260,046 research outputs found

    Application of the linear matching method to creep-fatigue failure analysis of cruciform weldment manufactured of the austenitic steel AISI type 316N(L)

    Get PDF
    This paper demonstrates the recent extension of the Linear Matching Method (LMM) to include cyclic creep assessment [1] in application to a creep-fatigue analysis of a cruciform weldment made of the stainless steel AISI type 316N(L). The obtained results are compared with the results of experimental studies implemented by Bretherton et al. [2] with the overall objective to identify fatigue strength reduction factors (FSRF) of austenitic weldments for further design application. These studies included a series of strain-controlled tests at 550°C with different combinations of reversed bending moment and dwell time Δt. Five levels of reversed bending moment histories corresponding to defined values of total strain range ΔΔtot in remote parent material (1%, 0.6%, 0.4%, 0.3%, 0.25%) were used in combination with three variants of creep-fatigue conditions: pure fatigue, 1 hour and 5 hours of dwell period Δt of hold in tension. An overview of previous works devoted to analysis and simulation of these experiments [2] and highlight of the LMM development progress could be found in [3]

    Maximizing Hadron Collider Sensitivity to Gauge-Mediated Supersymmetry Breaking Models

    Get PDF
    We consider typical hadron collider detector signals sensitive to delayed decays of the lightest neutralino to photon plus goldstino and demonstrate the potential for substantially increasing the portion of the general parameter space of a gauge-mediated supersymmetry breaking model that can be probed at the Tevatron.Comment: 11 pages, full postscript file is available via anonymous ftp at ftp://ucdhep.ucdavis.edu/gunion/gmsb.ps; incorrect labels on figures correcte

    Mass Customization in Wireless Communication Services: Individual Service Bundles and Tariffs

    Get PDF
    This paper presents results on mass customization of wireless communications services and tariffs. It advocates for a user-centric view of wireless service configuration and pricing as opposed to present-day service catalog options. The focus is on design methodology and tools for such individual services and tariffs, using altogether information compression, negotiation algorithms, and risk portfolio analysis. We first analyze the user and supplier needs and aspirations. We then introduce the systematic design-oriented approach which can be applied. The implications of this approach for users and suppliers are discussed based on an end-user survey and on model-based calculations. It is shown that users can achieve desired service bundle cost reduction, while suppliers can improve significantly their risk-profit equilibrium points, reduce churn and simplify provisioning.negotiation;mass customization;service configuration;mobile communication services;individual tariffs

    Individual Tariffs for Mobile Communication Services

    Get PDF
    This paper introduces a conceptual framework and a computational model for individual tariffs for mobile communication services. The purpose is to provide guidance for implementation by communication service suppliers or user groups alike. The paper first examines the sociological and economic incentives for personalized services and individual tariffs. Then it introduces a framework for individual tariffs which is centered on user and supplier behaviours. The user, instead of being fully rational, has "bounded rationality" and his behaviours are subject to economic constraints and influenced by social needs. The supplier can belong to different types of entities such as firms and communities; each has his own goals which lead to different behaviors. Individual tariffs are decided through interactions between the user and the supplier and can be analyzed in a structured way using game theory. A numerical case in mobile music training is developed to illustrate the concepts.risks;mobile communication services;Individual tariffs;computational games

    Individual Tariffs for Mobile Services: Analysis of Operator Business and Risk Consequences

    Get PDF
    A design approach is offered for individual tariffs for mass customized mobile service products, whereby operators can determine their contract acceptance rules to guarantee with a set probability their minimum profit and risk levels. It uses realistic improvements to earlier reported negotiation algorithms [1], and a full operator operational model including infrastructure and content acquisition. Value at risk and profit are analyzed when a random user has consistent characteristics to a survey group, so that risk and profits are pooled. This analysis is necessary to give the supplier business guarantees to enter individual tariff agreements. A full numerical case is given for a class of mobile service.risks;mobile communication services;Individual tariffs

    Individual Tariffs for Mobile Services: Theoretical Framework and a Computational Case in Mobile Music

    Get PDF
    This paper introduces individual tariffs at service and content bundle level in mobile communications. It gives a theoretical framework (economic, sociological) as well as a computational game solution method. The user can be an individual or a community. Individual tariffs are decided through interactions between the user and the supplier. A numerical example from mobile music illustrates the concepts.risks;mobile communication services;Individual tariffs;computational games

    B2B emarketplace announcements and shareholder wealth

    Get PDF
    In the business-to-business (B2B) sector, new supply-chain models within electronic marketplaces (eMarketplaces) offer firms significantly lower procurement costs, increased operating efficiencies, and expanded market opportunities. Using event-study methodology to look at the period July 1999-March 2000, Andrew Chen and Thomas Siems find that investors reacted favorably to B2B eMarketplace announcements, with slightly higher abnormal returns associated with vertical than with horizontal eMarketplaces. They also find significant positive abnormal returns for e-commerce technology providers that partnered with computer industry giants or with competitors in B2B e-commerce initiatives. The abnormal returns are more than three times greater than returns from creating a B2B eMarketplace alone or with Old Economy leaders. These results suggest that, at least for the period studied, shareholders valued alliances between B2B eMarketplace developers more than firms developing e-commerce strategies on their own or with an Old Economy partner.Electronic commerce

    Extending the Energy Framework for Network Simulator 3 (ns-3)

    Full text link
    The problem of designing and simulating optimal transmission protocols for energy harvesting wireless networks has recently received considerable attention, thus requiring for an accurate modeling of the energy harvesting process and a consequent redesign of the simulation framework to include it. While the current ns-3 energy framework allows the definition of new energy sources that incorporate the contribution of an energy harvester, the integration of an energy harvester component into an existing energy source is not straightforward using the existing energy framework. In this poster, we propose an extension of the energy framework currently released with ns-3 in order to explicitly introduce the concept of an energy harvester. Starting from the definition of the general interface, we then provide the implementation of two simple models for the energy harvester. In addition, we extend the set of implementations of the current energy framework to include a model for a supercapacitor energy source and a device energy model for the energy consumption of a sensor. Finally, we introduce the concept of an energy predictor, that gathers information from the energy source and harvester and use this information to predict the amount of energy that will be available in the future, and we provide an example implementation. As a result of these efforts, we believe that our contributions to the ns-3 energy framework will provide a useful tool to enhance the quality of simulations of energy-aware wireless networks.Comment: 2 pages, 4 figures. Poster presented at WNS3 2014, Atlanta, G

    Detecting Sleptons at Hadron Colliders and Supercolliders

    Full text link
    We study the prospects for detecting the sleptons of the Minimal Supersymmetric Standard Model at hadron colliders and supercolliders. We use ISAJET 7.03 to simulate charged slepton and sneutrino pair production, incorporating slepton and sneutrino cascade decays into our analysis. We find that even with an accumulation of ∌1\sim 1fb−1^{-1} of integrated luminosity, it will be very difficult to detect sleptons beyond the reach of LEP at the Fermilab Tevatron ppˉp\bar{p} collider, due to a large background from WW pair production. At LHC, sleptons of mass up to 300 GeV ought to be detectable via dilepton signal as long as it is possible to veto central jets with pT≄25p_T \geq 25 GeV with high efficiency.Comment: 14 pages (REVTEX), 4 uuencoded figures appended, FSU-HEP-931104, SSCL-Preprint-531, UH-511-777-9
    • 

    corecore