• Title/Summary/Keyword: computational mathematics

Search Result 3,222, Processing Time 0.025 seconds

Effect of progressive shear punch of a foundation on a reinforced concrete building behavior

  • Naghipour, Morteza;Niak, Kia Moghaddas;Shariati, Mahdi;Toghroli, Ali
    • Steel and Composite Structures
    • /
    • v.35 no.2
    • /
    • pp.279-294
    • /
    • 2020
  • Foundation of a building is damaged under service loads during construction. First visit shows that the foundation has been punched at the 6 column's foot region led to building rotation. Foundation shear punching occurring has made some stresses and deflections in construction. In this study, progressing of damage caused by foundation shear punching and inverse loading in order to resolve the building rotation has been evaluated in the foundation and frame of building by finite element modeling in ABAQUS software. The stress values of bars in punched regions of foundation has been deeply exceeded from steel yielding strength and experienced large displacement based on software's results. On the other hand, the values of created stresses in the frame are not too big to make serious damage. In the beams and columns of ground floor, some partial cracks has been occurred and in other floors, the values of stresses are in the elastic zone of materials. Finally, by inverse loading to the frame, the horizontal displacement of floors has been resolved and the values of stresses in frame has been significantly reduced.

Application of waste tire rubber aggregate in porous concrete

  • Shariati, Mahdi;Heyrati, Arian;Zandi, Yousef;Laka, Hossein;Toghroli, Ali;Kianmehr, Peiman;Safa, Maryam;Salih, Musab N.A.;Poi-Ngian, Shek
    • Smart Structures and Systems
    • /
    • v.24 no.4
    • /
    • pp.553-566
    • /
    • 2019
  • This study aimed to categorize pervious rubberized concrete into fresh and hardened concrete analyzing its durability, permeability and strength. During the globalization of modern life, growing population and industry rate have signified a sustainable approach to all aspects of modern life. In recent years, pervious concrete (porous concrete) has significantly substituted for pavements due to its mechanical and environmental properties. On the other hand, scrap rubber tire has been also contributed with several disposal challenges. Considering the huge amount of annually tire wastes tossing out, the conditions become worse. Pervious concrete (PC) gap has graded surface assisted with storm water management, recharging groundwater sources and alleviate water run-offs. The results have shown that the use of waste tires as aggregate built into pervious concrete has tremendously reduced the scrap tire wastes enhancing environmental compliance.

Coupled evaluation of the free vibration characteristics of magneto-electro-elastic skew plates in hygrothermal environment

  • Mahesh, Vinyas;Kattimani, Subhaschandra;Harursampath, Dineshkumar;Trung, Nguyen-Thoi
    • Smart Structures and Systems
    • /
    • v.24 no.2
    • /
    • pp.267-292
    • /
    • 2019
  • The present article addresses the coupled free vibration problem of skew magneto-electro-elastic plates (SMEE) considering the temperature-moisture dependent material properties. The plate kinematics follows Reddy's higher order shear deformation theory. With the aid of finite element methods, the governing equations of motion are derived considering the Hamilton's principle and solved by adopting condensation technique. The influence of different temperature and moisture dependent empirical constants on the frequency response of SMEE plate has been assessed. In addition, the natural frequencies corresponding to various fields are evaluated and the effect of empirical constants on these coupled frequencies is determined. A detailed parametric study has been carried out to assess the individual effects of temperature and moisture dependent empirical constants along with their combined effect, aspect ratio, length-to-width ratio, stacking sequence and boundary conditions. The results reveal that the external environment as well as the geometrical skewness has a significant influence on the stiffness of the SMEE plates.

MIXED INTEGER PROGRAMMING MODELS FOR DISPATCHING VEHICLES AT A CONTAINER TERMINAL

  • ZHANG LI WEI;YE RONG;HUANG SHELL YING;HSU WEN JING
    • Journal of applied mathematics & informatics
    • /
    • v.17 no.1_2_3
    • /
    • pp.145-170
    • /
    • 2005
  • This paper presents scheduling models for dispatching vehicles to accomplish a sequence of container jobs at the container terminal, in which the starting times as well as the order of vehicles for carrying out these jobs need to be determined. To deal with this scheduling problem, three mixed 0-1 integer programming models, Model 1, Model 2 and Model 3 are provided. We present interesting techniques to reformulate the two mixed integer programming models, Model 1 and Model 2, as pure 0-1 integer programming problems with simple constraint sets and present a lower bound for the optimal value of Model 1. Model 3 is a complicated mixed integer programming model because it involves a set of non-smooth constraints, but it can be proved that its solutions may be obtained by the so-called greedy algorithm. We present numerical results showing that Model 3 is the best among these three models and the greedy algorithm is capable of solving large scale problems.

