نتایج جستجو برای: wen model
تعداد نتایج: 2105878 فیلتر نتایج به سال:
The Low Yield Strength Steel (LYS) has the superiority over long period of low cycle fatigue, high strain hardening rate and impressive ductility to overcome the local fracture problem existing in regular A36 steel plate. With elastoplastic characteristics and experimental verification, it becomes a good material considered for added damping and stiffness (ADAS) since the stress–strain relation...
WEN CHEN, WEIXING HE, AND TINGXIU ZHONG Affiliation: Department of Mechanical Engineering, Shanghai Jiao Tong University, Shanghai 200030, P. R. China Affiliation: Department of Electrical Engineering, Jiangsu University of Science & Technology, Zhenjiang, Jiangsu 212013, P. R. China. Corresponding author: Wen Chen (PhD), Mail address: P. O. Box 9601BB, Shanghai Jiao Tong University, Shanghai 2...
Wen-Pyng Wu, Chi-Hao Chang, Yung-Tsung Chiu, Cheng-Lung Ku, Mei-Chin Wen, Kuo-Hsiung Shu, and Ming-Ju Wu Graduate Institute of Clinical Medical Science, China Medical University; Division of Nephrology, Chang-Bing Show Chwan Memorial Hospital; Institute of Clinical Medicine, National Yang Ming University; Departments of Research, Pathology, and Division of Nephrology, Department of Medicine, Ta...
Customer relationship management (CRM) in business‐to‐business (B2B) e‐commerce Yun E. Zeng H. Joseph Wen David C. Yen Article information: To cite this document: Yun E. Zeng H. Joseph Wen David C. Yen, (2003),"Customer relationship management (CRM) in business#to#business (B2B) e#commerce", Information Management & Computer Security, Vol. 11 Iss 1 pp. 39 44 Permanent link to this document: htt...
Password-Authenticated Key Exchange (PAKE) protocols allow parties to share secret keys in an authentic manner based on an easily memorizable password. Recently, Nam et al. showed that a provably secure three-party passwordbased authenticated key exchange protocol using Weil pairing by Wen et al. is vulnerable to a man-in-the-middle attack. In doing so, Nam et al. showed the flaws in the proof ...
Password-Authenticated Key Exchange (PAKE) protocols allow parties to share secret keys in an authentic manner based on an easily memorizable password. Recently, Nam et al. showed that a provably secure three-party passwordbased authenticated key exchange protocol using Weil pairing by Wen et al. is vulnerable to a man-in-the-middle attack. In doing so, Nam et al. showed the flaws in the proof ...
In the literature, the generalized Bouc-Wen model can track precisely asymmetric hysteresis nonlinearity. In this paper, we propose to extend this generalized model to multivariable hysteresis model that can track the nonlinearities in multi-degrees of freedom (multi-DoF) hysteretic actuated systems. In particular, these systems are typified by strong hysteresis couplings. Then, a method of ide...
Chin-Wei Chang, Kai-Chi Chang, Ya-Shun Chen, Chien-Lin Huang, Chia-Ling Ko, Jia-Horng Lin, Ching-Wen Lou and Wen-Cheng Chen* Department of Fiber and Composite Materials, College of Engineering, Feng Chia University, Taichung 40724, Taiwan School of Chinese Medicine, China Medical University, Taichung 40402, Taiwan Department of Biotechnology, Asia University, Taichung 41354, Taiwan Institute of...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید