Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 37 of 37

Full-Text Articles in Social and Behavioral Sciences

Analysis Of Axisymmetric Cup Forming Of Metal Foil And Micro Hydroforming Process, Hideki Sato, Kenichi Manabe, Dongbin Wei, Zhengyi Jiang Jan 2013

Analysis Of Axisymmetric Cup Forming Of Metal Foil And Micro Hydroforming Process, Hideki Sato, Kenichi Manabe, Dongbin Wei, Zhengyi Jiang

Faculty of Engineering and Information Sciences - Papers: Part A

A novel forming method "micro hydromechanical deep drawing (MHDD)" is focused to improve the tribological property and forming limit. In this study, a theoretical model for MHDD is developed to investigate the size effect on deformation behavior in micro hydromechanical deep drawing. The effects of fluid pressure, the difference of friction coefficients at inner pockets and outer pockets are considered in the investigation on the size effect of tribological property. The friction force decreases as the scale factor decreases in MHDD process. It is also found that the tribological property in micro scale can be improved by applying the fluid …


Analysis Of Elemental Segregation In A Microalloyed Cast Steel, Jingwei Zhao, Zhengyi Jiang, Dongbin Wei Jan 2013

Analysis Of Elemental Segregation In A Microalloyed Cast Steel, Jingwei Zhao, Zhengyi Jiang, Dongbin Wei

Faculty of Engineering and Information Sciences - Papers: Part A

Quantitative investigation is made on the elemental segregation in different zones of a heavy microalloyed cast steel by energy dispersive X-ray spectroscopy. It is demonstrated that C shows serious segregation tendency than that of Mn and Si, and the degree of C segregation in the surface zone is higher than that in the central zone. C enrichment is generally observed at both dendrite arm and grain boundaries, and more C segregation at dendrite arm boundary in contrast to that at grain boundary is found in this steel. The distribution of C concentration shows a decreased trend from root to tip …


Encoding Navigable Speech Sources: A Psychoacoustic-Based Analysis-By-Synthesis Approach, Xiguang Zheng, Christian Ritz, Jiangtao Xi Jan 2013

Encoding Navigable Speech Sources: A Psychoacoustic-Based Analysis-By-Synthesis Approach, Xiguang Zheng, Christian Ritz, Jiangtao Xi

Faculty of Engineering and Information Sciences - Papers: Part A

This paper presents a psychoacoustic-based analysis-by-synthesis approach for compressing navigable speech sources. The approach targets multi-party teleconferencing applications, where selective reproduction of individual speech sources is desired. Based on exploiting sparsity of speech in the perceptual time-frequency domain, multiple speech signals are encoded into one mono mixture signal, which can be further compressed using a standard speech codec. Using side information indicating the active speech source for each time frequency instant enables flexible decoding and reproduction. Objective results highlight the importance of considering perception when exploiting the sparse nature of speech in the time-frequency domain. Results show that this sparsity, …


Security Analysis Of A Single Sign-On Mechanism For Distributed Computer Networks, Guilin Wang, Jiangshan Yu, Qi Xie Jan 2013

Security Analysis Of A Single Sign-On Mechanism For Distributed Computer Networks, Guilin Wang, Jiangshan Yu, Qi Xie

Faculty of Engineering and Information Sciences - Papers: Part A

Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in a distributed computer network. Recently, Chang and Lee proposed a new SSO scheme and claimed its security by providing well-organized security arguments. In this paper, however, we demonstrative that their scheme is actually insecure as it fails to meet credential privacy and soundness of authentication. Specifically, we present two impersonation attacks. The first attack allows a malicious service provider, who has successfully communicated with a legal user twice, to recover the user's credential and then …


Choosing An Optimal Model For Failure Data Analysis By Graphical Approach, Tieling Zhang, Richard Dwight Jan 2013

Choosing An Optimal Model For Failure Data Analysis By Graphical Approach, Tieling Zhang, Richard Dwight

Faculty of Engineering and Information Sciences - Papers: Part A

Many models involving combination of multiple Weibull distributions, modification of Weibull distribution or extension of its modified ones, etc. have been developed to model a given set of failure data. The application of these models to modeling a given data set can be based on plotting the data on Weibull probability paper (WPP). Of them, two or more models are appropriate to model one typical shape of the fitting plot, whereas a specific model may be fit for analyzing different shapes of the plots. Hence, a problem arises, that is how to choose an optimal model for a given data …


Comparative Analysis Of Dynamic Line Rating Models And Feasibility To Minimise Energy Losses In Wind Rich Power Networks, Mathew Simms, Lasantha Meegahapola Jan 2013

Comparative Analysis Of Dynamic Line Rating Models And Feasibility To Minimise Energy Losses In Wind Rich Power Networks, Mathew Simms, Lasantha Meegahapola

Faculty of Engineering and Information Sciences - Papers: Part A

Wind power generation has indicated an exponential increase during last two decades and existing transmission network infrastructure is increasingly becoming inadequate to transmit remotely generated wind power to load centres in the network. The dynamic line rating (DLR) is one of the viable solutions to improve the transmission line ampacity during high wind penetration without investing on an additional transmission network. The main objective of this study is to identify the basic differences between two main line rating standards, since transmission network service providers (TNSPs) heavily depend on these two standards when developing their line rating models. Therefore, a parameter …


Incremental Service Level Agreements Violation Handling With Time Impact Analysis, Azlan Ismail, Jun Yan, Jun Shen Jan 2013

Incremental Service Level Agreements Violation Handling With Time Impact Analysis, Azlan Ismail, Jun Yan, Jun Shen

Faculty of Engineering and Information Sciences - Papers: Part A

This research addresses a critical issue of service level agreement (SLA) violation handling, i.e., time constraint violation related to service-based systems (SBS). Whenever an SLA violation occurs to a service, it can potentially impact dependent services, leading to unreliable SBS. Therefore, an SLA violation handling support is much required to produce a robust and adaptive SBS. There are several approaches to realizing exceptions and faults handling support for SBS, focusing on the detection stage, the analysis stage, and the resolution stage. However, the current works have not considered the handling strategy that takes the impact information into account to reduce …