Advanced Materials Research
Vol. 897
Vol. 897
Advanced Materials Research
Vol. 896
Vol. 896
Advanced Materials Research
Vol. 895
Vol. 895
Advanced Materials Research
Vol. 894
Vol. 894
Advanced Materials Research
Vol. 893
Vol. 893
Advanced Materials Research
Vols. 891-892
Vols. 891-892
Advanced Materials Research
Vols. 889-890
Vols. 889-890
Advanced Materials Research
Vols. 887-888
Vols. 887-888
Advanced Materials Research
Vol. 886
Vol. 886
Advanced Materials Research
Vols. 884-885
Vols. 884-885
Advanced Materials Research
Vols. 881-883
Vols. 881-883
Advanced Materials Research
Vol. 880
Vol. 880
Advanced Materials Research
Vol. 879
Vol. 879
Advanced Materials Research Vols. 889-890
Paper Title Page
Abstract: Steam power cycle occupies very important position in thermal power plant. Steam power cycle for thermal power professional and engaged in the related personnel of thermal power generation is very important. In this paper expatiation is made on using the contrasting method to teach the content of the steam power cycle, which broke the traditional step-by-step sequence teaching method. Using this method, which has been proved by practice, has attained comparatively good effect.
1721
Abstract: In order to promote combination on work and study, according to teaching requirements on "coke production technology", the teachers with teaching team at coal and chemical led the students with first class on teaching reforming on coal and chemical to carry on designing and making with coke oven model. Model making was a proven design method and integrated design process with profound meaning [. Model making practices was devoted into the teaching process, greatly stimulated the students enthusiasm, cultivated the career ability, social skills and methodical competence on students.Teaching effect is obvious [ .
1725
Abstract: Using the matrix compression algorithm in the network education platform for the user information security certification is a good way. The sensitive user information is transfer in an open channel and it can be authentication for using the matrix compression/decompression, matrix decomposition/reduction algorithm. The client conduct random capture and compression by the user information been divided into a number of rectangular block size, corresponding to generate a key and cipher text. The server take out the corresponding data from the data queue of receiving and to extract In accordance with the key rules, then to reduce of information in corresponding positions. Thus the user identity information can be authenticity and integrity verification.
1730