期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Integrating Test Data and ATBM Simulations into Dose Propagation Uncertainty Formulation for Bone Fracture Risk Assessment
1
作者 Hongyun Wang Corinne Kramer +2 位作者 Jessica Swallow Wesley A. Burgei Hong Zhou 《Health》 2019年第10期1426-1472,共47页
We consider the problem of assessing bone fracture risk for a subject hit by a blunt impact projectile. We aim at constructing a framework for integrating test data and Advanced Total Body Model (ATBM) simulations int... We consider the problem of assessing bone fracture risk for a subject hit by a blunt impact projectile. We aim at constructing a framework for integrating test data and Advanced Total Body Model (ATBM) simulations into the risk assessment. The ATBM is a finite element model managed by the Joint Non-Lethal Weapons Directorate for the purpose of assessing the risk of injury caused by blunt impacts from non-lethal weapons. In ATBM simulations, the quantity that determines arm bone fracture is the calculated maximum strain in the bone. The main obstacle to accurate prediction is that the calculated strain is incompatible with the measured strain. The fracture strain measured in bending tests of real bones is affected by random inhomogeneity in bones and uncertainty in measurement gauge attachment location/orientation. In contrast, the strain calculated in ATBM simulations is based on the assumption that all bones are perfectly elastic with homogeneous material properties and no measurement uncertainty. To connect test data and ATBM simulations in a proper and meaningful setting, we introduce the concept of elasticity-homogenized strain. We interpret test data in terms of the homogenized strain, and build an empirical dose-injury model with the homogenized strain as the input dose for predicting injury. The maximum strain calculated by ATBM has randomness due to uncertainty in specifications of ATBM setup parameters. The dose propagation uncertainty formulation accommodates this uncertainty efficiently by simply updating the shape parameters in the dose-injury model, avoiding the high computational cost of sampling this uncertainty via multiple ATBM runs. 展开更多
关键词 BLUNT Impact Bone Fracture Effects of Loading Rate Elasticity-Homogenized Strain DOSE PROPAGATION UNCERTAINTY FORMULATION ATBM Simulations
下载PDF
Technology-Transfer Through International Network Formation: Revisiting the Role of Cultural Variation
2
作者 Ki Hyun Yoo Young Soo Yang 《Management Studies》 2015年第2期98-109,共12页
This paper studies the factors affecting the technology-transfer within international research and development (R&D) networks. Specifically, this study examines the characteristics of ties, actors, and internationa... This paper studies the factors affecting the technology-transfer within international research and development (R&D) networks. Specifically, this study examines the characteristics of ties, actors, and international network configuration to assess finn's accessibility to unique technologies. This study was conducted by research analysis in the aerospace industry. The total sample size used in this study is 125 cases of international R&D consortiums from January 1980 to December 2000. The result of this study supports the effects of "strength of tie" and "characteristic of actors" on the technology transfer explained by network theory. It also demonstrates that the international network structure that would facilitate the technology transfer is shaped by dual type of tie; the apparent type of tie is general, usual, and functional tie, and the hidden one is the national culture. 展开更多
关键词 the aerospace industry international research and development (R&D) network strength of ties national culture technology transfer
下载PDF
Green Investment Cost Optimization Model in the Supply Chain 被引量:2
3
作者 Seungbae Sim Hosang Jung 《American Journal of Operations Research》 2013年第6期454-462,共9页
