260,046 research outputs found
Application of the linear matching method to creep-fatigue failure analysis of cruciform weldment manufactured of the austenitic steel AISI type 316N(L)
This paper demonstrates the recent extension of the Linear Matching Method (LMM) to include cyclic creep assessment [1] in application to a creep-fatigue analysis of a cruciform weldment made of the stainless steel AISI type 316N(L). The obtained results are compared with the results of experimental studies implemented by Bretherton et al. [2] with the overall objective to identify fatigue strength reduction factors (FSRF) of austenitic weldments for further design application. These studies included a series of strain-controlled tests at 550°C with different combinations of reversed bending moment and dwell time Ît. Five levels of reversed bending moment histories corresponding to defined values of total strain range ÎΔtot in remote parent material (1%, 0.6%, 0.4%, 0.3%, 0.25%) were used in combination with three variants of creep-fatigue conditions: pure fatigue, 1 hour and 5 hours of dwell period Ît of hold in tension. An overview of previous works devoted to analysis and simulation of these experiments [2] and highlight of the LMM development progress could be found in [3]
Maximizing Hadron Collider Sensitivity to Gauge-Mediated Supersymmetry Breaking Models
We consider typical hadron collider detector signals sensitive to delayed
decays of the lightest neutralino to photon plus goldstino and demonstrate the
potential for substantially increasing the portion of the general parameter
space of a gauge-mediated supersymmetry breaking model that can be probed at
the Tevatron.Comment: 11 pages, full postscript file is available via anonymous ftp at
ftp://ucdhep.ucdavis.edu/gunion/gmsb.ps; incorrect labels on figures
correcte
Mass Customization in Wireless Communication Services: Individual Service Bundles and Tariffs
This paper presents results on mass customization of wireless communications services and tariffs. It advocates for a user-centric view of wireless service configuration and pricing as opposed to present-day service catalog options. The focus is on design methodology and tools for such individual services and tariffs, using altogether information compression, negotiation algorithms, and risk portfolio analysis. We first analyze the user and supplier needs and aspirations. We then introduce the systematic design-oriented approach which can be applied. The implications of this approach for users and suppliers are discussed based on an end-user survey and on model-based calculations. It is shown that users can achieve desired service bundle cost reduction, while suppliers can improve significantly their risk-profit equilibrium points, reduce churn and simplify provisioning.negotiation;mass customization;service configuration;mobile communication services;individual tariffs
Individual Tariffs for Mobile Communication Services
This paper introduces a conceptual framework and a computational model for individual tariffs for mobile communication services. The purpose is to provide guidance for implementation by communication service suppliers or user groups alike. The paper first examines the sociological and economic incentives for personalized services and individual tariffs. Then it introduces a framework for individual tariffs which is centered on user and supplier behaviours. The user, instead of being fully rational, has "bounded rationality" and his behaviours are subject to economic constraints and influenced by social needs. The supplier can belong to different types of entities such as firms and communities; each has his own goals which lead to different behaviors. Individual tariffs are decided through interactions between the user and the supplier and can be analyzed in a structured way using game theory. A numerical case in mobile music training is developed to illustrate the concepts.risks;mobile communication services;Individual tariffs;computational games
Individual Tariffs for Mobile Services: Analysis of Operator Business and Risk Consequences
A design approach is offered for individual tariffs for mass customized mobile service products, whereby operators can determine their contract acceptance rules to guarantee with a set probability their minimum profit and risk levels. It uses realistic improvements to earlier reported negotiation algorithms [1], and a full operator operational model including infrastructure and content acquisition. Value at risk and profit are analyzed when a random user has consistent characteristics to a survey group, so that risk and profits are pooled. This analysis is necessary to give the supplier business guarantees to enter individual tariff agreements. A full numerical case is given for a class of mobile service.risks;mobile communication services;Individual tariffs
Individual Tariffs for Mobile Services: Theoretical Framework and a Computational Case in Mobile Music
This paper introduces individual tariffs at service and content bundle level in mobile communications. It gives a theoretical framework (economic, sociological) as well as a computational game solution method. The user can be an individual or a community. Individual tariffs are decided through interactions between the user and the supplier. A numerical example from mobile music illustrates the concepts.risks;mobile communication services;Individual tariffs;computational games
B2B emarketplace announcements and shareholder wealth
In the business-to-business (B2B) sector, new supply-chain models within electronic marketplaces (eMarketplaces) offer firms significantly lower procurement costs, increased operating efficiencies, and expanded market opportunities. Using event-study methodology to look at the period July 1999-March 2000, Andrew Chen and Thomas Siems find that investors reacted favorably to B2B eMarketplace announcements, with slightly higher abnormal returns associated with vertical than with horizontal eMarketplaces. They also find significant positive abnormal returns for e-commerce technology providers that partnered with computer industry giants or with competitors in B2B e-commerce initiatives. The abnormal returns are more than three times greater than returns from creating a B2B eMarketplace alone or with Old Economy leaders. These results suggest that, at least for the period studied, shareholders valued alliances between B2B eMarketplace developers more than firms developing e-commerce strategies on their own or with an Old Economy partner.Electronic commerce
Extending the Energy Framework for Network Simulator 3 (ns-3)
The problem of designing and simulating optimal transmission protocols for
energy harvesting wireless networks has recently received considerable
attention, thus requiring for an accurate modeling of the energy harvesting
process and a consequent redesign of the simulation framework to include it.
While the current ns-3 energy framework allows the definition of new energy
sources that incorporate the contribution of an energy harvester, the
integration of an energy harvester component into an existing energy source is
not straightforward using the existing energy framework. In this poster, we
propose an extension of the energy framework currently released with ns-3 in
order to explicitly introduce the concept of an energy harvester. Starting from
the definition of the general interface, we then provide the implementation of
two simple models for the energy harvester. In addition, we extend the set of
implementations of the current energy framework to include a model for a
supercapacitor energy source and a device energy model for the energy
consumption of a sensor. Finally, we introduce the concept of an energy
predictor, that gathers information from the energy source and harvester and
use this information to predict the amount of energy that will be available in
the future, and we provide an example implementation. As a result of these
efforts, we believe that our contributions to the ns-3 energy framework will
provide a useful tool to enhance the quality of simulations of energy-aware
wireless networks.Comment: 2 pages, 4 figures. Poster presented at WNS3 2014, Atlanta, G
Detecting Sleptons at Hadron Colliders and Supercolliders
We study the prospects for detecting the sleptons of the Minimal
Supersymmetric Standard Model at hadron colliders and supercolliders. We use
ISAJET 7.03 to simulate charged slepton and sneutrino pair production,
incorporating slepton and sneutrino cascade decays into our analysis. We find
that even with an accumulation of fb of integrated luminosity,
it will be very difficult to detect sleptons beyond the reach of LEP at the
Fermilab Tevatron collider, due to a large background from pair
production. At LHC, sleptons of mass up to 300 GeV ought to be detectable via
dilepton signal as long as it is possible to veto central jets with GeV with high efficiency.Comment: 14 pages (REVTEX), 4 uuencoded figures appended, FSU-HEP-931104,
SSCL-Preprint-531, UH-511-777-9
- âŠ