Search results
1 – 10 of 124The purpose of this paper is to establish and implement a direct topological reanalysis algorithm for general successive structural modifications, based on the updating matrix…
Abstract
Purpose
The purpose of this paper is to establish and implement a direct topological reanalysis algorithm for general successive structural modifications, based on the updating matrix triangular factorization (UMTF) method for non-topological modification proposed by Song et al. [Computers and Structures, 143(2014):60-72].
Design/methodology/approach
In this method, topological modifications are viewed as a union of symbolic and numerical change of structural matrices. The numerical part is dealt with UMTF by directly updating the matrix triangular factors. For symbolic change, an integral structure which consists of all potential nodes/elements is introduced to avoid side effects on the efficiency during successive modifications. Necessary pre- and post processing are also developed for memory-economic matrix manipulation.
Findings
The new reanalysis algorithm is applicable to successive general structural modifications for arbitrary modification amplitudes and locations. It explicitly updates the factor matrices of the modified structure and thus guarantees the accuracy as full direct analysis while greatly enhancing the efficiency.
Practical implications
Examples including evolutionary structural optimization and sequential construction analysis show the capability and efficiency of the algorithm.
Originality/value
This innovative paper makes direct topological reanalysis be applicable for successive structural modifications in many different areas.
Details
Keywords
Yuqin Wang, Bing Liang, Wen Ji, Shiwei Wang and Yiqiang Chen
In the past few years, millions of people started to acquire knowledge from the Massive Open Online Courses (MOOCs). MOOCs contain massive video courses produced by instructors…
Abstract
Purpose
In the past few years, millions of people started to acquire knowledge from the Massive Open Online Courses (MOOCs). MOOCs contain massive video courses produced by instructors, and learners all over the world can get access to these courses via the internet. However, faced with massive courses, learners often waste much time finding courses they like. This paper aims to explore the problem that how to make accurate personalized recommendations for MOOC users.
Design/methodology/approach
This paper proposes a multi-attribute weight algorithm based on collaborative filtering (CF) to select a recommendation set of courses for target MOOC users.
Findings
The recall of the proposed algorithm in this paper is higher than both the traditional CF and a CF-based algorithm – uncertain neighbors’ collaborative filtering recommendation algorithm. The higher the recall is, the more accurate the recommendation result is.
Originality/value
This paper reflects the target users’ preferences for the first time by calculating separately the weight of the attributes and the weight of attribute values of the courses.
Details
Keywords
Abstract
Details
Keywords
Transaction cost becomes significant when one holds many securities in a large portfolio where capital allocations are frequently rebalanced due to variations in non-stationary…
Abstract
Purpose
Transaction cost becomes significant when one holds many securities in a large portfolio where capital allocations are frequently rebalanced due to variations in non-stationary statistical characteristics of the asset returns. The purpose of this paper is to employ a sparsing method to sparse the eigenportfolios, so that the transaction cost can be reduced and without any loss of its performance.
Design/methodology/approach
In this paper, the authors have designed pdf-optimized mid-tread Lloyd-Max quantizers based on the distribution of each eigenportfolio, and then employed them to sparse the eigenportfolios, so those small size orders may usually be ignored (sparsed), as the result, the trading costs have been reduced.
Findings
The authors find that the sparsing technique addressed in this paper is methodic, easy to implement for large size portfolios and it offers significant reduction in transaction cost without any loss of performance.
Originality/value
In this paper, the authors investigated the performance the sparsed eigenportfolios of stock returns in S&P500 Index. It is shown that the sparsing method is simple to implement and it provides high levels of sparsity without causing PNL loss. Therefore, transaction cost of managing a large size portfolio is reduced by employing such an efficient sparsity method.
Details
Keywords
Marcella De Martino, Alfonso Morvillo and Giuseppe Giordano
This study proposes spatial origin-destination threshold Tobit to address spatial interdependence among bilateral trade flows while accounting for zero trade volumes.
Abstract
Purpose
This study proposes spatial origin-destination threshold Tobit to address spatial interdependence among bilateral trade flows while accounting for zero trade volumes.
Design/methodology/approach
This model is designed to capture multiple forms of spatial autocorrelation embedded in “directional” trade flows. The authors apply this improved model to export flows among 32 Asian countries in 1990.
Findings
The empirical results indicate the presence of all three types of spatial dependence: exporter-based, importer-based and exporter-to-importer-based. After further considering multifaceted spatial correlation in bilateral trade flows, the authors find that the effect of conventional trade variables changes in a noticeable way.
Research limitations/implications
This finding implies that the standard gravity model may produce biased estimates if it does not take spatial dependence into account.
Originality/value
This paper attempts to offer an improved model of the standard gravity model by taking spatial dependence into account.
Details
Keywords
Matthew D. Ferguson, Raymond Hill and Brian Lunday
This study aims to compare linear programming and stable marriage approaches to the personnel assignment problem under conditions of uncertainty. Robust solutions should exhibit…
Abstract
Purpose
This study aims to compare linear programming and stable marriage approaches to the personnel assignment problem under conditions of uncertainty. Robust solutions should exhibit reduced variability of solutions in the presence of one or more additional constraints or problem perturbations added to some baseline problems.
