Sort by:
Publication Type:
Open access:
Publication Date:
Periodicals:
Search results
Online since: September 2011
Authors: Li Mei Wang, Jun Liang
Concrete durability, and water and other harmful liquids, gases, the number of its internal flow, scope, and therefore high impermeability of concrete, the durability is like.
At present, concrete waterproofing agent to improve the main principle of impermeability of concrete by increasing the density of concrete, reduce the number of unwanted holes, shrinkage compensation mechanism such as waterproof.
Therefore, by comparison research in rational use of concrete superplasticizer, while adding Mixed materials can greatly increase the impermeability of concrete, while improving the performance of concrete. 2.1 Mechanism Analysis of fly ash Fly ash contains more than 70% of glass beads, full grain shape, smooth, dense texture.
Because of its chemical composition contains a large number of active SiO2 and Al2O3, in a wet environment with Ca (OH) 2 and other alkaline substances in a chemical reaction to produce calcium silicate hydrate, hydrated calcium aluminate and other cementitious substances, powder ash products and enhance the role and can play a concrete block of concrete in the capillary tissue, improve corrosion resistance of concrete.
Reduce the number of the big holes, increasing the number of holes, the average pore size decreased, the distribution more reasonable.
At present, concrete waterproofing agent to improve the main principle of impermeability of concrete by increasing the density of concrete, reduce the number of unwanted holes, shrinkage compensation mechanism such as waterproof.
Therefore, by comparison research in rational use of concrete superplasticizer, while adding Mixed materials can greatly increase the impermeability of concrete, while improving the performance of concrete. 2.1 Mechanism Analysis of fly ash Fly ash contains more than 70% of glass beads, full grain shape, smooth, dense texture.
Because of its chemical composition contains a large number of active SiO2 and Al2O3, in a wet environment with Ca (OH) 2 and other alkaline substances in a chemical reaction to produce calcium silicate hydrate, hydrated calcium aluminate and other cementitious substances, powder ash products and enhance the role and can play a concrete block of concrete in the capillary tissue, improve corrosion resistance of concrete.
Reduce the number of the big holes, increasing the number of holes, the average pore size decreased, the distribution more reasonable.
Online since: November 2010
Authors: Jian Song
Qiu Daoyin uses BP neural network technology to distinguish pests in stored grains with a recognition rate of 100% [7].
In the design of BP neural network, the number of hidden nodes has significant influence on the network performance.
Furthermore, there has not yet been definite theoretical direction for choosing hidden nodes number.
(3) Where: is respectively input nodes number.
is respectively output nodes number.
In the design of BP neural network, the number of hidden nodes has significant influence on the network performance.
Furthermore, there has not yet been definite theoretical direction for choosing hidden nodes number.
(3) Where: is respectively input nodes number.
is respectively output nodes number.
Online since: March 2008
Authors: Mithun Kuruvilla, T.S. Srivatsan, Lisa Park
The alloys of titanium are few in number but have been categorized as being both a viable
and attractive choice for corrosion-resistance and performance-critical applications.
The grains of the alpha phase (light in color) were well distributed through the matrix of the transformed beta phase (dark in color).
The large volume fraction of the alpha grains was predominantly nonuniform in both size and shape.
The cyclic fatigue test is the most widely used technique to establish the endurance limit of a metal by essentially determining the variation of maximum stress or stress amplitude with fatigue life quantified by the number of cycles to failure (Nf).
The alloy in the annealed condition has an alpha plus beta microstructure with the alpha grains of varying size and shape being well distributed through the transformed beta matrix. 2.
The grains of the alpha phase (light in color) were well distributed through the matrix of the transformed beta phase (dark in color).
The large volume fraction of the alpha grains was predominantly nonuniform in both size and shape.
The cyclic fatigue test is the most widely used technique to establish the endurance limit of a metal by essentially determining the variation of maximum stress or stress amplitude with fatigue life quantified by the number of cycles to failure (Nf).
The alloy in the annealed condition has an alpha plus beta microstructure with the alpha grains of varying size and shape being well distributed through the transformed beta matrix. 2.
Online since: April 2005
Authors: Yoshitaka Umeno, Takayuki Kitamura, Akihiro Kushima
Because most studies on the strength in
terms of atomic mechanics have focused on the factor (1) (materials), analysis has mainly been
conducted on simple crystal consisting of perfect lattices (e.g. fcc and bcc) under simple loading
conditions (e.g. tension), though some have explored the properties of bulk materials with defects
(e.g. vacancy and grain boundary).
On the other hand, investigation of the strength of bulk materials and macroscopic structures has long history (e.g. [4]), and the number of related articles published runs into astronomical numbers.
In the same framework, we could discuss the ideal strength of grain boundaries and interfaces with periodicity, even though they are not nano-components.
On the other hand, investigation of the strength of bulk materials and macroscopic structures has long history (e.g. [4]), and the number of related articles published runs into astronomical numbers.
