 489 | 26911 |
Paolo Rosso | 56 | 541 | 12757 |
Xiaoying Zhuang | 54 | 271 | 10082 |
Benno Stein | 53 | 340 | 9880 |
Jin-Wu Jiang | 52 | 175 | 7661 |
Gordon Wetzstein | 51 | 258 | 9793 |
Goangseup Zi | 45 | 153 | 8411 |
Bohayra Mortazavi | 44 | 162 | 5802 |
Thorsten Hennig-Thurau | 44 | 123 | 17542 |
Jörg Hoffmann | 40 | 200 | 7785 |
Martin Potthast | 40 | 190 | 6563 |
Pedro M. A. Areias | 38 | 107 | 5908 |
Amir Mosavi | 38 | 432 | 6209 |
Guido De Roeck | 38 | 274 | 8063 |