7,249 research outputs found
Superposition method for analysis of free-edge stresses
Superposition techniques were used to transform the edge stress problem for composite laminates into a more lucid form. By eliminating loads and stresses not contributing to interlaminar stresses, the essential aspects of the edge stress problem are easily recognized. Transformed problem statements were developed for both mechanical and thermal loads. Also, a technique for approximate analysis using a two dimensional plane strain analysis was developed. Conventional quasi-three dimensional analysis was used to evaluate the accuracy of the transformed problems and the approximate two dimensional analysis. The transformed problems were shown to be exactly equivalent to the original problems. The approximate two dimensional analysis was found to predict the interlaminar normal and shear stresses reasonably well
Effectiveness of lending for vocational education and training: lessons from World Bank experience
This paper reviews the Bank involvement in the vocational education and training (VET) sub-sector in the 1990s. The paper aims to do just that, by mainly seeking answers to the following questions: 1) How has the Bank performed in its lending services to its clients in VET? 2) How have VET projects performed in terms of meeting stated objectives? 3) What factors led to the success, or failure of Bank operations? Based on what has been learned, the paper provides suggestions about how the performance of future VET interventions can be improved. This review concerns itself primarily with implementation performance, and proposes measures to improve project outcomes.ICT Policy and Strategies,Health Economics&Finance,Health Monitoring&Evaluation,Teaching and Learning,Banks&Banking Reform
Water distribution rules and water distribution performance: a case study in the Tambraparani Irrigation System
Irrigation management / Irrigation systems / Performance / Irrigation operation / Irrigation scheduling / Water distribution / Water allocation / Water delivery / Water users' associations / Legislation / Large-scale systems / Bananas / Case studies / India / Tamil Nadu / Tambraparani Irrigation System
Cluster Based Symbolic Representation for Skewed Text Categorization
In this work, a problem associated with imbalanced text corpora is addressed.
A method of converting an imbalanced text corpus into a balanced one is
presented. The presented method employs a clustering algorithm for conversion.
Initially to avoid curse of dimensionality, an effective representation scheme
based on term class relevancy measure is adapted, which drastically reduces the
dimension to the number of classes in the corpus. Subsequently, the samples of
larger sized classes are grouped into a number of subclasses of smaller sizes
to make the entire corpus balanced. Each subclass is then given a single
symbolic vector representation by the use of interval valued features. This
symbolic representation in addition to being compact helps in reducing the
space requirement and also the classification time. The proposed model has been
empirically demonstrated for its superiority on bench marking datasets viz.,
Reuters 21578 and TDT2. Further, it has been compared against several other
existing contemporary models including model based on support vector machine.
The comparative analysis indicates that the proposed model outperforms the
other existing models.Comment: 14 Pages, 15 Figures, 1 Table, Conference: RTIP2
Residual thermal and moisture influences on the strain energy release rate analysis of edge delamination
A laminated plate theory analysis is developed to calculate the strain energy release rate associated with edge delamination growth in a composite laminate. The analysis includes the contribution of residual thermal and moisture stresses to the strain energy released. The strain energy release rate, G, increased when residual thermal effects were combined with applied mechanical strains, but then decreased when increasing moisture content was included. A quasi-three-dimensional finite element analysis indicated identical trends and demonstrated these same trends for the individual strain energy release rate components, G sub I and G sub II, associated with interlaminar tension and shear. An experimental study indicated that for T300/5208 graphite-epoxy composites, the inclusion of residual thermal and moisture stresses did not significantly alter the calculation of interlaminar fracture toughness from strain energy release rate analysis of edge delamination data taken at room temperature, ambient conditions
Comparative study of AODV with malicious environment and the USOR
By the performance analysis of two protocols AODV and USOR implemented in ns2 we made a comparison between them. USOR is efficient as it uses a novel combination of group signature and ID-based encryption for route discovery. Security analysis demonstrates that USOR can well protect user privacy against both inside and outside attackers. Successful implementation of unlinkability and unobservability property of USOR not only has satisfactory performance compared to AODV, but also achieves stronger privacy protection than the existing systems when in the Malicious environment. Usage of the stronger encryption techniques in unobservable protocol makes the more data secure. In this paper we are going to compare the protocols AODV and USOR. The performance of the network mainly refers by using the packet delivery function and the over head of the packet to reach the destination. Here we are analyze overhead and packet delivery function of the two protocols and made the comparison between them
The Eastwood-Singer gauge in Einstein spaces
Electrodynamics in curved spacetime can be studied in the Eastwood--Singer
gauge, which has the advantage of respecting the invariance under conformal
rescalings of the Maxwell equations. Such a construction is here studied in
Einstein spaces, for which the Ricci tensor is proportional to the metric. The
classical field equations for the potential are then equivalent to first
solving a scalar wave equation with cosmological constant, and then solving a
vector wave equation where the inhomogeneous term is obtained from the gradient
of the solution of the scalar wave equation. The Eastwood--Singer condition
leads to a field equation on the potential which is preserved under gauge
transformations provided that the scalar function therein obeys a fourth-order
equation where the highest-order term is the wave operator composed with
itself. The second-order scalar equation is here solved in de Sitter spacetime,
and also the fourth-order equation in a particular case, and these solutions
are found to admit an exponential decay at large time provided that
square-integrability for positive time is required. Last, the vector wave
equation in the Eastwood-Singer gauge is solved explicitly when the potential
is taken to depend only on the time variable.Comment: 13 pages. Section 6, with new original calculations, has been added,
and the presentation has been improve
A Novel IP Traceback Scheme for Spoofing Attack
Internet has been widely applied in various fields, more and more network security issues emerge and catch people\u27s attention. However, adversaries often hide themselves by spoofing their own IP addresses and then launch attacks. For this reason, researchers have proposed a lot of trace back schemes to trace the source of these attacks. Some use only one packet in their packet logging schemes to achieve IP tracking. Others combine packet marking with packet logging and therefore create hybrid IP trace back schemes demanding less storage but requiring a longer search. In this paper, we propose a new hybrid IP trace back scheme with efficient packet logging aiming to have a fixed storage requirement for each router in packet logging without the need to refresh the logged tracking information and to achieve zero false positive and false negative rates in attack-path reconstruction
Comparisons of various configurations of the edge delamination test for interlaminar fracture toughness
Various configurations of Edge Delamination Tension (EDT) test specimens, of both brittle (T300/5208) and toughened-matrix (T300/BP907) graphite reinforced composite laminates, were manufactured and tested. The mixed-mode interlaminar fracture toughness, G sub C, was measured using (30/30 sub 2/30/90 sub N)sub s, n=1 or 2, (35/-35/0/90) sub s and (35/0/-35/90) sub s layups designed to delaminate at low tensile strains. Laminates were made without inserts so that delaminations would form naturally between the central 90 deg plies and the adjacent angle plies. Laminates were also made with Teflon inserts implanted between the 90 deg plies and the adjacent angle (theta) plies at the straight edge to obtain a planar fracture surface. In addition, interlaminar tension fracture toughness, GIc, was measured from laminates with the same layup but with inserts in the midplane, between the central 90 deg plies, at the straight edge. All of the EDT configurations were useful for ranking the delamination resistance of composites with different matrix resins. Furthermore, the variety of layups and configurations available yield interlaminar fracture toughness measurements needed to generate delamination failure criteria. The influence of insert thickness and location, and coupon size on G sub c values were evaluated
- …
