A novel spiral micromixer with sinusoidal channel walls was designed to enhance the mixing index in the low to intermediate Reynolds number range (1 < Re < 100). To analyze the fluid flow, a set of numerical simulations were performed using the finite-difference method. The microchip was fabricated from polydimethylsiloxane, employing the soft-lithography technique. The degree of mixing was increased by 99.11 % when using the proposed micromixer, compared to 59.44 % for a simple spiral micromixer. The introduced microchannel drastically reduced the mixing length, increasing the mixing index of a 0.5-loop spiral-sinusoidal microchannel compared to that of the simple spiral microchannel with 1.5 loops. The mixing index of the 3-loop mixer was higher than that of the microchannel with 1.5 loops, and its pressure drop was increased. 相似文献
The void formation and plastic deformation micromechanisms of a cold-rolled DP600 steel during tensile loading were studied by scanning electron microscopy(SEM) and electron backscatter diffraction(EBSD).The SEM observations revealed that the main void nucleation mechanism in the DP600 steel is decohesion at the ferrite-martensite interfaces.The voids were mostly observed between the closely spaced martensite islands situated at the boundaries of relatively finer ferrite grains.The EBSD results indicated a strain gradient developed from the ferrite-martensite and ferrite-ferrite interfaces into the interior of ferrite grains during the tensile deformation,which led to a stress concentration at these interfaces.Moreover,it was demonstrated that local misorientation inside the finer ferrite grains surrounded by martensite islands was higher than that for the coarser ferrite grains,which made the former more prone to void initiation. 相似文献
World Wide Web - Blockchain, with its ever-increasing maturity and popularity, is being used in many different applied computing domains. To document the advancements made, researchers have... 相似文献
Bulletin of Engineering Geology and the Environment - In recent years, anumber of models and formulas have been proposed to estimate the penetration rate of hard rock tunnel boring machines (TBMs).... 相似文献
Wireless body area networks (WBANs) are a network designed to gather critical information about the physical conditions of patients and to exchange this information. WBANs are prone to attacks, more than other networks, because of their mobility and the public channel they use. Therefore, mutual authentication and privacy protection are critical for WBANs to prevent attackers from accessing confidential information of patients and executing undetectable physical attacks. In addition, in the authentication and key agreement process, messages should be transferred anonymously such that they are not linkable. In this paper, we first indicate that one of the most recently introduced authentication protocol is vulnerable to the wrong session key agreement attack and desynchronization attack. Second, we propose a lightweight authentication and key agreement protocol, which can withstand the well‐known attacks and provide the anonymity feature. Eventually, we analyze the security of our proposed protocol using both Automated Validation of Internet Security Protocols and Applications (AVISPA) and random oracle model and compare its performance with the related works. The results demonstrate the superiority of our proposed protocol in comparison with the other protocols. 相似文献
With the growth of the internet, development of IP based services has increased. Voice over IP (VoIP) technology is one of the services which works based on the internet and packet switching networks and uses this structure to transfer the multimedia data e.g. voices and images. Recently, Chaudhry et al., Zhang et al. and Nikooghadam et al. have presented three authentication and key agreement protocols, separately. However, in this paper, it is proved that the presented protocols by Chaudhry et al. and also Nikooghadam et al. do not provide the perfect forward secrecy, and the presented protocol by Zhang et al. not only is vulnerable to replay attack, and known session-specific temporary information attack, but also does not provide user anonymity, re-registration and revocation, and violation of fast error detection. Therefore, a secure and efficient two-factor authentication and key agreement protocol is presented. The security analysis proves that our proposed protocol is secure against various attacks. Furthermore, security of proposed scheme is formally analyzed using BAN logic and simulated by means of the AVISPA tool. The simulation results demonstrate security of presented protocol against active and passive attacks. The communication and computation cost of the proposed scheme is compared with previously proposed authentication schemes and results confirm superiority of the proposed scheme.
Multibody System Dynamics - In the current study, the dynamic behavior of two planar mechanisms with revolute joints, in the presence of clearances is investigated. Subsequently, a control scheme... 相似文献