ARTÍCULO
TITULO

Methodology for Exact Solution of Catenary

Rajasekaran    
Sundaramoorthy    
Sankarasubramanian    
G.    
Cella    
Paul    

Resumen

No disponible

 Artículos similares

       
 
Llewellyn Morse, Vincenzo Mallardo, Zahra Sharif-Khodaei and Ferri M.H. Aliabadi    
A novel methodology is presented for performing sensitivity analyses of assembled plate structures using the Boundary Element Method (BEM). The main novelty of this work is that the exact implicit derivatives of the BEM formulations for assembled plate s... ver más
Revista: Aerospace

 
María Moncho Santonja, Bàrbara Micó-Vicent, Beatriz Defez, Jorge Jordán and Guillermo Peris-Fajarnes    
The number of infectious spots or pathological structures recorded on dermatological images is a tool to aid in the diagnosis and monitoring of disease progression. Dermatological images for the detection and monitoring of the evolution of acne infection... ver más
Revista: Applied Sciences

 
Dominique Paul Bergmann, Jan Denzel, Ole Pfeifle, Stefan Notter, Walter Fichter and Andreas Strohmayer    
The high-power density and good scaling properties of electric motors enable new propulsion arrangements and aircraft configurations. This results in distributed propulsion systems allowing to make use of aerodynamic interaction effects between individua... ver más
Revista: Aerospace

 
Narisara Khamsing, Kantimarn Chindaprasert, Rapeepan Pitakaso, Worapot Sirirak and Chalermchat Theeraviriya    
This research presents a solution to the family tourism route problem by considering daily time windows. To find the best solution for travel routing, the modified adaptive large neighborhood search (MALNS) method, using the four destructions and the fou... ver más
Revista: Computation

 
Yaser Ali Enaya,Mohammed Jawad Mohammed,Ghassan Abdulhussein Bilal     Pág. pp. 163 - 179
This study introduces a novel authentication methodology; it is based on pattern recognition of fingers size and pressure when users touch smartphone screen. By analyzing diagrams of these touches and applying data mining for the first time as an authent... ver más