The objective of this study is to develop a model that determines the optimal points for investment in green management by defining a mathematical relationship between carbon trading profits and investments in green m... The objective of this study is to develop a model that determines the optimal points for investment in green management by defining a mathematical relationship between carbon trading profits and investments in green management using a company’s supply chain information. To formulate this model, we first define and analyze a green supply chain in a multi-dimensional and quantitative manner. The green investment alternatives considering in our model are as follows: 1) purchasing eco-friendly raw materials that cost more than conventional raw materials but whose use in production results in lower CO2 emissions;2) replacing current facilities with new eco-friendly facilities that have the capability to reduce CO2 emissions;and 3) changing modes of transport from less eco-friendly to more eco-friendly modes. We propose a green investment cost optimization (GICO) model that enables us to determine the optimal investment points. The proposed GICO model can support decision-making processes in green supply chain management environments. 展开更多
关键词 Green INVESTMENT COST OPTIMIZATION MODEL in the Supply CHAIN
下载PDF
Sharing Smart Card Authenticated Sessions Using Proxies
4
作者 Kevin E. Foltz William R. Simpson 《Computer Technology and Application》 2016年第1期28-45,共18页
This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web... This paper discusses an approach to share a smart card in one machine with other machines accessible on the local network or the Internet. This allows a user at a browser to use the shared card remotely and access web applications that requiresmart card authentication. This also enables users to access these applications from browsers and machines that do not have the capability to use a smart card. The approach uses proxies and card reader code to provide this capability to the requesting device.Previous work with remote or shared smart card use either requires continuous access to the smart card machine or specific client software. The approach in this paper works for any device and browser that has proxy settings, creates minimal network traffic and computation on the smart card machine, and allows the client to transfer from one network to another while maintaining connectivity to a server. This paper describes the smart card sharing approach, implementation and validation of the approach using real systems, and security implications for an enterprise using smart cards. 展开更多
关键词 Smart CARD IT security authentication key management PROXY SSL TLS session stealing
下载PDF
Personal Delegation by Persona Creation
5
作者 Coimbatore S. Chandersekaran William R. Simpson 《Computer Technology and Application》 2011年第6期413-423,共11页
There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability ... There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g., by sharing credentials [passwords or hardware tokens] between users), resulting in serious security concerns and a lack of accountability. This paper describes a methodology for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it, This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by a major enterprise. The creation of a persona solves a lot of downstream problems by allowing the persona to be treated like any other entity in the system. That is, identity, authentication, authorization, and other security processes already know how to handle an entity of this type. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required. 展开更多
关键词 DELEGATION enterprise information security least privilege ATTRIBUTION information sharing
下载PDF
An Agent-Based Web-Services Monitoring System
6
作者 Coimbatore S. Chandersekaranl William R. Simpson 《Computer Technology and Application》 2011年第9期675-685,共11页
An enterprise based on web services can benefit from computer-based monitoring for its normal course of business. No services, delayed services, inadequate services and poor or delayed information flow all hinder or p... An enterprise based on web services can benefit from computer-based monitoring for its normal course of business. No services, delayed services, inadequate services and poor or delayed information flow all hinder or prevent the normal course of business. The health of the service-oriented approach, the communication flow and the services themselves directly equate to the health and vitality of the enterprise. By health we mean, availability, performance, integrity, and reliability of web services. This paper proposes and details an agent based approach for web service monitoring in an enterprise environment. The objective of this approach is to provide enhanced security, improved help desk information and attribution across a diverse web services landscape that is logically a system but physically distributed. The definition of the agents, their logical locations, their functionality and relationships has not been described previously. This architecture provides many advantages over previous methodologies for event monitoring including assignment of overlapping responsibilities, reduction in help desk effort and placement of measurements throughout the upper layers of the web services system. This is also the first enumeration of significant events and information requirements at the service level. It also assigns responsibility to the components (agents, handlers or the service itself) for logging and alerting such events. This architecture is currently being implemented by a major defense entity. 展开更多
