Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 9018 results
Sort by: relevance publication year

Laser scanning and computer vision-based bridge deformation measurement for digital shape management of bridge structures

PROCEEDINGS ARTICLE published 10 May 2024 in Sensors and Smart Structures Technologies for Civil, Mechanical, and Aerospace Systems 2024

Authors: Gichun Cha | Mingeon Cho | Pa Pa Win Aung | Changjun Lee | Byoungjoon Yu | Seunghee Park

Editors: Maria Pina Limongelli | Ching Tai Ng | Branko Glisic

Bayesian and Non-Bayesian Estimation for the Shape Parameters of New Versions of Bivariate Inverse Weibull Distribution based on Progressive Type II Censoring

JOURNAL ARTICLE published 1 April 2024 in Computational Journal of Mathematical and Statistical Sciences

Authors: Hiba Z Muhammed | Ehab Almetwally

The Cinema in Flux. The Evolution of Motion Picture Technology from the Magic Lantern to the Digital Era The Cinema in Flux. The Evolution of Motion Picture Technology from the Magic Lantern to the Digital Era LENNY LIPTON, 2021Berlin, New York, etc., Springer Science + Business Media LLC pp. xxii + 795, illus, £44.99 (hardback)

JOURNAL ARTICLE published 5 February 2024 in Historical Journal of Film, Radio and Television

Authors: Deac Rossell

Journal Vol – 19 No -1, January 2024 Journal > Journal > Journal Vol – 19 No -1, January 2024 RELIABILITY OPTIMIZATION OF A DEGRADED SYSTEM UNDER PREVENTIVE MAINTENANCE USING GENETIC ALGORITHM Authors: Shakuntla Singla, Diksha Mangla, Poonam Panwar, S Z Taj DOI NO: https://doi.org/10.26782/jmcms.2024.01.00001 admin January 20, 2024 Abstract: The reliability parameters of a Mathematical model are analyzed for a system with three identical units and a standby. In this study, the primary unit is considered more important due to its high cost and working in two types of degraded conditions before a complete malfunction. Under the concept of preventive maintenance, the states of deterioration are reversed. The working of the system under two different efficiencies is discussed. The reliability of the Mathematical model, depending on the availability and working time, has been optimized using the Mathematical tool “Genetic Algorithm”. The optimum values of all parameters based on the exponential distribution are considered to optimize the reliability, and thus provide maximum benefits to the industry. Sensitivity analysis of the availability and the working time is carried out to understand the effects of changing parameters. Graphical and tabular analyses are presented to discuss the results and to draw conclusions about the system’s behavior. Keywords: deteriorated state,genetic algorithm,malfunction rate,preventive maintenance,regenerative point graphical technique,sensitivity analysis, Refference: I. Bhunia, A.K. and Sahoo, L. (2011). Genetic algorithm based reliability optimization in interval environment. In: Nedjah, N., dos Santos Coelho, L., Mariani, V.C., de Macedo Mourelle, L. (eds) Innovative Computing Methods and Their Applications to Engineering Problems. Studies in Computational Intelligence, 357. Springer, Berlin, Heidelberg. II. Kumar, J., Bansal, S.A., Mehta, M. and Singh, H. (2020). Reliability analysis in process industries – an overview. GIS Sci J., 7(5), 151-168. III. Kumari, K. and Poonia, M.S. (2023). Availability optimization of cylinder block in cast iron manufacturing plant using GA. European Chemical Bulletin, 12(4), 17784-17792. IV. Kumari, S., Khurana, P. and Singla, S. (2022). Behaviour and profit analysis of a thresher plant under steady state. International Journal of System Assurance Engineering and Management, 13, 166-171. V. Kumari, S., Singla, S. and Khurana, P. (2022). Particle swarm optimization for constrained cost reliability of rubber plant. Life Cycle Reliability and Safety Engineering, 11(3), 273-277. VI. Malik, S., Verma, S., Gupta, A., Sharma, G. and Singla, S. (2022). Performability evaluation, validation and optimization for the steam generation system of a coal-fired thermal power plant. MethodsX, 9. VII. Naithani, A., Khanduri, S. and Gupta, S. (2022). Stochastic analysis of main unit with two non-identical replaceable sub-units working with partial failure. International Journal of System Assurance Engineering and Management, 13, 1467-1473. VIII. Naithani, A., Parashar, B., Bhatia, P.K. and Taneja G. (2013). Cost benefit analysis of a 2-out-of-3 induced draft fans system with priority for operation to cold standby over working at reduced capacity. Advanced Modelling and Optimization, 15(2), 499-509. IX. Sachdeva, K., Taneja, G, and Manocha, A. (2022). Sensitivity and economic analysis of an insured system with extended conditional warranty. Reliability: Theory and Applications, 17, 24–31. X. Singla, S. and Dhawan, P. (2022). Mathematical analysis of regenerative point graphical technique (RPGT). Mathematical Analysis and its Contemporary Applications, 4(4), 49-56. XI. Taj, S. Z. and Rizwan, S. M. (2022). Reliability analysis of a 3-unit parallel system with single maintenance facility. Advanced Mathematical Models & Applications, 7(1), 93-103. View Download Journal Vol – 19 No -1, January 2024 CONSTRUCTION OF A SPLINE FUNCTION WITH MIXED NODE VALUES

