INFO-GAP VALUE OF INFORMATION IN MODEL UPDATING

2001 ◽  
Vol 15 (3) ◽  
pp. 457-474 ◽  
Author(s):  
YAKOV BEN-HAIM
2018 ◽  
Vol 51 (7) ◽  
pp. 925-943 ◽  
Author(s):  
Cansın Yüksel ◽  
Corinna Minnecker ◽  
Masoud Soleymani Shishvan ◽  
Jörg Benndorf ◽  
Mike Buxton

2008 ◽  
Author(s):  
W. Matthew Collins ◽  
Keith Rayner

2020 ◽  
Vol 14 (3) ◽  
pp. 7141-7151 ◽  
Author(s):  
R. Omar ◽  
M. N. Abdul Rani ◽  
M. A. Yunus

Efficient and accurate finite element (FE) modelling of bolted joints is essential for increasing confidence in the investigation of structural vibrations. However, modelling of bolted joints for the investigation is often found to be very challenging. This paper proposes an appropriate FE representation of bolted joints for the prediction of the dynamic behaviour of a bolted joint structure. Two different FE models of the bolted joint structure with two different FE element connectors, which are CBEAM and CBUSH, representing the bolted joints are developed. Modal updating is used to correlate the two FE models with the experimental model. The dynamic behaviour of the two FE models is compared with experimental modal analysis to evaluate and determine the most appropriate FE model of the bolted joint structure. The comparison reveals that the CBUSH element connectors based FE model has a greater capability in representing the bolted joints with 86 percent accuracy and greater efficiency in updating the model parameters. The proposed modelling technique will be useful in the modelling of a complex structure with a large number of bolted joints.


Author(s):  
Sergey Valerevich Belov ◽  
Irina Mikhalovna Kosmacheva ◽  
Irina Vyacheslavovna Sibikina

To solve the problem of information security management the method was proposed that allows determining the degree of importance of confidential documents of the organization. The urgency of the proposed algorithm was substantiated taking into account the requirements of the legislation of the Russian Federation in the sphere of information security. The stages prior to the formation of the list of confidential documents of the organization were described. A review of the main documents of the legal and regulatory framework was carried out including documents relating to the state regulation of relations in the sphere of information security. The classes of protected information for the accessing categories were considered. The criteria changes of the value of information in the process of time were represented. The algorithm of formation of the list of confidential documents of the organization based on the properties of information was offered. The algorithm is based on an expert method of pair comparison of alternatives. The result of the use of this method is a number of confidential documents, ranked in descending order of importance. For each document the weighting factor of importance can be calculated. The verification stage of the degree of expert consistency was included in the methodology to eliminate the use of erroneous expert data. The application of the methodology is illustrated by a calculated example.


2016 ◽  
Vol 106 (8) ◽  
pp. 490-497
Author(s):  
Dong-Uk PARK ◽  
Jae-Bong KIM ◽  
Nam-Sik KIM ◽  
Sung-Il KIM

Sign in / Sign up

Export Citation Format

Share Document