نتایج جستجو برای: wen model

تعداد نتایج: 2105878  

2005
Ming-Hsiang Shih Wen-Pei Sung

The Low Yield Strength Steel (LYS) has the superiority over long period of low cycle fatigue, high strain hardening rate and impressive ductility to overcome the local fracture problem existing in regular A36 steel plate. With elastoplastic characteristics and experimental verification, it becomes a good material considered for added damping and stiffness (ADAS) since the stress–strain relation...

Journal: :CoRR 2002
W. Chen Weixing He Tingxiu Zhong

WEN CHEN, WEIXING HE, AND TINGXIU ZHONG Affiliation: Department of Mechanical Engineering, Shanghai Jiao Tong University, Shanghai 200030, P. R. China Affiliation: Department of Electrical Engineering, Jiangsu University of Science & Technology, Zhenjiang, Jiangsu 212013, P. R. China. Corresponding author: Wen Chen (PhD), Mail address: P. O. Box 9601BB, Shanghai Jiao Tong University, Shanghai 2...

2010
Wen-Pyng Wu Chi-Hao Chang Yung-Tsung Chiu Cheng-Lung Ku Mei-Chin Wen Kuo-Hsiung Shu Ming-Ju Wu

Wen-Pyng Wu, Chi-Hao Chang, Yung-Tsung Chiu, Cheng-Lung Ku, Mei-Chin Wen, Kuo-Hsiung Shu, and Ming-Ju Wu Graduate Institute of Clinical Medical Science, China Medical University; Division of Nephrology, Chang-Bing Show Chwan Memorial Hospital; Institute of Clinical Medicine, National Yang Ming University; Departments of Research, Pathology, and Division of Nephrology, Department of Medicine, Ta...

Journal: :Inf. Manag. Comput. Security 2003
Yun E. Zeng H. Joseph Wen David C. Yen

Customer relationship management (CRM) in business‐to‐business (B2B) e‐commerce Yun E. Zeng H. Joseph Wen David C. Yen Article information: To cite this document: Yun E. Zeng H. Joseph Wen David C. Yen, (2003),"Customer relationship management (CRM) in business#to#business (B2B) e#commerce", Information Management & Computer Security, Vol. 11 Iss 1 pp. 39 44 Permanent link to this document: htt...

2017
Wei-Chuen Yau Bok-Min Goi

Password-Authenticated Key Exchange (PAKE) protocols allow parties to share secret keys in an authentic manner based on an easily memorizable password. Recently, Nam et al. showed that a provably secure three-party passwordbased authenticated key exchange protocol using Weil pairing by Wen et al. is vulnerable to a man-in-the-middle attack. In doing so, Nam et al. showed the flaws in the proof ...

2018
Wei-Chuen Yau Bok-Min Goi

Password-Authenticated Key Exchange (PAKE) protocols allow parties to share secret keys in an authentic manner based on an easily memorizable password. Recently, Nam et al. showed that a provably secure three-party passwordbased authenticated key exchange protocol using Weil pairing by Wen et al. is vulnerable to a man-in-the-middle attack. In doing so, Nam et al. showed the flaws in the proof ...

2013
Didace Habineza Micky Rakotondrabe Yann Le Gorrec

In the literature, the generalized Bouc-Wen model can track precisely asymmetric hysteresis nonlinearity. In this paper, we propose to extend this generalized model to multivariable hysteresis model that can track the nonlinearities in multi-degrees of freedom (multi-DoF) hysteretic actuated systems. In particular, these systems are typified by strong hysteresis couplings. Then, a method of ide...

2015
Chin-Wei Chang Kai-Chi Chang Ya-Shun Chen Chien-Lin Huang Chia-Ling Ko Jia-Horng Lin Ching-Wen Lou Wen-Cheng Chen

Chin-Wei Chang, Kai-Chi Chang, Ya-Shun Chen, Chien-Lin Huang, Chia-Ling Ko, Jia-Horng Lin, Ching-Wen Lou and Wen-Cheng Chen* Department of Fiber and Composite Materials, College of Engineering, Feng Chia University, Taichung 40724, Taiwan School of Chinese Medicine, China Medical University, Taichung 40402, Taiwan Department of Biotechnology, Asia University, Taichung 41354, Taiwan Institute of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید