Search results

1 – 10 of 124
Open Access
Article
Publication date: 29 July 2019

Ren Yang, Qi Song and Pu Chen

The purpose of this paper is to establish and implement a direct topological reanalysis algorithm for general successive structural modifications, based on the updating matrix…

Abstract

Purpose

The purpose of this paper is to establish and implement a direct topological reanalysis algorithm for general successive structural modifications, based on the updating matrix triangular factorization (UMTF) method for non-topological modification proposed by Song et al. [Computers and Structures, 143(2014):60-72].

Design/methodology/approach

In this method, topological modifications are viewed as a union of symbolic and numerical change of structural matrices. The numerical part is dealt with UMTF by directly updating the matrix triangular factors. For symbolic change, an integral structure which consists of all potential nodes/elements is introduced to avoid side effects on the efficiency during successive modifications. Necessary pre- and post processing are also developed for memory-economic matrix manipulation.

Findings

The new reanalysis algorithm is applicable to successive general structural modifications for arbitrary modification amplitudes and locations. It explicitly updates the factor matrices of the modified structure and thus guarantees the accuracy as full direct analysis while greatly enhancing the efficiency.

Practical implications

Examples including evolutionary structural optimization and sequential construction analysis show the capability and efficiency of the algorithm.

Originality/value

This innovative paper makes direct topological reanalysis be applicable for successive structural modifications in many different areas.

Details

Engineering Computations, vol. 36 no. 8
Type: Research Article
ISSN: 0264-4401

Keywords

Open Access
Article
Publication date: 4 September 2017

Yuqin Wang, Bing Liang, Wen Ji, Shiwei Wang and Yiqiang Chen

In the past few years, millions of people started to acquire knowledge from the Massive Open Online Courses (MOOCs). MOOCs contain massive video courses produced by instructors…

2436

Abstract

Purpose

In the past few years, millions of people started to acquire knowledge from the Massive Open Online Courses (MOOCs). MOOCs contain massive video courses produced by instructors, and learners all over the world can get access to these courses via the internet. However, faced with massive courses, learners often waste much time finding courses they like. This paper aims to explore the problem that how to make accurate personalized recommendations for MOOC users.

Design/methodology/approach

This paper proposes a multi-attribute weight algorithm based on collaborative filtering (CF) to select a recommendation set of courses for target MOOC users.

Findings

The recall of the proposed algorithm in this paper is higher than both the traditional CF and a CF-based algorithm – uncertain neighbors’ collaborative filtering recommendation algorithm. The higher the recall is, the more accurate the recommendation result is.

Originality/value

This paper reflects the target users’ preferences for the first time by calculating separately the weight of the attributes and the weight of attribute values of the courses.

Details

International Journal of Crowd Science, vol. 1 no. 3
Type: Research Article
ISSN: 2398-7294

Keywords

Content available
Article
Publication date: 1 February 1999

Johann Sienz

247

Abstract

Details

Engineering Computations, vol. 16 no. 1
Type: Research Article
ISSN: 0264-4401

Keywords

Open Access
Article
Publication date: 25 June 2019

Anqi Xiong and Ali N. Akansu

Transaction cost becomes significant when one holds many securities in a large portfolio where capital allocations are frequently rebalanced due to variations in non-stationary…

Abstract

Purpose

Transaction cost becomes significant when one holds many securities in a large portfolio where capital allocations are frequently rebalanced due to variations in non-stationary statistical characteristics of the asset returns. The purpose of this paper is to employ a sparsing method to sparse the eigenportfolios, so that the transaction cost can be reduced and without any loss of its performance.

Design/methodology/approach

In this paper, the authors have designed pdf-optimized mid-tread Lloyd-Max quantizers based on the distribution of each eigenportfolio, and then employed them to sparse the eigenportfolios, so those small size orders may usually be ignored (sparsed), as the result, the trading costs have been reduced.

Findings

The authors find that the sparsing technique addressed in this paper is methodic, easy to implement for large size portfolios and it offers significant reduction in transaction cost without any loss of performance.

Originality/value

In this paper, the authors investigated the performance the sparsed eigenportfolios of stock returns in S&P500 Index. It is shown that the sparsing method is simple to implement and it provides high levels of sparsity without causing PNL loss. Therefore, transaction cost of managing a large size portfolio is reduced by employing such an efficient sparsity method.

Content available

Abstract

Details

International Journal of Contemporary Hospitality Management, vol. 36 no. 2
Type: Research Article
ISSN: 0959-6119

Open Access
Article
Publication date: 11 July 2022

Shali Luo and Seung-Whan Choi

This study proposes spatial origin-destination threshold Tobit to address spatial interdependence among bilateral trade flows while accounting for zero trade volumes.

Abstract

Purpose

This study proposes spatial origin-destination threshold Tobit to address spatial interdependence among bilateral trade flows while accounting for zero trade volumes.

Design/methodology/approach

This model is designed to capture multiple forms of spatial autocorrelation embedded in “directional” trade flows. The authors apply this improved model to export flows among 32 Asian countries in 1990.

Findings

The empirical results indicate the presence of all three types of spatial dependence: exporter-based, importer-based and exporter-to-importer-based. After further considering multifaceted spatial correlation in bilateral trade flows, the authors find that the effect of conventional trade variables changes in a noticeable way.

Research limitations/implications

This finding implies that the standard gravity model may produce biased estimates if it does not take spatial dependence into account.

Originality/value

This paper attempts to offer an improved model of the standard gravity model by taking spatial dependence into account.

