![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
The improved strength and fracture mechanism of additive manufactured Ti-6Al-4 V alloys compared with corresponding as-rolled alloys
The microstructure and tensile fracture mechanisms of as-rolled and additive manufactured Ti-6Al-4 V alloys were systematically investigated. The ultimate tensile strength and elongation of as-rolled Ti-6Al-4 ...
-
Article
Effects of HF Acid on Dissolution of Elemental Si
Separating Si from mixture of Si and Si oxides using HF acid is an important prerequisite for preparing Si/C anode material for lithium ion battery. Increasing Si yield during the separation is desired. This r...
-
Article
Modeling and experimental investigation of Cartesian compliance characterization for drilling robot
Industrial robot due to its high flexibility and low cost is wildly used in many areas. However, the low stiffness properties are the main limitation to the application of industrial robots in the field of pre...
-
Article
Survey on key security technologies for space information networks
SIN (Space Information Network) is expected to play an increasing role in providing real-time, flexible, and integrated communication and data transmission services in an efficient manner. Nowadays, SIN has be...
-
Chapter and Conference Paper
On the Batch Scheduling Problem in Steel Plants Based on Ant Colony Algorithm
The continuous casting direct hot charge rolling (CC-DHCR) process is widely used by steel plants. This process is also put forward higher requirements for batch scheduling, especially in continuous casting-ho...
-
Article
Effects on the local symptoms of subgenomic RNAs expressions and their translational products of Tobacco necrosis virus A Chinese isolate
Based on a full-length infectious cDNA clone, gene modifications of Tobacco necrosis virus A Chinese isolate (TNV-AC) were made by site-directed mutagenesis or nucleotide deletions for in vitro transcription of m...
-
Article
Attacks on real polynomial type public-key cryptosystems and discussion on related problems
The real polynomial type public-key cryptosystems are broken up by computing the equivalent secure keys, then some computational problems related to securities of cryptosystems are discussed.
-
Article
Continued fraction tactics for cryptanalysis
The continued fraction tactics for cryptanalysis based on Legendre Theorem of continued fraction are proposed.