The fatigue behaviour of longitudinal stiffeners of oil tankers and container ships, subjected to dynamic loads, is analysed. The following dynamic load components are considered: hull girder vertical wave bending moment, alone and combined with the horizontal wave bending moment, hydrodynamic pressure and inertial forces caused by cargo acceleration.
The spectral method was selected to calculate the fatigue damage, based on S—N curves and Miner's rule. Following this approach, the fatigue damage may be calculated as a function of a stress parameter Ωp, which represents the cumulative effect of wave induced loads in the unit of time and incorporates the combined effects of stress level and its occurring frequency.
Simple formulas for Ωp of oil tankers and container ships are given, obtained from the results of hydrodynamic analyses performed on several ships, in different wave environments.
Several examples show the applicability of the methods to real ship structures. The method, however, still needs to be calibrated because of the simplifying hypotheses introduced in the loading conditions. 相似文献
In the connected vehicles, connecting interfaces bring threats to the vehicles and they can be hacked to impact the vehicles and drivers. Compared with traditional vehicles, connected vehicles require more information transfer. Sensor signals and critical data must be protected to ensure the cyber security of connected vehicles. The communications among ECUs, sensors, and gateways are connected by in-vehicle networks. This paper discussed the state-of-art techniques about secure communication for in-vehicle networks. First, the related concepts in automotive secure communication have been provided. Then we have compared and contrasted existing approaches for secure communication. We have analyzed the advantages/disadvantages of MAC and digital signatures for message authentication and compared the performance and limitations of different cryptographic algorithms. Firewall and intrusion detection system are introduced to protect the networks. The constraints and features of different intrusion detection approaches are presented. After that, the technical requirements for cryptographic mechanism and intrusion detection policy are concluded. Based on the review of current researches, the future development directions of the automotive network security have been discussed. The purpose of this paper is to review current techniques on automotive secure communication and suggest suitable secure approaches to implement on the in-vehicle networks. 相似文献