Design/methodology/approach
Several variations of each approach are compared with respect to solution speed, solution quality as measured by officer-to-assignment preferences and solution robustness as measured by the number of assignment changes required after inducing a set of representative perturbations or constraints to an assignment instance. These side constraints represent the realistic assignment categorical priorities and limitations encountered by army assignment managers who solve this problem semiannually, and thus the synthetic instances considered herein emulate typical problem instances.
Findings
The results provide insight regarding the trade-offs between traditional optimization and heuristic-based solution approaches.
Originality/value
The results indicate the viability of using the stable marriage algorithm for talent management via the talent marketplace currently used by both the U.S. Army and U.S. Air Force for personnel assignments.
Details
Keywords
Jonas Bundschuh, M. Greta Ruppert and Yvonne Späck-Leigsnering
The purpose of this paper is to present the freely available finite element simulation software Pyrit.
Abstract
Purpose
The purpose of this paper is to present the freely available finite element simulation software Pyrit.
Design/methodology/approach
In a first step, the design principles and the objective of the software project are defined. Then, the software’s structure is established: The software is organized in packages for which an overview is given. The structure is based on the typical steps of a simulation workflow, i.e., problem definition, problem-solving and post-processing. State-of-the-art software engineering principles are applied to ensure a high code quality at all times. Finally, the modeling and simulation workflow of Pyrit is demonstrated by three examples.
Findings
Pyrit is a field simulation software based on the finite element method written in Python to solve coupled systems of partial differential equations. It is designed as a modular software that is easily modifiable and extendable. The framework can, therefore, be adapted to various activities, i.e., research, education and industry collaboration.
Research limitations/implications
The focus of Pyrit are static and quasistatic electromagnetic problems as well as (coupled) heat conduction problems. It allows for both time domain and frequency domain simulations.
Originality/value
In research, problem-specific modifications and direct access to the source code of simulation tools are essential. With Pyrit, the authors present a computationally efficient and platform-independent simulation software for various electromagnetic and thermal field problems.
Details
Keywords
Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng
Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore…
Abstract
Purpose
Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore, there are numerous access control models and even more have recently evolved to conform with the challenging requirements of resource protection. That makes it hard to classify the models and decide for an appropriate one satisfying security needs. Therefore, this study aims to guide through the plenty of access control models in the current state of the art besides this opaque accumulation of terms meaning and how they are related.
Design/methodology/approach
This study follows the systematic literature review approach to investigate current research regarding access control models and illustrate the findings of the conducted review. To provide a detailed understanding of the topic, this study identified the need for an additional study on the terms related to the domain of authorization and access control.
Findings
The authors’ research results in this paper are the distinction between authorization and access control with respect to definition, strategies, and models in addition to the classification schema. This study provides a comprehensive overview of existing models and an analysis according to the proposed five classes of access control models.
Originality/value
Based on the authors’ definitions of authorization and access control along with their related terms, i.e. authorization strategy, model and policy as well as access control model and mechanism, this study gives an overview of authorization strategies and propose a classification of access control models providing examples for each category. In contrast to other comparative studies, this study discusses more access control models, including the conventional state-of-the-art models and novel ones. This study also summarizes each of the literature works after selecting the relevant ones focusing on the database system domain or providing a survey, a classification or evaluation criteria of access control models. Additionally, the introduced categories of models are analyzed with respect to various criteria that are partly selected from the standard access control system evaluation metrics by the National Institute of Standards and Technology.
Details
Keywords
Liliana Rybarska-Rusinek, Ewa Rejwer and Alexander Linkov
At present numerical simulation of seismicity, used in mining and hydraulic fracturing practice, is quite time expensive what hampers its combined employing with observed…
Abstract
Purpose
At present numerical simulation of seismicity, used in mining and hydraulic fracturing practice, is quite time expensive what hampers its combined employing with observed seismicity in real time. The purpose of this paper is to suggest a mean for drastic speeding up numerical modeling seismic and aseismic events.
Design/methodology/approach
The authors propose the means to radically decrease the time expense for the bottleneck stage of simulation: calculations of stresses, induced by a large group of already activated flaws (sources of events), at locations of flaws of another large group, which may be activated by the stresses. This is achieved by building a hierarchical tree and properly accounting for the sizes of activated flaws, excluding check of their influence on flaws, which are beyond strictly defined near-regions of strong interaction.
Findings
Comparative simulations of seismicity by conventional and improved methods demonstrate high efficiency of the means developed. When applied to practical mining and hydrofracturing problems, it requires some two orders less time to obtain practically the same output results as those of conventional methods.
Originality/value
The proposed improvement provides a means for simulation of seismicity in real time of mining steps and hydrofracture propagation. It can be also used in other applications involving seismic and aseismic events and acoustic emission.
Details