Adding nanotube adding into a polymeric matrix leads to the formulation of nanocomposites with enhanced macroscopical performances, and, moreover, the use of functionalized MW-CNTs leads to the nanocomposite formulati...
详细信息
Adding nanotube adding into a polymeric matrix leads to the formulation of nanocomposites with enhanced macroscopical performances, and, moreover, the use of functionalized MW-CNTs leads to the nanocomposite formulation with even better properties. Furthermore, the reactive melt blending can be considered as a powerful processing method, i.e. reasonably simple and ecologically friendly, in order to formulate polymer based nanocomposite with good performance. In this work, the reactive melt blending between an ethylene-acrylic acid co-polymer, bis-oxazoline and functionalized MW-CNTs was performed and the rheological properties of the formulated systems were investigated.
there has been much innovative work in designing computer and communication systemsthat can dependably attain certain stringent requirements such as multilevel security, very high availability, or functional correctn...
详细信息
ISBN:
(纸本)0780301269
there has been much innovative work in designing computer and communication systemsthat can dependably attain certain stringent requirements such as multilevel security, very high availability, or functional correctness. However, significant risks may remain if such a system fails to operate as expected. A variety of causes must be considered. A confluence of unrelated or seemingly unrelated events such as malicious misuse and faults that exceed the system fault tolerance may cause the system to behave in an unanticipated way. the 1991 Risk of the Year designation recognizes such eventualities. three types of cases are considered: notably weak links, independent multiple events, and correlated multiple events. Not surprisingly, the three cases are often discovered to be interrelated, even when seemingly disjoint.
the fluorescence spectra of Bulgarian and French wines of the same price class were obtained at excitation wavelengths of 265 nm, 275 nm and 295 nm. the excitation-emission matrices for investigated French wines are o...
详细信息
ISBN:
(数字)9781510627697
ISBN:
(纸本)9781510627697
the fluorescence spectra of Bulgarian and French wines of the same price class were obtained at excitation wavelengths of 265 nm, 275 nm and 295 nm. the excitation-emission matrices for investigated French wines are obtained and compared. there are the linear dependences between the ratio I 415/I 265 and the antioxidant activity determined by ABTS and DPPH methods All red wines are with a higher antioxidant activity in ABTS radicals in comparisons and the DPPH radicals. the highest AOA by the methods of ABTS are exhibited by wines from Harmanli, while form DPPH - by the French wines from the Nice region.
the 2nd international Workshop on Intelligent Techniques and algorithms for Ubiquitous computing (ITAUC-2012) will be held in conjunction withthe 6thinternationalconference on Innovative Mobile and Internet Service...
the 2nd international Workshop on Intelligent Techniques and algorithms for Ubiquitous computing (ITAUC-2012) will be held in conjunction withthe 6thinternationalconference on Innovative Mobile and Internet Services in Ubiquitous computing (IMIS-2012) from July 4 to July 6, 2012 at San Paolo Palace Hotel, Palermo, Italy. the aim of ITAUC-2012 is to provide a forum for sharing ideas and research work in areas of intelligent, adaptive and flexible methods and algorithms for wireless networks, broadband networks and ubiquitous computing. Based on carefully check of review results, we selected 11 papers to be presented in ITAUC-2012.
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been proposed. However, all the perspectiv...
详细信息
ISBN:
(纸本)9781605580425
Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been proposed. However, all the perspectives of a software system have not been provided specific attention. While most security metrics evaluate software from a system-level perspective, it can also be useful to analyze defects at a lower level, i.e., at the source code level. To address this issue, we propose some code-level security metrics which can be used to suggest the level of security of a code segment. We provide guidelines about where and how these metrics can be used to improve source code structures. We have also conducted two case studies to demonstrate the applicability of the proposed metrics. Copyright 2008 ACM.
Recent research in wireless communications has achieved important results by exploring more and more sophisticated solutions involving power control. Cross-layer design and topology control are the main examples. Alth...
详细信息
Computer simulations play an important role in the design and verification of space robotic operations since on-orbit tests are impossible to conduct before launch. thus, accurate computer modeling and simulation of s...
详细信息
ISBN:
(纸本)0791847438
Computer simulations play an important role in the design and verification of space robotic operations since on-orbit tests are impossible to conduct before launch. thus, accurate computer modeling and simulation of space robotic tasks is essential. Of particular difficulty are the space manipulator operations, that involve constrained or contact tasks. Here, the contact dynamics capability in the modeling tools becomes critical for high fidelity simulations. this in turn implies a need for accurate determination of contact parameters, which are used as inputs to contact dynamics simulation. In this work, the identification of contact dynamics parameters based on sensor data obtained during robotic contact tasks is considered. In particular, the contact parameter estimation problem is addressed for simple contacting geometries using the SPDM Task Verification Facility Manipulator Testbed (SMT) at the Canadian Space Agency, where SPDM is the Special Purpose Dexterous Manipulator. the SMT is a robotic simulation facility, which also features gravity compensation algorithms to support the emulation of space robots. Single point SMT contact experiments were performed with six different payloads. Eight unique single point contact parameter estimation algorithms were used as part of the process of identifying payload stiffness from SMT experimental data.
there is a problem of choosing the optimal configuration of the necessary computer and network equipment for the storage and processing system of BM@N and MPD experiments that the NICA complex part. A macro-modeling s...
详细信息
Modern propositional satisfiability (or SAT) solvers are very powerful due to recent developments on the underlying data structures, the used heuristics to guide the search, the deduction techniques to infer knowledge...
详细信息
In the modern world, effective resource management in power supply systems is critically important for ensuring reliability, energy savings, and cost reduction. Innovative approaches to resource management, particular...
详细信息
暂无评论