关键词 Help desk AGENT MONITORING ENTERPRISE support services information sharing
下载PDF
Quality vs. quantity of publications in nanotechnology field from the People’s Republic of China 被引量:2
7
作者 Ronald N. KOSTOFF Ryan B. BARTH Clifford G. Y. LAU 《Chinese Science Bulletin》 SCIE EI CAS 2008年第8期1272-1280,共9页
This study evaluates trends in quality of nanotechnology and nanoscience papers produced by au- thors from the People’s Republic of China (PRC). The metric used to gauge quality is ratio of highly cited nanotechnolog... This study evaluates trends in quality of nanotechnology and nanoscience papers produced by au- thors from the People’s Republic of China (PRC). The metric used to gauge quality is ratio of highly cited nanotechnology papers to total nanotechnology papers produced in sequential time frames. The USA is both the most prolific nanotechnology publishing country and most represented country on highly cited nanotechnology papers (both in absolute numbers of highly cited papers and highly cited papers relative to total publications) over the 1998―2003 time frame, based on the SCI/SSCI databases. Some of the smaller hi-tech countries have relatively high ratios (~2) of highly cited papers to total publications (e.g. Denmark, Netherlands, Switzerland). Countries that have exhibited rapid growth in SCI/SSCI nanotechnology paper production in recent years (e.g. PRC, South Korea) had ratios an order of magnitude less than that of the USA for 1998, but by 2003 had increased to about 20% that of the USA (~2.5). PRC and South Korea have climbed in the publications rankings from 6th and 9th in 1998, re- spectively, to 2nd and 6th in 2005, respectively. PRC’s ratio monotonically increased from 0.16 to 0.45 over the 1998―2003 period, and South Korea’s ratio increased from 0.11 to about 0.6 over that same period, indicating their papers are getting more and more citations proportionately. Thus, under rapid growth conditions, PRC and South Korea have been able to increase their share of participation in highly cited papers. As of 2003, PRC and South Korea have ratios comparable to nations like Japan, France, Italy, and Australia but not yet approaching those of the highly cited countries. None of the top ten publications producing institutions are from the USA, while all of the top ten highly cited publica- tions producers are from the USA. Over the 1998―2003 time period, the top six total publications pro- ducing institutions (globally) remained the same, with Chinese Academy of Sciences (which consists of many research institutes) wresting the lead from Russian Academy of Sciences in 1999, and thereafter increasing the gap. Over this same time period, the USA institutions constituted about 90% of the top ten most cited papers list. For Chinese institutions specifically in the period 1998―2003, the nanotech- nology publication leading Chinese Academy of Sciences has maintained an average of about 30% of nanotechnology publications over that time frame. The second tier (in terms of quantity) for the last few years has consisted of Tsinghua University, Nanjing University, University of Science and Technology of China, Peking University, Jilin University, Zhejiang University, Shandong University, and Fudan University. Hong Kong institutions have, on average, been strong in ratio, especially City University Hong Kong, and Hong Kong University of Science and Technology, indicating significant citations. 展开更多
关键词 纳米技术 纳米科学 引用分析 中国
原文传递
全球纳米技术研究文献计量分析 被引量:1
8
作者 Ronald N. Kostoff Raymond G. Koytcheff +1 位作者 Clifford G.Y. Lau 赵亚娟(翻译) 《科学观察》 2007年第2期1-10,共10页
本研究采用文本挖掘技术,从在全球公开的纳米科学和技术研究文献数据库(SCI/SSCI数据库)中提取技术情报。在SCI/SSCI数据库中利用纳米科学和技术领域的300多个术语进行相关文献的检索;利用摘要共现词汇的自相关图来揭示的技术核心领域;... 本研究采用文本挖掘技术,从在全球公开的纳米科学和技术研究文献数据库(SCI/SSCI数据库)中提取技术情报。在SCI/SSCI数据库中利用纳米科学和技术领域的300多个术语进行相关文献的检索;利用摘要共现词汇的自相关图来揭示的技术核心领域;通过词汇间的互相关图来揭示因共现而发生关系的词汇的技术核心领域;采用因子矩阵进一步量化研究机构之间、国家之间的关系强度,并对图中揭示的合作出版网络给予确证。 展开更多
关键词 纳米颗粒 纳米管 纳米技术 文本挖掘 文献计量 文献聚类
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部