Search results

1 – 3 of 3
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 14 September 2018

De-Cheng Feng, Cheng-Dong Yang and Xiao-Dan Ren

This paper aims to present a multi-scale stochastic damage model (SDM) for concrete and apply it to the stochastic response analysis of reinforced concrete shear wall structures.

262

Abstract

Purpose

This paper aims to present a multi-scale stochastic damage model (SDM) for concrete and apply it to the stochastic response analysis of reinforced concrete shear wall structures.

Design/methodology/approach

The proposed SDM is constructed at two scales, i.e. the macro-scale and the micro-scale. The general framework of the SDM is established on the basis of the continuum damage mechanics (CDM) at the macro-scale, whereas the detailed damage evolution is determined through a parallel fiber buddle model at the micro-scale. The parallel buddle model is made up of micro-elements with stochastic fracture strains, and a one-dimensional random field is assumed for the fracture strain distribution. To represent the random field, a random functional method is adopted to quantify the stochastic damage evolution process with only two variables; thus, the numerical efficiency is greatly enhanced. Meanwhile, the probability density evolution method (PDEM) is introduced for the structural stochastic response analysis.

Findings

By combing the SDM and PDEM, the probabilistic analysis of a shear wall structure is performed. The mean value, standard deviation and the probability density function of the shear wall responses, e.g., shear capacity, accumulated energy consumption and damage evolution, are obtained.

Originality/value

It is noted that the proposed method can reflect the influences of randomness from material level to structural level, and is efficient for stochastic response determination of shear wall structures.

Details

Engineering Computations, vol. 35 no. 6
Type: Research Article
ISSN: 0264-4401

Keywords

Available. Open Access. Open Access
Article
Publication date: 10 September 2024

Wei Wei

This research addressed online customer-to-customer (C2C) incivility during digital service recovery.

293

Abstract

Purpose

This research addressed online customer-to-customer (C2C) incivility during digital service recovery.

Design/methodology/approach

To examine the effectiveness of managerial responses to online C2C incivility post a restaurant service failure, a 2 (Managerial response: general vs specific) x 2 (Failure severity: high vs low) quasi-experimental design was employed. A pretest was conducted with 123 restaurant consumers via Amazon Mechanical Turk, followed by a main study with 174 restaurant consumers. Taking a mixed-method approach, this research first asked open-ended questions to explore how participants perceived the restaurant’s motivation for providing a generic versus a specific response. Hayes’ (2013) PROCESS procedure was then performed for hypotheses testing.

Findings

The results revealed significant interaction effects of managerial responses and failure severity on perceived online service climate and revisit intention, mediated by trust with managerial responses.

Originality/value

This research yielded unique insight into C2C incivility management literature and industry practices in the context of digital customer service recovery.

Details

International Hospitality Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2516-8142

Keywords

Access Restricted. View access options
Article
Publication date: 23 July 2019

Mohammed Saïd Salah, Maizate Abderrahim, Ouzzif Mohamed and Toumi Mohamed

This paper aims to provide an acceptable level of security while taking into account limited capabilities of the sensors. This paper proposes a mobile approach to securing data…

58

Abstract

Purpose

This paper aims to provide an acceptable level of security while taking into account limited capabilities of the sensors. This paper proposes a mobile approach to securing data exchanged by structured nodes in a cluster.

Design/methodology/approach

The approach is based on mobile nodes with significant calculation and energy resources that allow cryptographic key management and periodic rekeying. However, mobility in wireless sensor networks aims to increase the security and lifetime of the entire network. The technical methods used in this paper are based on cryptography elliptic curves and key management through a balanced binary tree.

Findings

To maintain the effectiveness of critical applications based on wireless sensor networks, a good level of nodes security must be ensured, taking into account their limited energy and computing. Collaboration between powerful mobile nodes provides better coverage and a good key management. Owing to the significant capabilities of the mobile nodes, they can be used to secure critical applications at the same time if needed in applications requiring difficult operations.

Originality/value

To compare the performance of the proposed approach with other mobile algorithms, the following metrics are focused on: the energy consumed by normal sensors and cluster heads, the number of packets exchanged during key installation, time to generate and distribute cryptographic keys and the memory used by the different sensors to store keys.

Details

International Journal of Pervasive Computing and Communications, vol. 15 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 3 of 3
Per page
102050