Sort by:
Publication Type:
Open access:
Publication Date:
Periodicals:
Search results
Online since: March 2014
Authors: Xiang Zhang, Philip E. Irving, Jeremy Doucet
A series of fatigue delamination tests on bonded aluminium were performed to provide input data.
A linear fit was applied to each data set in order to determine the parameters to fit a Paris Law equation.
The predictions are compared to a baseline (no reinforcement) and with experimental strapped test data.
An iterative FE model incorporating the model and data was developed to predict fatigue crack growth life of bonded structures.
Fatigue life prediction using the calculated stress intensity factor coefficient and AFGROW code showed good agreement with experimental data.
A linear fit was applied to each data set in order to determine the parameters to fit a Paris Law equation.
The predictions are compared to a baseline (no reinforcement) and with experimental strapped test data.
An iterative FE model incorporating the model and data was developed to predict fatigue crack growth life of bonded structures.
Fatigue life prediction using the calculated stress intensity factor coefficient and AFGROW code showed good agreement with experimental data.
Online since: October 2006
Authors: John P. Dear, Miltiadis Kourmpetis, Andrew Morris
However, measurements can also be useful each time the plant is shut down during a plant outage;
which would be used to complement data from existing proven rugged monitoring methods.
Using the micro-strain data from previous measurements, accumulated strain and strain rate can be determined.
The localization of the yielding around the defect has lead to a reduction of strain away from the defect.
There are occasions when in addition to the ARCMAC data, it would be very helpful to be able to search for the presence of sub-surface cracks and other defects in power station components as reported on here for the laboratory specimens.
Also, this is to research ways of achieving the additional methods for monitoring of steam pipes to obtain their remaining life data.
Using the micro-strain data from previous measurements, accumulated strain and strain rate can be determined.
The localization of the yielding around the defect has lead to a reduction of strain away from the defect.
There are occasions when in addition to the ARCMAC data, it would be very helpful to be able to search for the presence of sub-surface cracks and other defects in power station components as reported on here for the laboratory specimens.
Also, this is to research ways of achieving the additional methods for monitoring of steam pipes to obtain their remaining life data.
Online since: September 2011
Authors: Mikko Hupa, Patrik Yrjas, Juho Lehmusto, Bengt Johan Skrifvars
Recovery of energy from biomass and various waste–derived fuels by combustion has become important due to reduction of detrimental CO2 emissions.
Tamkins: Eutectic data; safety hazard, corrosion, melting points, compositions and bibliography.
Troy, NY: Molten Salts Data Center, Rensselaer Polytechnic Institute, 1976
Tamkins: Eutectic data; safety hazard, corrosion, melting points, compositions and bibliography.
Troy, NY: Molten Salts Data Center, Rensselaer Polytechnic Institute, 1976
Online since: April 2010
Authors: Haruyuki Inui, Toshiyuki Koyama, Masahiko Morinaga, Md. Moniruzzaman, Yoshinori Murata, Haruhiko Fukaya, Wataro Hashimoto, Katsushi Tanaka
In order to obtain interdiffusion coefficients of the
pseudo-binary systems, the experimental data was analyzed by the Sauer and Freise method, and also
impurity diffusion coefficients of Ti, V and Nb in Ni3Al were estimated by applying the
Darken-Manning equation.
The activation enthalpies obtained from the experimental data confirmed the retardation of Ti, V and Nb diffusion in Ni3Al by the anti-site diffusion mechanism.
The extrapolated tracer diffusion coefficients in Ni3Al are estimated and the activation energies are correlated with existing data of the elements from a point of view of the site preferences.
Thus, the solutes residing in the β-site diffuse with higher activation enthalpy than those in the α-site, which corresponds to the additional contribution needed for antisite formation [2, 18]; i.e., a reduction of mobility of the Ti, V, and Nb diffusing atoms in Ni3Al occurs due to the antisite diffusion mechanism.
The activation enthalpies (Q) for solute element diffusion in Ni3Al were estimated from experimental data.
The activation enthalpies obtained from the experimental data confirmed the retardation of Ti, V and Nb diffusion in Ni3Al by the anti-site diffusion mechanism.
The extrapolated tracer diffusion coefficients in Ni3Al are estimated and the activation energies are correlated with existing data of the elements from a point of view of the site preferences.
Thus, the solutes residing in the β-site diffuse with higher activation enthalpy than those in the α-site, which corresponds to the additional contribution needed for antisite formation [2, 18]; i.e., a reduction of mobility of the Ti, V, and Nb diffusing atoms in Ni3Al occurs due to the antisite diffusion mechanism.
The activation enthalpies (Q) for solute element diffusion in Ni3Al were estimated from experimental data.
Online since: June 2011
Authors: Jun Wang, Ya Qiong Jiang
Introduction
Sequence pattern mining is an important branch of data mining.
Said data sequence contains a sequence s, if the sequence is a child sequence of data sequences.
The synthetic datasets were generated from the IBM synthetic data generator[4].
Data Engineering (ICDE’95), pages 3-14, Taipei, Taiwan, Mar.1995
Proceedings of the 2001 IEEE International Conference on Data Mining, 441 – 448, 2001
Said data sequence contains a sequence s, if the sequence is a child sequence of data sequences.