CONVERGENCE ANALYSIS OF THE EAPG ALGORITHM FOR NON-NEGATIVE MATRIX FACTORIZATION

  • Yang, Chenxue;Ye, Mao
    • Journal of applied mathematics & informatics
    • /
    • v.30 no.3_4
    • /
    • pp.365-380
    • /
    • 2012
  • Non-negative matrix factorization (NMF) is a very efficient method to explain the relationship between functions for finding basis information of multivariate nonnegative data. The multiplicative update (MU) algorithm is a popular approach to solve the NMF problem, but it fails to approach a stationary point and has inner iteration and zero divisor. So the elementwisely alternating projected gradient (eAPG) algorithm was proposed to overcome the defects. In this paper, we use the fact that the equilibrium point is stable to prove the convergence of the eAPG algorithm. By using a classic model, the equilibrium point is obtained and the invariant sets are constructed to guarantee the integrity of the stability. Finally, the convergence conditions of the eAPG algorithm are obtained, which can accelerate the convergence. In addition, the conditions, which satisfy that the non-zero equilibrium point exists and is stable, can cause that the algorithm converges to different values. Both of them are confirmed in the experiments. And we give the mathematical proof that the eAPG algorithm can reach the appointed precision at the least iterations compared to the MU algorithm. Thus, we theoretically illustrate the advantages of the eAPG algorithm.

Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'

  • Khan, Muhammad Khurram;Kumari, Saru;Singh, Pitam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.967-979
    • /
    • 2013
  • Now a day, Wireless Sensor Networks (WSNs) are being widely used in different areas one of which is healthcare services. A wireless medical sensor network senses patient's vital physiological signs through medical sensor-nodes deployed on patient's body area; and transmits these signals to devices of registered medical professionals. These sensor-nodes have low computational power and limited storage capacity. Moreover, the wireless nature of technology attracts malicious minds. Thus, proper user authentication is a prime concern before granting access to patient's sensitive and private data. Recently, P. Kumar et al. claimed to propose a strong authentication protocol for healthcare using Wireless Medical Sensor Networks (WMSN). However, we find that P. Kumar et al.'s scheme is flawed with a number of security pitfalls. Information stored inside smart card, if extracted, is enough to deceive a valid user. Adversary can not only access patient's physiological data on behalf of a valid user without knowing actual password, can also send fake/irrelevant information about patient by playing role of medical sensor-node. Besides, adversary can guess a user's password and is able to compute the session key shared between user and medical sensor-nodes. Thus, the scheme looses message confidentiality. Additionally, the scheme fails to resist insider attack and lacks user anonymity.

NON LINEAR VARIABLE VISCOSITY ON MHD MIXED CONVECTION HEAT TRANSFER ALONG HIEMENZ FLOW OVER A THERMALLY STRATIFIED POROUS WEDGE

  • Kandasamy, R.;Hashim, I.;Ruhaila, K.
    • Journal of applied mathematics & informatics
    • /
    • v.26 no.1_2
    • /
    • pp.161-176
    • /
    • 2008
  • The effect of variable viscosity on MHD mixed convection Hiemenz flow over a thermally stratified porous wedge plate has been studied in the presence of suction or injection. The wall of the wedge is embedded in a uniform Darcian porous medium in order to allow for possible fluid wall suction or injection and has a power-law variation of the wall temperature. An approximate numerical solution for the steady laminar boundary-layer flow over a wall of the wedge in the presence of thermal diffusion has been obtained by solving the governing equations using numerical technique. The fluid is assumed to be viscous and incompressible. Numerical calculations are carried out for different values of dimensionless parameters and an analysis of the results obtained shows that the flow field is influenced appreciably by the magnetic effect, variable viscosity, thermal stratification and suction / injection at wall surface. Effects of these major parameters on the transport behaviors are investigated methodically and typical results are illustrated to reveal the tendency of the solutions. Comparisons with previously published works are performed and excellent agreement between the results is obtained.

