The occurrence of a significant amount of age hardening, due to the precipitation of the γ′ phase, has been demonstrated in
the nickel-copper base alloy MONEL K 500. The microstructure of the precipitation-hardened and deformed alloy has been examined
in peak-aged underaged and overaged conditions. An attempt has been made to compare the observed increments in strength in
these three aged conditions to those predicted on the basis of relevant theoretical models. 相似文献
In this paper, the authors introduce a workflow model. The development of computer network technology enables us to share the distributed data in real time. It is a considerable significance in the practical application of network capabilities not only to office work but also to the medical environment. In order to construct a well-connected, managed post (environment, scene), a model is needed to design the workflow. Here we propose a workflow model to cope with the scene of unforeseen events that we usually encounter in daily clinical activities. We give careful consideration to the ability of this model to manage dynamic changes within the workflow and describe its application to a medical scene (triage) and then carry out simulations based on this model. The authors are able to demonstrate the validity of this model through this simulation. 相似文献
The quantum-dot cellular automata (QCA) is considered to be one of the ground-breaking nanotechnologies developed over the last two decades. A layered T (LT) logic cell library is constructed herein, and the methodology is extended to generic adder and subtractor module designs. The two proposed algorithms lead to more efficient QCA layout designs for an n-bit ripple carry adder (RCA) and subtractor based on an effective clock zone assignment approach. The suggested one-, four-, and eight-bit RCAs and subtractors surpass most of their existing counterparts by offering lower effective area and cell complexity. A comparative analysis is presented regarding the complexity, irreversible power dissipation, and Costα of the proposed n-bit layouts from a cost estimation purview.
Design and implementation of division algorithm is one of the most complicated problems in multi-precision arithmetic. Huang et al. [1] proposed an efficient multi-precision integer division algorithm, and experimentally showed that it is about three times faster than the most popular algorithms proposed by Knuth [2] and Smith [3]. This paper reports a bug in the algorithm of Huang et al. [1], and suggests the necessary corrections. The theoretical correctness proof of the proposed algorithm is also given. The resulting algorithm remains as fast as that of [1]. 相似文献
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportunistically access and use parts of the spectrum not being used by others. Though cooperation among nodes is desirable for efficient network operations and performance, there might be some malicious nodes whose objective could be to hinder communications and disrupt network operations. The absence of a central authority or any policy enforcement mechanism makes these kinds of open-access network more vulnerable and susceptible to attacks.In this paper, we analyze a common form of denial-of-service attack, i.e., collaborative jamming. We consider a network in which a group of jammers tries to jam the channels being used by legitimate users who in turn try to evade the jammed channels. First, we compute the distribution of the jamming signal that a node experiences by considering a random deployment of jammers. Then, we propose different jamming and defending schemes that are employed by the jammers and legitimate users, respectively. In particular, we model and analyze the channel availability when the legitimate users randomly choose available channels and the jammers jam different channels randomly. We propose a multi-tier proxy-based cooperative defense strategy to exploit the temporal and spatial diversity for the legitimate secondary users in an infrastructure-based centralized cognitive radio network. Illustrative results on spectrum availability rates show how to improve resiliency in cognitive radio networks in the presence of jammers. 相似文献