240,939 research outputs found

    Application of the linear matching method to creep-fatigue failure analysis of cruciform weldment manufactured of the austenitic steel AISI type 316N(L)

    Get PDF
    This paper demonstrates the recent extension of the Linear Matching Method (LMM) to include cyclic creep assessment [1] in application to a creep-fatigue analysis of a cruciform weldment made of the stainless steel AISI type 316N(L). The obtained results are compared with the results of experimental studies implemented by Bretherton et al. [2] with the overall objective to identify fatigue strength reduction factors (FSRF) of austenitic weldments for further design application. These studies included a series of strain-controlled tests at 550°C with different combinations of reversed bending moment and dwell time Δt. Five levels of reversed bending moment histories corresponding to defined values of total strain range Δεtot in remote parent material (1%, 0.6%, 0.4%, 0.3%, 0.25%) were used in combination with three variants of creep-fatigue conditions: pure fatigue, 1 hour and 5 hours of dwell period Δt of hold in tension. An overview of previous works devoted to analysis and simulation of these experiments [2] and highlight of the LMM development progress could be found in [3]

    Maximizing Hadron Collider Sensitivity to Gauge-Mediated Supersymmetry Breaking Models

    Get PDF
    We consider typical hadron collider detector signals sensitive to delayed decays of the lightest neutralino to photon plus goldstino and demonstrate the potential for substantially increasing the portion of the general parameter space of a gauge-mediated supersymmetry breaking model that can be probed at the Tevatron.Comment: 11 pages, full postscript file is available via anonymous ftp at ftp://ucdhep.ucdavis.edu/gunion/gmsb.ps; incorrect labels on figures correcte

    Individual Tariffs for Mobile Services: Analysis of Operator Business and Risk Consequences

    Get PDF
    A design approach is offered for individual tariffs for mass customized mobile service products, whereby operators can determine their contract acceptance rules to guarantee with a set probability their minimum profit and risk levels. It uses realistic improvements to earlier reported negotiation algorithms [1], and a full operator operational model including infrastructure and content acquisition. Value at risk and profit are analyzed when a random user has consistent characteristics to a survey group, so that risk and profits are pooled. This analysis is necessary to give the supplier business guarantees to enter individual tariff agreements. A full numerical case is given for a class of mobile service.risks;mobile communication services;Individual tariffs

    Individual Tariffs for Mobile Services: Theoretical Framework and a Computational Case in Mobile Music

    Get PDF
    This paper introduces individual tariffs at service and content bundle level in mobile communications. It gives a theoretical framework (economic, sociological) as well as a computational game solution method. The user can be an individual or a community. Individual tariffs are decided through interactions between the user and the supplier. A numerical example from mobile music illustrates the concepts.risks;mobile communication services;Individual tariffs;computational games

    Individual Tariffs for Mobile Communication Services

    Get PDF
    This paper introduces a conceptual framework and a computational model for individual tariffs for mobile communication services. The purpose is to provide guidance for implementation by communication service suppliers or user groups alike. The paper first examines the sociological and economic incentives for personalized services and individual tariffs. Then it introduces a framework for individual tariffs which is centered on user and supplier behaviours. The user, instead of being fully rational, has "bounded rationality" and his behaviours are subject to economic constraints and influenced by social needs. The supplier can belong to different types of entities such as firms and communities; each has his own goals which lead to different behaviors. Individual tariffs are decided through interactions between the user and the supplier and can be analyzed in a structured way using game theory. A numerical case in mobile music training is developed to illustrate the concepts.risks;mobile communication services;Individual tariffs;computational games

    Mass Customization in Wireless Communication Services: Individual Service Bundles and Tariffs

    Get PDF
    This paper presents results on mass customization of wireless communications services and tariffs. It advocates for a user-centric view of wireless service configuration and pricing as opposed to present-day service catalog options. The focus is on design methodology and tools for such individual services and tariffs, using altogether information compression, negotiation algorithms, and risk portfolio analysis. We first analyze the user and supplier needs and aspirations. We then introduce the systematic design-oriented approach which can be applied. The implications of this approach for users and suppliers are discussed based on an end-user survey and on model-based calculations. It is shown that users can achieve desired service bundle cost reduction, while suppliers can improve significantly their risk-profit equilibrium points, reduce churn and simplify provisioning.negotiation;mass customization;service configuration;mobile communication services;individual tariffs

    Structure of the hadron-quark mixed phase in protoneutron stars

    Full text link
    We study the hadron-quark phase transition in the interior of hot protoneutron stars, combining the Brueckner-Hartree-Fock approach for hadronic matter with the MIT bag model or the Dyson-Schwinger model for quark matter. We examine the structure of the mixed phase constructed according to different prescriptions for the phase transition, and the resulting consequences for stellar properties. We find important effects for the internal composition, but only very small influence on the global stellar properties.Comment: 6 pages, 4 figure

    Extending the Energy Framework for Network Simulator 3 (ns-3)

    Full text link
    The problem of designing and simulating optimal transmission protocols for energy harvesting wireless networks has recently received considerable attention, thus requiring for an accurate modeling of the energy harvesting process and a consequent redesign of the simulation framework to include it. While the current ns-3 energy framework allows the definition of new energy sources that incorporate the contribution of an energy harvester, the integration of an energy harvester component into an existing energy source is not straightforward using the existing energy framework. In this poster, we propose an extension of the energy framework currently released with ns-3 in order to explicitly introduce the concept of an energy harvester. Starting from the definition of the general interface, we then provide the implementation of two simple models for the energy harvester. In addition, we extend the set of implementations of the current energy framework to include a model for a supercapacitor energy source and a device energy model for the energy consumption of a sensor. Finally, we introduce the concept of an energy predictor, that gathers information from the energy source and harvester and use this information to predict the amount of energy that will be available in the future, and we provide an example implementation. As a result of these efforts, we believe that our contributions to the ns-3 energy framework will provide a useful tool to enhance the quality of simulations of energy-aware wireless networks.Comment: 2 pages, 4 figures. Poster presented at WNS3 2014, Atlanta, G
    corecore