The synthetic datasets were generated from the IBM synthetic data generator[4].
Data Engineering (ICDE’95), pages 3-14, Taipei, Taiwan, Mar.1995
Proceedings of the 2001 IEEE International Conference on Data Mining, 441 – 448, 2001
Online since: July 2011
Authors: Xiao Wang, Xuan Ming Zhang, Chun Wang
Continuous analog scanning systems can acquire 10 to 50 times more data than touch trigger probes in a given amount of time.
VxScan is a proprietary data acquisition software released by Creaform.
The software can recreate a meshing from the raw data previously acquired.
The output data sets can be automatically converted into an STL file, which records the x, y, z coordinates of the points measured and the normal and is a format compatible with most data CAD/CAM processing and modeling software such as Geomagic, Polyworks, Rapidform and Solidworks and so on.
Then the x axis is created through the origin and the reference point stored in position data file.
VxScan is a proprietary data acquisition software released by Creaform.
The software can recreate a meshing from the raw data previously acquired.
The output data sets can be automatically converted into an STL file, which records the x, y, z coordinates of the points measured and the normal and is a format compatible with most data CAD/CAM processing and modeling software such as Geomagic, Polyworks, Rapidform and Solidworks and so on.
Then the x axis is created through the origin and the reference point stored in position data file.
Online since: December 2012
Authors: Jun Li Li
Data acquisition and process system
Data acquisition and process system consisted of photoelectric angle encoder, magnetic grid displacement sensor, microcontroller system and a portable computer.
Then data were processed and calculated.
Fig.7 Test system diagram Data acquisition channel for photoelectric angle encoder was shown in Fig.8.
Portable computer received, calculated, accessed the data and outputted alarm.
Fig.8 Data acquisition channel Test and results The inspection system was tested in a curving railroad.
Then data were processed and calculated.
Fig.7 Test system diagram Data acquisition channel for photoelectric angle encoder was shown in Fig.8.
Portable computer received, calculated, accessed the data and outputted alarm.
Fig.8 Data acquisition channel Test and results The inspection system was tested in a curving railroad.
Online since: March 2014
Authors: Xiang Feng Zhang, Tian Yu Liu, Bin Jiao
Afterwards, input the sample data and train the BPNN.
Twenty-four sample data are selected.
Twenty-one former data sets are taken as the training sample and the rest data sets are taken as the test sample.
Then, the rest sets of data are input to the trained network.
It is difficult to select data of investment factors in most of situations.
Twenty-four sample data are selected.
Twenty-one former data sets are taken as the training sample and the rest data sets are taken as the test sample.
Then, the rest sets of data are input to the trained network.
It is difficult to select data of investment factors in most of situations.
Online since: March 2018
Authors: Michael Kruse, Miriam Liskow
This system has the task to measure the profile of the hot rolled product and to immediately transmit the results as cold data to the SCS® at high frequency.
The Working Principle A common setup provides the operating data for the rolls, guiding rollers, funnels, gear settings and motor speed of the RSB®.
The measuring data are collected, verified, arithmetically averaged and evaluated in a measuring window.
Since the closed loop control is based on the measuring data of the profile measuring system, it is of essential importance that the profile measuring system has an excellent measuring accuracy and transmits high quality data to the SCS®.
A suitable measuring window is necessary to reduce the effect of possible variation of data.
The Working Principle A common setup provides the operating data for the rolls, guiding rollers, funnels, gear settings and motor speed of the RSB®.
The measuring data are collected, verified, arithmetically averaged and evaluated in a measuring window.
Since the closed loop control is based on the measuring data of the profile measuring system, it is of essential importance that the profile measuring system has an excellent measuring accuracy and transmits high quality data to the SCS®.
A suitable measuring window is necessary to reduce the effect of possible variation of data.
Online since: December 2012
Authors: Zhi Hua Hu, Feng Gao
Sybil attack is an attack node counterfeit identity of a number of legitimate nodes. appears to be forged out of a series of nodes of the Sybil node in other nodes, but in fact, those nodes do not exist, all data will be sent to those nodes, the Sybil node Seth sinkhole the target of attacks as possible to lure a regional traffic through a malicious node or nodes invaded, thus creating a malicious node-centric "to accept the hole, once the data have been the malicious node, the node can normal data tampering, and can lead to many other types of attacks.
Coverage of this nature and node physical layer security risks: accessible implementation of WSN nodes capture and subversion of these nodes to collect confidential data, or attempt to the network of internal attacks.
Transport layer attacks: In addition to the WSN node's physical layer of security risks, an attacker could access the wireless channel transmission data.
In addition, adopted by the attacker to inject their own information package to transfer data, or interfere with the lawful transmission, in order to initiate an external attack.
The advantage is simple and does not require special security channel for key distribution, a corresponding reduction in the difficulty of key management.
Coverage of this nature and node physical layer security risks: accessible implementation of WSN nodes capture and subversion of these nodes to collect confidential data, or attempt to the network of internal attacks.
Transport layer attacks: In addition to the WSN node's physical layer of security risks, an attacker could access the wireless channel transmission data.
In addition, adopted by the attacker to inject their own information package to transfer data, or interfere with the lawful transmission, in order to initiate an external attack.
The advantage is simple and does not require special security channel for key distribution, a corresponding reduction in the difficulty of key management.