  • PDF

INVOLUTION-PRESERVING MAPS WITHOUT THE LINEARITY ASSUMPTION AND ITS APPLICATION

  • Xu, Jin-Li;Cao, Chong-Guang;Wu, Hai-Yan
    • Journal of applied mathematics & informatics
    • /
    • v.27 no.1_2
    • /
    • pp.97-103
    • /
    • 2009
  • Suppose F is a field of characteristic not 2 and $F\;{\neq}\;Z_3$. Let $M_n(F)$ be the linear space of all $n{\times}n$ matrices over F, and let ${\Gamma}_n(F)$ be the subset of $M_n(F)$ consisting of all $n{\times}n$ involutory matrices. We denote by ${\Phi}_n(F)$ the set of all maps from $M_n(F)$ to itself satisfying A - ${\lambda}B{\in}{\Gamma}_n(F)$ if and only if ${\phi}(A)$ - ${\lambda}{\phi}(B){\in}{\Gamma}_n(F)$ for every A, $B{\in}M_n(F)$ and ${\lambda}{\in}F$. It was showed that ${\phi}{\in}{\Phi}_n(F)$ if and only if there exist an invertible matrix $P{\in}M_n(F)$ and an involutory element ${\varepsilon}$ such that either ${\phi}(A)={\varepsilon}PAP^{-1}$ for every $A{\in}M_n(F)$ or ${\phi}(A)={\varepsilon}PA^{T}P^{-1}$ for every $A{\in}M_n(F)$. As an application, the maps preserving inverses of matrces also are characterized.

  • PDF

AN EFFICIENT AND SECURE STRONG DESIGNATED VERIFIER SIGNATURE SCHEME WITHOUT BILINEAR PAIRINGS

  • Islam, Sk Hafizul;Biswas, G.P.
    • Journal of applied mathematics & informatics
    • /
    • v.31 no.3_4
    • /
    • pp.425-441
    • /
    • 2013
  • In literature, several strong designated verifier signature (SDVS) schemes have been devised using elliptic curve bilinear pairing and map-topoint (MTP) hash function. The bilinear pairing requires a super-singular elliptic curve group having large number of elements and the relative computation cost of it is approximately two to three times higher than that of elliptic curve point multiplication, which indicates that bilinear pairing is an expensive operation. Moreover, the MTP function, which maps a user identity into an elliptic curve point, is more expensive than an elliptic curve scalar point multiplication. Hence, the SDVS schemes from bilinear pairing and MTP hash function are not efficient in real environments. Thus, a cost-efficient SDVS scheme using elliptic curve cryptography with pairingfree operation is proposed in this paper that instead of MTP hash function uses a general cryptographic hash function. The security analysis shows that our scheme is secure in the random oracle model with the hardness assumption of CDH problem. In addition, the formal security validation of the proposed scheme is done using AVISPA tool (Automated Validation of Internet Security Protocols and Applications) that demonstrated that our scheme is unforgeable against passive and active attacks. Our scheme also satisfies the different properties of an SDVS scheme including strongness, source hiding, non-transferability and unforgeability. The comparison of our scheme with others are given, which shows that it outperforms in terms of security, computation cost and bandwidth requirement.

POSITIVE SOLUTIONS FOR A THREE-POINT FRACTIONAL BOUNDARY VALUE PROBLEMS FOR P-LAPLACIAN WITH A PARAMETER

  • YANG, YITAO;ZHANG, YUEJIN
    • Journal of applied mathematics & informatics
    • /
    • v.34 no.3_4
    • /
    • pp.269-284
    • /
    • 2016
  • In this paper, we firstly use Krasnosel'skii fixed point theorem to investigate positive solutions for the following three-point boundary value problems for p-Laplacian with a parameter $({\phi}_P(D^{\alpha}_{0}+u(t)))^{\prime}+{\lambda}f(t, u(t))=0$, 0$D^{\alpha}_{0}+u(0)=u(0)=u{\prime}{\prime}(0)=0$, $u^{\prime}(1)={\gamma}u^{\prime}(\eta)$ where ϕp(s) = |s|p−2s, p > 1, $D^{\alpha}_{0^+}$ is the Caputo's derivative, α ∈ (2, 3], η, γ ∈ (0, 1), λ > 0 is a parameter. Then we use Leggett-Williams fixed point theorem to study the existence of three positive solutions for the fractional boundary value problem $({\phi}_P(D^{\alpha}_{0}+u(t)))^{\prime}+f(t, u(t))=0$, 0$D^{\alpha}_{0}+u(0)=u(0)=u{\prime}{\prime}(0)=0$, $u^{\prime}(1)={\gamma}u^{\prime}(\eta)$ where ϕp(s) = |s|p−2s, p > 1, $D^{\alpha}_{0^+}$ is the Caputo's derivative, α ∈ (2, 3], η, γ ∈ (0, 1).