Details

International Trade, Politics and Development, vol. 6 no. 2
Type: Research Article
ISSN: 2586-3932

Keywords

Content available
Article
Publication date: 14 May 2020

Matthew D. Ferguson, Raymond Hill and Brian Lunday

This study aims to compare linear programming and stable marriage approaches to the personnel assignment problem under conditions of uncertainty. Robust solutions should exhibit…

Abstract

Purpose

This study aims to compare linear programming and stable marriage approaches to the personnel assignment problem under conditions of uncertainty. Robust solutions should exhibit reduced variability of solutions in the presence of one or more additional constraints or problem perturbations added to some baseline problems.

Design/methodology/approach

Several variations of each approach are compared with respect to solution speed, solution quality as measured by officer-to-assignment preferences and solution robustness as measured by the number of assignment changes required after inducing a set of representative perturbations or constraints to an assignment instance. These side constraints represent the realistic assignment categorical priorities and limitations encountered by army assignment managers who solve this problem semiannually, and thus the synthetic instances considered herein emulate typical problem instances.

Findings

The results provide insight regarding the trade-offs between traditional optimization and heuristic-based solution approaches.

Originality/value

The results indicate the viability of using the stable marriage algorithm for talent management via the talent marketplace currently used by both the U.S. Army and U.S. Air Force for personnel assignments.

Details

Journal of Defense Analytics and Logistics, vol. 4 no. 1
Type: Research Article
ISSN: 2399-6439

Keywords

Open Access
Article
Publication date: 28 September 2023

Jonas Bundschuh, M. Greta Ruppert and Yvonne Späck-Leigsnering

The purpose of this paper is to present the freely available finite element simulation software Pyrit.

Abstract

Purpose

The purpose of this paper is to present the freely available finite element simulation software Pyrit.

Design/methodology/approach

In a first step, the design principles and the objective of the software project are defined. Then, the software’s structure is established: The software is organized in packages for which an overview is given. The structure is based on the typical steps of a simulation workflow, i.e., problem definition, problem-solving and post-processing. State-of-the-art software engineering principles are applied to ensure a high code quality at all times. Finally, the modeling and simulation workflow of Pyrit is demonstrated by three examples.

Findings

Pyrit is a field simulation software based on the finite element method written in Python to solve coupled systems of partial differential equations. It is designed as a modular software that is easily modifiable and extendable. The framework can, therefore, be adapted to various activities, i.e., research, education and industry collaboration.

Research limitations/implications

The focus of Pyrit are static and quasistatic electromagnetic problems as well as (coupled) heat conduction problems. It allows for both time domain and frequency domain simulations.

Originality/value

In research, problem-specific modifications and direct access to the source code of simulation tools are essential. With Pyrit, the authors present a computationally efficient and platform-independent simulation software for various electromagnetic and thermal field problems.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering , vol. 42 no. 5
Type: Research Article
ISSN: 0332-1649

Keywords

Open Access
Article
Publication date: 15 August 2022

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore…

7048

Abstract

Purpose

Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore, there are numerous access control models and even more have recently evolved to conform with the challenging requirements of resource protection. That makes it hard to classify the models and decide for an appropriate one satisfying security needs. Therefore, this study aims to guide through the plenty of access control models in the current state of the art besides this opaque accumulation of terms meaning and how they are related.

Design/methodology/approach

This study follows the systematic literature review approach to investigate current research regarding access control models and illustrate the findings of the conducted review. To provide a detailed understanding of the topic, this study identified the need for an additional study on the terms related to the domain of authorization and access control.

Findings

The authors’ research results in this paper are the distinction between authorization and access control with respect to definition, strategies, and models in addition to the classification schema. This study provides a comprehensive overview of existing models and an analysis according to the proposed five classes of access control models.

Originality/value

Based on the authors’ definitions of authorization and access control along with their related terms, i.e. authorization strategy, model and policy as well as access control model and mechanism, this study gives an overview of authorization strategies and propose a classification of access control models providing examples for each category. In contrast to other comparative studies, this study discusses more access control models, including the conventional state-of-the-art models and novel ones. This study also summarizes each of the literature works after selecting the relevant ones focusing on the database system domain or providing a survey, a classification or evaluation criteria of access control models. Additionally, the introduced categories of models are analyzed with respect to various criteria that are partly selected from the standard access control system evaluation metrics by the National Institute of Standards and Technology.

Details

International Journal of Web Information Systems, vol. 18 no. 2/3
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 8 August 2018

Liliana Rybarska-Rusinek, Ewa Rejwer and Alexander Linkov

At present numerical simulation of seismicity, used in mining and hydraulic fracturing practice, is quite time expensive what hampers its combined employing with observed…

Abstract

Purpose

At present numerical simulation of seismicity, used in mining and hydraulic fracturing practice, is quite time expensive what hampers its combined employing with observed seismicity in real time. The purpose of this paper is to suggest a mean for drastic speeding up numerical modeling seismic and aseismic events.

Design/methodology/approach

The authors propose the means to radically decrease the time expense for the bottleneck stage of simulation: calculations of stresses, induced by a large group of already activated flaws (sources of events), at locations of flaws of another large group, which may be activated by the stresses. This is achieved by building a hierarchical tree and properly accounting for the sizes of activated flaws, excluding check of their influence on flaws, which are beyond strictly defined near-regions of strong interaction.

Findings

Comparative simulations of seismicity by conventional and improved methods demonstrate high efficiency of the means developed. When applied to practical mining and hydrofracturing problems, it requires some two orders less time to obtain practically the same output results as those of conventional methods.

Originality/value

The proposed improvement provides a means for simulation of seismicity in real time of mining steps and hydrofracture propagation. It can be also used in other applications involving seismic and aseismic events and acoustic emission.

Details

Engineering Computations, vol. 35 no. 5
Type: Research Article
ISSN: 0264-4401

Keywords

Access

Only content I have access to

Year

Content type

Article (124)
1 – 10 of 124