In the same framework, we could discuss the ideal strength of grain boundaries and interfaces with periodicity, even though they are not nano-components.
Online since: September 2013
Authors: Quan Guo, Yue Li Dong, Bin Sun
Pcurrent={P1, P2 … Pnum}, PcurrentP and num≤n, represents the number of nodes used in the current task scheduling.
Number of chosen applications: 4.
Utilization ratio of resources: r1—75%, r2—67%, r3—67%, r4—100% 2) when all neural cells have the same priority k0, the result is {2,4,5,7,8} Number of chosen applications: 5.
Lewis, “Grain Size Determination for Parallel Processing,” IEEE Software,pp. 23-32, Jan. 2005
Gerasoulis, “DSC: Scheduling Parallel Tasks on an Unbounded Number of Processors,” IEEE Trans.
Number of chosen applications: 4.
Utilization ratio of resources: r1—75%, r2—67%, r3—67%, r4—100% 2) when all neural cells have the same priority k0, the result is {2,4,5,7,8} Number of chosen applications: 5.
Lewis, “Grain Size Determination for Parallel Processing,” IEEE Software,pp. 23-32, Jan. 2005
Gerasoulis, “DSC: Scheduling Parallel Tasks on an Unbounded Number of Processors,” IEEE Trans.
Online since: February 2011
Authors: Ai Lan Wan, Weidong Yu
All the fiber samples were cleaned by Soxhlet extraction with acetone and grain alcohol for 4h, air-dried and then rinsed thoroughly in distilled water to remove reagents, inorganic and proteinaceous materials.
Table 3 Average number of hairs (hairs/m) in different length groups Treatment 1mm 2mm 3mm 4mm 5mm 6mm 7mm 8mm 9mm Untreated 73.71 22.84 10.64 4.42 2.49 1.14 0.78 0.29 0.29 Basolan 81.25 24.55 12.03 5.21 2.75 1.50 1.04 0.48 0.37 Kroy-resin 81.76 27.15 14.01 6.58 3.86 2.19 1.55 0.85 0.76 S3 (hairs/m, number of hairs registered with a length equal to or longer than 3 mm) and Tp(hairs/m, the total number of hairs registered (adding the frequencies of the hairs of different length classes) of spun yarns [4] of control, treated with Basolan®88 and Kroy-resin are shown as Fig. 2.
The numbers of pills of sample treated with Kroy-resin were least in Fig. 3 (c), which probably due to the DFE of wool fiber sample treated with Kroy-resin making it difficult for fiber to move and withdraw in or from yarn and fabric.
The DFE of wool fiber treated with Kroy-resin and the number of hairs (S3) of resulting spun yarn was greatest.
The improved pilling performance observed with the Basolan® 88 and Kroy-resin treatment suggested that the number of hairs was not the only important hairiness aspect that impacted on fabric pilling.
Table 3 Average number of hairs (hairs/m) in different length groups Treatment 1mm 2mm 3mm 4mm 5mm 6mm 7mm 8mm 9mm Untreated 73.71 22.84 10.64 4.42 2.49 1.14 0.78 0.29 0.29 Basolan 81.25 24.55 12.03 5.21 2.75 1.50 1.04 0.48 0.37 Kroy-resin 81.76 27.15 14.01 6.58 3.86 2.19 1.55 0.85 0.76 S3 (hairs/m, number of hairs registered with a length equal to or longer than 3 mm) and Tp(hairs/m, the total number of hairs registered (adding the frequencies of the hairs of different length classes) of spun yarns [4] of control, treated with Basolan®88 and Kroy-resin are shown as Fig. 2.
The numbers of pills of sample treated with Kroy-resin were least in Fig. 3 (c), which probably due to the DFE of wool fiber sample treated with Kroy-resin making it difficult for fiber to move and withdraw in or from yarn and fabric.
The DFE of wool fiber treated with Kroy-resin and the number of hairs (S3) of resulting spun yarn was greatest.
The improved pilling performance observed with the Basolan® 88 and Kroy-resin treatment suggested that the number of hairs was not the only important hairiness aspect that impacted on fabric pilling.
Online since: March 2014
Authors: Yang Ping Li, Shao Fen Zhong, Xiao Heng Pan, Hua Qiang Yuan
For
instance, high performance computing centers may measure work in terms of the number of proteins
folded, genomes calculated, or weather models iterated.
Web-search data centers might measure the number of queries served or the number of pages indexed.
However, indexing data at scale presents a number of storage, computational, and energy challenges [6].
Several classes of queries on exascale scientific datasets would thus be more effective if the query engines were tailored around coarse-grained and storage light-weight indexes, e.g., operating by building indexes on the metadata generated by the compression methodology, instead of the actual data.
Fortunately, the execution of many data mining algorithms is dominated by a small number of kernels [3].