JOURNAL ARTICLE published 27 January 2024 in JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES

Authors: Rama Nand Mishra

A Subdivision-Based Combined Shape and Topology Optimization in Acoustics

JOURNAL ARTICLE published 2024 in Computer Modeling in Engineering & Sciences

Authors: Chuang Lu | Leilei Chen | Jinling Luo | Haibo Chen

Finding Forensic Artefacts in Long-Term Frequency Band Occupancy Measurements Using Statistics and Machine Learning

BOOK CHAPTER published 2024 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Authors: Bart Somers | Asanka Sayakkara | Darren R. Hayes | Nhien-An Le-Khac

Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and Challenges

BOOK CHAPTER published 2024 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Authors: Martin Husák | Shanchieh Jay Yang | Joseph Khoury | Đorđe Klisura | Elias Bou-Harb

A Quantum Physics Approach for Enabling Information-Theoretic Secure Communication Channels

BOOK CHAPTER published 2024 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Authors: Ivan Cvitić | Dragan Peraković

Detection of Targeted Attacks Using Medium-Interaction Honeypot for Unmanned Aerial Vehicle

BOOK CHAPTER published 2024 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Authors: Abdul Majid Jamil | Hassan Jalil Hadi | Sifan Li | Yue Cao | Naveed Ahmed | Faisal Bashir Hussain | Chakkaphong Suthaputchakun | Xinyuan Wang

Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy

BOOK CHAPTER published 2024 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Authors: Aleck Nash | Hudan Studiawan | George Grispos | Kim-Kwang Raymond Choo

IoT Malicious Traffic Detection Based on Federated Learning

BOOK CHAPTER published 2024 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Authors: Yi Shen | Yuhan Zhang | Yuwei Li | Wanmeng Ding | Miao Hu | Yang Li | Cheng Huang | Jie Wang

Global and exponential stabilization of morphogenesis models with logarithmic sensitivity and linear degradation

JOURNAL ARTICLE published 2024 in Discrete and Continuous Dynamical Systems

Authors: Lin Chen | Department of Mathematical Sciences, Carnegie Mellon University, Pittsburgh, PA 15213, USA | Fanze Kong | Qi Wang | Department of Mathematics, University of British Columbia, Vancouver, BC, V6T 1Z2, Canada | Department of Mathematics, Southwestern University of Finance and Economics, Chengdu, Sichuan 611130, China | Department of Applied Physics and Applied Mathematics, Columbia University, New York, NY 20017, USA

CCBA: Code Poisoning-Based Clean-Label Covert Backdoor Attack Against DNNs

BOOK CHAPTER published 2024 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Authors: Xubo Yang | Linsen Li | Cunqing Hua | Changhao Yao

Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities

BOOK CHAPTER published 2024 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Authors: Aleck Nash | Kim-Kwang Raymond Choo

Point Cloud Model Information Hiding Algorithm Based on Multi-scale Transformation and Composite Operator

BOOK CHAPTER published 2024 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Authors: Shuai Ren | Hao Gong | Huirong Cheng | Zejing Cheng

A Multi-carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis

BOOK CHAPTER published 2024 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Authors: Shuai Ren | Liming Ma | Qiuyu Feng

Backdoor Learning on Siamese Networks Using Physical Triggers: FaceNet as a Case Study

BOOK CHAPTER published 2024 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Authors: Zeshan Pang | Yuyuan Sun | Shasha Guo | Yuliang Lu

DynVMDroid: Android App Protection via Code Disorder and Dynamic Recovery

BOOK CHAPTER published 2024 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Authors: Weimiao Feng | Rui Hu | Cong Zhou | Lei Yu

Improvement of an Identity-Based Aggregate Signature Protocol from Lattice

BOOK CHAPTER published 2024 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Authors: Songshou Dong | Yanqing Yao | Yihua Zhou | Yuguang Yang

Decoding HDF5: Machine Learning File Forensics and Data Injection

BOOK CHAPTER published 2024 in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Authors: Clinton Walker | Ibrahim Baggili | Hao Wang