Recently, some results have been acquired with the Monte- Carlo statistical experiments in the design of ocean en gineering. The results show that Monte-Carlo statistical experiments can be widely used in estimating t...Recently, some results have been acquired with the Monte- Carlo statistical experiments in the design of ocean en gineering. The results show that Monte-Carlo statistical experiments can be widely used in estimating the parameters of wave statistical distributions, checking the probability model of the long- term wave extreme value distribution under a typhoon condition and calculating the failure probability of the ocean platforms.展开更多
Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological developments.As a result,tens of billions or possibly...Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological developments.As a result,tens of billions or possibly hundreds of billions of devices will be linked together.These smart devices will be able to gather data,process it,and even come to decisions on their own.Security is the most essential thing in these situations.In IoT infrastructure,authenticated key exchange systems are crucial for preserving client and data privacy and guaranteeing the security of data-in-transit(e.g.,via client identification and provision of secure communication).It is still challenging to create secure,authenticated key exchange techniques.The majority of the early authenticated key agreement procedure depended on computationally expensive and resource-intensive pairing,hashing,or modular exponentiation processes.The focus of this paper is to propose an efficient three-party authenticated key exchange procedure(AKEP)using Chebyshev chaotic maps with client anonymity that solves all the problems mentioned above.The proposed three-party AKEP is protected from several attacks.The proposed three-party AKEP can be used in practice for mobile communications and pervasive computing applications,according to statistical experiments and low processing costs.To protect client identification when transferring data over an insecure public network,our three-party AKEP may also offer client anonymity.Finally,the presented procedure offers better security features than the procedures currently available in the literature.展开更多
Achieving Six-Sigma process capability starts with l istening to the Voice of the Customers, and it becomes a reality by combining th e People Power and the Process Power of the organisation. This paper presents a Six...Achieving Six-Sigma process capability starts with l istening to the Voice of the Customers, and it becomes a reality by combining th e People Power and the Process Power of the organisation. This paper presents a Six-Sigma implementation case study carried out in a magnet manufacturing compa ny, which produces bearing magnets to be used in energy meters. If the thickness of the produced bearing magnets is between 2.35 mm and 2.50 mm, they will be ac cepted by the customers. All the time the company could not produce the bearing magnets within the specified thickness range, as their process distribution was flat with 2.20 mm as lower control limit and 2.60 mm as upper control limit. This resulted in a huge loss in the form of non-conformities, loss of time and goodwill. The process capability of the company then was around 0.40. Organisat ion restructuring was carried out to reap the benefit of the People Power of the organisation. Statistically designed experiments (Taguchi Method based Design o f Experiments), Online quality control tools (Statistical Process Control To ols) were effectively used to complete the DMAIC (Define, Measure, Analyse, Impr ove and Control) cycle to reap the benefit of the Process Power of the organisat ion. Presently the company enjoys a process capability of 1.75, a way towards Si x-Sigma Process Capability.展开更多
文摘Recently, some results have been acquired with the Monte- Carlo statistical experiments in the design of ocean en gineering. The results show that Monte-Carlo statistical experiments can be widely used in estimating the parameters of wave statistical distributions, checking the probability model of the long- term wave extreme value distribution under a typhoon condition and calculating the failure probability of the ocean platforms.
文摘Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological developments.As a result,tens of billions or possibly hundreds of billions of devices will be linked together.These smart devices will be able to gather data,process it,and even come to decisions on their own.Security is the most essential thing in these situations.In IoT infrastructure,authenticated key exchange systems are crucial for preserving client and data privacy and guaranteeing the security of data-in-transit(e.g.,via client identification and provision of secure communication).It is still challenging to create secure,authenticated key exchange techniques.The majority of the early authenticated key agreement procedure depended on computationally expensive and resource-intensive pairing,hashing,or modular exponentiation processes.The focus of this paper is to propose an efficient three-party authenticated key exchange procedure(AKEP)using Chebyshev chaotic maps with client anonymity that solves all the problems mentioned above.The proposed three-party AKEP is protected from several attacks.The proposed three-party AKEP can be used in practice for mobile communications and pervasive computing applications,according to statistical experiments and low processing costs.To protect client identification when transferring data over an insecure public network,our three-party AKEP may also offer client anonymity.Finally,the presented procedure offers better security features than the procedures currently available in the literature.
文摘Achieving Six-Sigma process capability starts with l istening to the Voice of the Customers, and it becomes a reality by combining th e People Power and the Process Power of the organisation. This paper presents a Six-Sigma implementation case study carried out in a magnet manufacturing compa ny, which produces bearing magnets to be used in energy meters. If the thickness of the produced bearing magnets is between 2.35 mm and 2.50 mm, they will be ac cepted by the customers. All the time the company could not produce the bearing magnets within the specified thickness range, as their process distribution was flat with 2.20 mm as lower control limit and 2.60 mm as upper control limit. This resulted in a huge loss in the form of non-conformities, loss of time and goodwill. The process capability of the company then was around 0.40. Organisat ion restructuring was carried out to reap the benefit of the People Power of the organisation. Statistically designed experiments (Taguchi Method based Design o f Experiments), Online quality control tools (Statistical Process Control To ols) were effectively used to complete the DMAIC (Define, Measure, Analyse, Impr ove and Control) cycle to reap the benefit of the Process Power of the organisat ion. Presently the company enjoys a process capability of 1.75, a way towards Si x-Sigma Process Capability.