Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this paper, the effects of various parameters on thermal buckling loads are studied, and the thermal stability problems are solved for a simply-supported rectangular laminate in a state of uniform compressive (or tensile) initial stress plus initial bending stress combined with uniform thermal compressive stress plus thermal bending stress.
32 citations
••
TL;DR: In this paper, a cross-linked structure of guaran polysaccharide was characterized by Fourier transform infra-red spectroscopy (FTIR), thermogravimetric analysis (TGA) and scanning electron microscopy (SEM).
32 citations
••
TL;DR: This article reviewed the current state of the science of snow park jumps, described the jump design process, and outlined the role that modelling will play in designing tomorrow's snow-parks jumps.
Abstract: Recent epidemiological studies of injuries at ski resorts have found that snow park jumps pose a significantly greater risk for certain classes of injury to resort patrons than other normal skiing activities. Today, most recreational jumps are built by skilled groomers without an engineering design process, but the Snow Skiing Committee (F-27) of the American Society for Testing and Materials is considering the inclusion of recreational jumps in their purview which may lead to a greater role for engineering jump designs in the US in the future. Similar efforts are underway in Europe as well. The purpose of this work is to review the current state of the science of snow park jumps, describe the jump design process, and outline the role that modelling will play in designing tomorrow’s snow park jumps.
32 citations
••
TL;DR: In this paper, the authors proposed a new model to identify key factors that drive design delays in high-tech facility construction projects, which integrates importance-satisfaction analysis (ISA) and an influence-relations map (IRM).
Abstract: Design delays can negatively influence the total completion time of a facility construction project. Knowing the factors to which design delays are most sensitive supports the time management of designs. However, factors that cause design delays are several and interrelated. This study proposes a new model to identify key factors that drive design delays. The core of the model integrates importance-satisfaction analysis (ISA) and an influence-relations map (IRM). The ISA evaluates the performance of each delay factor, while the IRM captures the causal relationships among factors. Additionally, the IRM is generated using a decision making trial and evaluation laboratory technique (DEMATEL). The model is applied to a real-world high-tech facility construction project to indicate the strengths of the model. In this investigation, four first-level delay factors and 17 second-level delay sub-factors are derived. The factor of “organization's decision making and budget constraints” is identified as the ...
32 citations
••
TL;DR: A general data security model is proposed that is independent of the network topology and structure, and can be widely used in the agriculture monitoring application, and ensures good data security at the cost of a slight increase in energy consumption at receiver and sender nodes.
Abstract: Nowadays, wireless sensor networks (WSN) are widely used in agriculture monitoring to improve the quality and productivity of farming. In this application, sensors gather different types of data (i.e., humidity, carbon dioxide level, and temperature) in real-time scenarios. Thus, data gathering, transmission, and rapid response to new circumstances require a secured data mechanism to avoid malicious adversaries. Therefore, this paper focuses on data security from the data origin source to the end-user, and proposes a general data security model that is independent of the network topology and structure, and can be widely used in the agriculture monitoring application. The developed model considers practical aspects, the architecture of the sensor node, as well as the necessity to save energy while ensuring data security, and optimize the model through the application of organizational and technical measures. The model evaluation is conducted through simulation in terms of energy consumption. The result shows that the proposed model ensures good data security at the cost of a slight increase in energy consumption at receiver and sender nodes, and energy consumption per bit, up to 2%, 7%, and 1.3%, respectively, due to overhead added for authentication in the network.
32 citations
Authors
Showing all 2478 results
Name | H-index | Papers | Citations |
---|---|---|---|
Kamil Kuca | 55 | 1029 | 16708 |
Antoni Rogalski | 47 | 286 | 11516 |
Ufuk Gündüz | 44 | 206 | 6560 |
George P. Patrinos | 43 | 353 | 8785 |
Ching-Hsue Cheng | 42 | 209 | 8222 |
Saad M. Alshehri | 42 | 280 | 6179 |
Roman Dabrowski | 38 | 469 | 6415 |
Daniel Jun | 37 | 287 | 5505 |
Susheel Kalia | 36 | 105 | 6984 |
Dragan Pamučar | 36 | 194 | 4519 |
Turgay Celik | 35 | 508 | 5417 |
Janice D. Yoder | 33 | 81 | 3486 |
Miodrag Čolić | 32 | 212 | 3894 |
T. C. T. Ting | 32 | 121 | 9662 |
Manuela Tvaronavičienė | 31 | 153 | 2832 |