Experimental validation of two MIQ scales
In: Journal of vocational behavior, Band 9, Heft 2, S. 161-167
ISSN: 1095-9084
909 Ergebnisse
Sortierung:
In: Journal of vocational behavior, Band 9, Heft 2, S. 161-167
ISSN: 1095-9084
In: International Journal of Advanced Research in Engineering and Technology, Band (2), Heft 2019
SSRN
This is the author accepted manuscript. The final version is available from Elsevier via the DOI in this record ; This paper presents a novel bridge condition assessment methodology using direct rotation measurements. Initially, numerical analyses are carried out to develop the theoretical basis of the proposed bridge damage detection methodology. As a result of this study the difference in rotation influence lines obtained for healthy and damaged bridge states is proposed as a damage indicator. The sensitivity of rotation to damage and the effect of sensor locations on sensor sensitivities are investigated. Subsequently, extensive laboratory experiments are conducted on a 5.4 m long simply supported bridge structure in an effort to validate the results from the numerical analyses. The test structure is instrumented with rotation sensors and axle detectors and loaded with a four-axle moving vehicle. In this study, rotations are measured using high grade uniaxial accelerometers. The procedure of measuring rotations using accelerometers is explained within the scope of this study. To test the robustness of the proposed bridge condition assessment methodology, a wide range of single and multiple damage scenarios is investigated and the results from this study show that the proposed methodology can successfully identify damage on a bridge. For the model considered, damage as low as 7% change in stiffness over an extent of 2.5% bridge span is shown to be detectable. ; European Union Horizon 2020
BASE
In: Materials and design, Band 157, S. 377-393
ISSN: 1873-4197
In: Environmental and resource economics, Band 27, Heft 3, S. 313-335
ISSN: 1573-1502
The advent of mass communication has led to the ubiquitous presence of information. Secure treatment of these data has become a main concern not only for governments but also for companies and individuals. In this context, cryptography studies the mathematical techniques related to the security of information. In this thesis, we mainly focus on the way data confidentiality can be reached through the use of encryption algorithms such as block ciphers. Encryption refers to the process of transforming some piece of information, using an algorithm, to make it «unreadable» to anyone except those possessing the secret key. The goal of cryptanalysis is to scrutinize encryption algorithms in order to detect possible weaknesses. This thesis investigates one major class of statistical attacks against block ciphers, denoted as linear cryptanalysis, and some of its extensions. Our contribution is threefold: In the first part of the thesis, we present two tools developed to facilitate the application of linear cryptanalysis and other techniques. The first tool is a heuristic algorithm for generating good linear approximations for block ciphers. The second tool allows to decrease the time complexity of linear cryptanalysis. In the second part, we investigate the cryptanalysis of PRESENT, a 64-bit block cipher designed for constrained environments. We introduce a dedicated attack denoted Statistical Saturation Attack and provide an analysis of its expected complexity. Finally, we apply the tools developed in the first part to different versions of a small block cipher. On the basis of those practical experiments, we assess various fundamental assumptions commonly used in linear cryptanalysis and its extensions. This last part opens new research directions for the design and analysis of block ciphers. ; (FSA 3) -- UCL, 2011
BASE
The advent of mass communication has led to the ubiquitous presence of information. Secure treatment of these data has become a main concern not only for governments but also for companies and individuals. In this context, cryptography studies the mathematical techniques related to the security of information. In this thesis, we mainly focus on the way data confidentiality can be reached through the use of encryption algorithms such as block ciphers. Encryption refers to the process of transforming some piece of information, using an algorithm, to make it «unreadable» to anyone except those possessing the secret key. The goal of cryptanalysis is to scrutinize encryption algorithms in order to detect possible weaknesses. This thesis investigates one major class of statistical attacks against block ciphers, denoted as linear cryptanalysis, and some of its extensions. Our contribution is threefold: In the first part of the thesis, we present two tools developed to facilitate the application of linear cryptanalysis and other techniques. The first tool is a heuristic algorithm for generating good linear approximations for block ciphers. The second tool allows to decrease the time complexity of linear cryptanalysis. In the second part, we investigate the cryptanalysis of PRESENT, a 64-bit block cipher designed for constrained environments. We introduce a dedicated attack denoted Statistical Saturation Attack and provide an analysis of its expected complexity. Finally, we apply the tools developed in the first part to different versions of a small block cipher. On the basis of those practical experiments, we assess various fundamental assumptions commonly used in linear cryptanalysis and its extensions. This last part opens new research directions for the design and analysis of block ciphers. ; (FSA 3) -- UCL, 2011
BASE
In: Environmental science and pollution research: ESPR, Band 27, Heft 26, S. 32283-32295
ISSN: 1614-7499
SSRN
In: M. Nishikawara, H. Nagano, and T. Kaya, "Transient Thermo-Fluid Modeling of Loop Heat Pipes and Experimental Validation", Journal of Thermophysics and Heat Transfer, Vol. 27, No. 4, pp. 641-647, 2013.
SSRN
In: Progress in nuclear energy: the international review journal covering all aspects of nuclear energy, Band 108, S. 71-80
ISSN: 0149-1970
In: Materials and design, Band 229, S. 111844
ISSN: 1873-4197
In: Materials & Design (1980-2015), Band 31, Heft 5, S. 2546-2552
In: CERGE-EI Working Paper Series No. 653, 2020
SSRN
Working paper
In: IZA Discussion Paper No. 12450
SSRN