-
Article
Decryption of pure-position permutation algorithms
Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position perm...
-
Article
Effect of Heat Treatment on Microstructure and Property of Cr13 Super Martensitic Stainless Steel
The microstructures and mechanical properties of Cr13 super martensitic stainless steel after different heat treatments were studied. The results show that the structures of the steel after quenching are of la...
-
Article
A Novel Method for Flatness Pattern Recognition via Least Squares Support Vector Regression
To adapt to the new requirement of the develo** flatness control theory and technology, cubic patten were introduced on the basis of the traditional linear, quadratic and quartic flatness basic patterns. Lin...
-
Article
Experimental study on a −60 °C cascade refrigerator with dual running mode
In this study, an experimental setup is designed and built to investigate the feasibility and performance of the proposed dual-mode cascade refrigeration cycle. The apparatus can be operated in two modes: dual...
-
Article
Structural, thermodynamics and elastic properties of Mg17Al12, Al2Y and Al4Ba phases by first-principles calculations
Structural stabilities, thermodynamics stabilities, elastic properties and electronic structures of Mg17Al12, Al2Y and Al4Ba phases were analyzed by first-principles calculations with Castep and Dmol3 program bas...
-
Article
Space luminous environment adaptability of missile-borne star sensor
To solve the problem of stray interference to star point target identification while a star sensor imaging to the sky, a study on space luminous environment adaptability of missile-borne star sensor was carrie...
-
Article
Flatness intelligent control via improved least squares support vector regression algorithm
To overcome the disadvantage that the standard least squares support vector regression (LS-SVR) algorithm is not suitable to multiple-input multiple-output (MIMO) system modelling directly, an improved LS-SVR ...
-
Article
Investigation of non-cohesive levee breach by overtop** flow
This paper presents an experimental study of the overtop** breach of homogeneous non-cohesive levee or dike in a 180° bend rectangular flume. Detailed experimental and numerical results provide information o...
-
Chapter and Conference Paper
Methodology of Forecasting the Develo** Tendency of a GIS PD Based on the Fractal Dimension and Catastrophe Theory
In order to effectively predict the development of GIS PD, the fractal dimension and catastrophe theory is used in this chapter. A large number of experimental results described by a lot of literatures have co...
-
Chapter and Conference Paper
The Detecting Methodology of GIS Insulation Defects Based on the AC Withstand Voltage Test
The AC withstand voltage test is the most common method of GIS (Gas Insulated Switchgear) on-site withstand voltage tests. The AC withstand voltage test exists in a voltage step-up process, and the voltage wav...
-
Article
Reaction mechanism of molten NaOH decomposing Zn2SiO4 in willemite
Based on the existing form of Zn2SiO4 in willemite, the chemical precipitation method was used to synthesize Zn2SiO4. Through the orthogonal experimentation, the reaction conditions of melten NaOH decomposing Zn2
-
Article
Electrochemical degradation of acidified reed pulp black liquor with three-dimensional electrode reactor
The electrochemical degradation of reed pulp black liquor containing lignin pretreated by acidification method was investigated using a three-dimensional electrode reactor. Using activated carbon as particle e...
-
Chapter and Conference Paper
Research of Data Resource Description Method Oriented Provenance
There are a wide variety of data resources description methods, which are applied for different application backgrounds. Military data resources classified generally in accordance with branches or organization...
-
Article
Assessment of bearing performance degradation via extension and EEMD combined approach
As a key component in rotating machinery, the operating reliability of bearing influences the performance and service life of the equipment directly. In order to describe bearing performance degradation (BPD) ...
-
Article
Micro-ECM of 3D micro-electrode for efficiently processing 3D micro-structure
Applying 3D micro-electrodes in micro-electrical discharge machining (micro-EDM) can process a 3D micro-structure with up and down reciprocating machining method. However, this method has some shortcomings, su...
-
Article
Elimination of 3D micro-electrode’s step effect and applying it in micro-EDM
3D micro-electrode is fitted out by multilayer 2D micro-structures, so the steps inevitably occur in the 3D micro-electrode. When the 3D micro-electrode is used in micro-EDM, steps are replicated onto the surf...
-
Article
The wear of foil queue microelectrode in 3D micro-EDM
Based on a planned process design path, a foil queue microelectrode (FQ-microelectrode) is applied sequentially in micro-electrical discharge machining (micro-EDM) in which the micro-EDM results can superimpos...
-
Article
Efficient and high-fidelity steering ability prediction of a slender drilling assembly
In drilling engineering, it is extremely challenging to drill a prescribed wellbore over several thousand meters. One of the main difficulties arises from accurately predicting and controlling the directional ...
-
Article
Origin of Early Creceouscalc-alkaline granite, Taxkorgan: Implications for evolution of Tethys evolution in central Pamir
The Pamir plateau may have been a westward continuation of Tibet plateau. Meanwhile, the Rushan-Pshart suture is correlative to the Bangong-Nujiang suture of Tibet, and the Central Pamir is the lateral equival...
-
Article
Driving rule extraction based on cognitive behavior analysis
In order to make full use of the driver’s long-term driving experience in the process of perception, interaction and vehicle control of road traffic information, a driving behavior rule extraction algorithm ba...