International Journal of Control, Automation and Systems - In this paper, a composite fault-tolerant control problem is studied for a class of uncertain nonlinear system with asymmetric input... 相似文献
Lithium‐rich disordered rock‐salt oxides have attracted great interest owing to their promising performance as Li‐ion battery cathodes. While experimental and theoretical efforts are critical in advancing this class of materials, a fundamental understanding of key property changes upon Li extraction is largely missing. In the present study, single‐crystal synthesis of a new disordered rock‐salt cathode material, Li1.3Ta0.3Mn0.4O2 (LTMO), and its use as a model compound to investigate Li concentration–driven evolution of local cationic ordering, charge compensation, and chemical distribution are reported. Through the combined use of 2D and 3D X‐ray nanotomography, it is shown that Li removal accompanied by oxygen oxidation is correlated with the development of morphological defects such as particle cracking. Chemical heterogeneity, quantified by subparticle level distribution of Mn valence state, is minimal during Mn redox, which drastically increases upon the formation of cracks during oxygen redox. Density functional theory and bond valence sum mismatch calculations reveal the presence of local short‐range ordering in the pristine oxide, which gradually disappears along with the extraction of Li. The study suggests that with cycling the transformation into true cation–disordered state can be expected, which likely impacts the voltage profile and obtainable energy density of the oxide cathodes. 相似文献
The Journal of Supercomputing - In the last decade, cloud computing has brought enormous changes to people’s lives. Cloud computing gives a client-driven computational model. In this case,... 相似文献
We present a new scheme for visibly-opaque but near-infrared-transmitting filters involving 7 layers based on one-dimensional ternary photonic crystals, with capabilities in reaching nearly 100% transmission efficiency in the near-infrared region. Different decorative reflection colors can be created by adding additional three layers while maintaining the near-infrared transmission performance. In addition, our proposed structural colors show great angular insensitivity up to ±60° for both transverse electric and transverse magnetic polarizations, which are highly desired in various fields. The facile strategy described here involves a simple deposition method for the fabrication, thereby having great potential in diverse applications such as image sensors, anti-counterfeit tag, and optical measurement systems.
Nano Research - We report the composition and back-gate voltage tuned transport properties of ternary compound Bi2(Te1−xSex)3 nanowires synthesized by chemical vapor deposition (CVD). It is... 相似文献
Mobile software applications have to cope with a particular environment that involves small size, limited resources, high autonomy requirements, competitive business models and many other challenges. To provide development guidelines that respond to these needs, several practices have been introduced; however, it is not clear how these guidelines may contribute to solve the issues present in the mobile domain. Furthermore, the rapid evolution of the mobile ecosystem challenges many of the premises upon which the proposed practices were designed. In this paper, we present a survey of the literature on software assurance practices for mobile applications, with the objective of describing them and assessing their contribution and success. We identified, organized and reviewed a body of research that spans in three levels: software development processes, software product assurance practices, and software implementation practices. By carrying out this literature survey, we reviewed the different approaches that researchers on Software Engineering have provided to address the needs that raise in the mobile software development arena. Moreover, we review the evolution of these practices, identifying how the constant changes and modernization of the mobile execution environment has impacted the methods proposed in the literature. Finally, we introduced discussion on the application of these practices in a real productive setting, opening an area for further research that may determine if practitioners have followed the proposed assurance paradigms. 相似文献
This paper presents an integrated passive damping approach in hybrid metal-CFRP parts for structural applications. In this concept a viscoelastic material is embedded in the joint zone of the hybrid component. To examine the connection strength single-lap-joint specimens were produced and tested and the influence of the used material combinations, different surface structures, and different process parameters i.e. the moment of cross-linking were evaluated. Afterwards, the metal-CFRP hybrids were tested in quasi-static tests to assess their connection strength and failure behaviour. Dynamic cyclic tensile tests with step-wise increased loading conditions were performed to determine the specimens damping behaviour and to estimate their fatigue performance. Finally, these results are compared to a state of the art metal-CFRP hybrid with rivets connecting both materials. 相似文献
Mobile cloud computing is an emerging field that is gaining popularity across borders at a rapid pace. Similarly, the field of health informatics is also considered as an extremely important field. This work observes the collaboration between these two fields to solve the traditional problem of extracting Electrocardiogram signals from trace reports and then performing analysis. The developed system has two front ends, the first dedicated for the user to perform the photographing of the trace report. Once the photographing is complete, mobile computing is used to extract the signal. Once the signal is extracted, it is uploaded into the server and further analysis is performed on the signal in the cloud. Once this is done, the second interface, intended for the use of the physician, can download and view the trace from the cloud. The data is securely held using a password-based authentication method. The system presented here is one of the first attempts at delivering the total solution, and after further upgrades, it will be possible to deploy the system in a commercial setting. 相似文献