Web-search data centers might measure the number of queries served or the number of pages indexed.
However, indexing data at scale presents a number of storage, computational, and energy challenges [6].
Several classes of queries on exascale scientific datasets would thus be more effective if the query engines were tailored around coarse-grained and storage light-weight indexes, e.g., operating by building indexes on the metadata generated by the compression methodology, instead of the actual data.
Fortunately, the execution of many data mining algorithms is dominated by a small number of kernels [3].
Online since: July 2020
Authors: Tomasz Tański, Maciej Wiśniowski, Przemysław Snopiński
Improvement of tribological properties of titanium alloys can be obtained by using a number of surface layer modification techniques such as nitriding, boriding, physical vapour deposition (TiN, CrN, NbN, DLC, WC / C) [8-10], ion implementation (Ca, P, N, H, Mg) [11] and surface oxidation [17].
The structure of the laser cladded layers is characterized by high quality, low roughness and fine graining.
Pakieła, Structure and properties of ultra fine grained aluminium alloys after laser surface treatment, Materialwissenschaft Und Werkstofftechnik, 47 (2016) 419-427. doi:10.1002/mawe.201600517 [5] H.
Huang, Grain morphology control and texture characterization of laser solid formed Ti6Al2Sn2Zr3Mo1.5Cr2Nb titanium alloy.
Hong, Simultaneous achievement of equiaxed grain structure and weak texture in Pure Titanium via selective laser melting and subsequent heat treatment, J.
The structure of the laser cladded layers is characterized by high quality, low roughness and fine graining.
Pakieła, Structure and properties of ultra fine grained aluminium alloys after laser surface treatment, Materialwissenschaft Und Werkstofftechnik, 47 (2016) 419-427. doi:10.1002/mawe.201600517 [5] H.
Huang, Grain morphology control and texture characterization of laser solid formed Ti6Al2Sn2Zr3Mo1.5Cr2Nb titanium alloy.
Hong, Simultaneous achievement of equiaxed grain structure and weak texture in Pure Titanium via selective laser melting and subsequent heat treatment, J.
Online since: January 2005
Authors: Gábor Pető, Hajnalka Csorbai, Erika Kálmán, Albert Karacs, P. Csíkvári, Gergely Kovách
Both of these proceses produced
inperfect protective layers, but we proved that a PLD DLC film over the diamond layer does reduce
the number of pinholes in the coating.
The DLC grains cluster around the pinholes and forms hills over them.
The DLC grains cluster around the pinholes and forms hills over them.
Online since: November 2014
Authors: Xiao Kun
According to DIFC we build CA _Data Guarder, Provide fine-grained data of isolation and control between multi-tenant and ensure to the safety mechanism can not be easily be bypassed.
(3) Encode( sk, S )→D: S and sk are input, according secret sharing, put out a new file D, D includes n the same size data blck {D1,D2,…, Dn}, this function does the progress of original file separation and redundant storage; (4) Challenge( r )→chal: input is random number r, out put is a challenge number chal, Client make chal, then send it to CSS, ask CSS to do the integrity verification to S
If the result is false, Client can require Repond ( I ) let pk and k data block{Di|1≤ i ≤ k}to be the first input respond number res, Client makes verification to res, then judge which block i is wrong
(7)Restroe({Di|1≤ i ≤ k}: k data block {Di|1≤ i ≤ k} is input, k is the threshold number of secret sharing program, try to recovery a original file from CSS。
before storing data {D1, D2,…, Dn} into cloud, users calculate firstly: Among them, Data IDi is the index of the i data block, Hash (⋅ )is one-way encryption function, User ID is the user’s ID on TTS, Password is used for authentication for users, Timestamp is used to avoid hard attack, c is random number which is chosen by user. cDi is used to find out the wrong data block when it is failed to data integrity verification .
(3) Encode( sk, S )→D: S and sk are input, according secret sharing, put out a new file D, D includes n the same size data blck {D1,D2,…, Dn}, this function does the progress of original file separation and redundant storage; (4) Challenge( r )→chal: input is random number r, out put is a challenge number chal, Client make chal, then send it to CSS, ask CSS to do the integrity verification to S
If the result is false, Client can require Repond ( I ) let pk and k data block{Di|1≤ i ≤ k}to be the first input respond number res, Client makes verification to res, then judge which block i is wrong
(7)Restroe({Di|1≤ i ≤ k}: k data block {Di|1≤ i ≤ k} is input, k is the threshold number of secret sharing program, try to recovery a original file from CSS。
before storing data {D1, D2,…, Dn} into cloud, users calculate firstly: Among them, Data IDi is the index of the i data block, Hash (⋅ )is one-way encryption function, User ID is the user’s ID on TTS, Password is used for authentication for users, Timestamp is used to avoid hard attack, c is random number which is chosen by user. cDi is used to find out the wrong data block when it is failed to data integrity verification .