Chemical-looping combustion (CLC) is a new method for the combustion of fuel gas with inherent separation of carbon dioxide. The cold interconnected fluidized beds (Oslash100) were set-up for the hot model design in t...
详细信息
Chemical-looping combustion (CLC) is a new method for the combustion of fuel gas with inherent separation of carbon dioxide. The cold interconnected fluidized beds (Oslash100) were set-up for the hot model design in this work. The pressure drop of both air reactor (AR) and fuel reactor (FR) were measured and used for CLC system design. The effects of superficial gas velocity on pressure distribution of both AR and FR were presented. Before fluidization, the pressure drop characteristics of two reactors in interconnected dual fluidized bed for CLC sharply increase with the increasing of gas velocity, which just similar to that of conventional circulating fluidized bed. And after fluidization, the pressure drop of two reactors in dual fluidized bed decreased with the increasing gas velocity. It could be seen that u FR must be increased with an enhancive u AR value to ensure exchange of bed material, and the higher of the gas velocity, the more material could be exchanged.
Remote platform integrity attestation is a method by which a client attests its hardware and software configuration to a remote server. The goal of remote integrity platform attestation is to enable a remote challenge...
详细信息
Remote platform integrity attestation is a method by which a client attests its hardware and software configuration to a remote server. The goal of remote integrity platform attestation is to enable a remote challenger to determine the level of trust in the integrity of another attestator's platform configuration. However, the existing integrity reporting protocol is vulnerable to man-in-the-middle(MITM) attacks. In this paper, we describe this kind of attacks against protocols for remote platform integrity attestation, and propose a security-enhanced remote platform integrity attestation scheme for preventing man-in-the middle attacks.
Together with attractive couplings, repulsive couplings play crucial roles in determining important evolutions in natural systems, such as in learning and oscillatory processes of neural networks. The complex interact...
详细信息
Together with attractive couplings, repulsive couplings play crucial roles in determining important evolutions in natural systems, such as in learning and oscillatory processes of neural networks. The complex interactions between them have great influence on the systems. A detailed understanding of the dynamical properties under this type of couplings is of practical significance. In this paper, we propose a model to investigate the dynamics of attractive and repulsive couplings, which give rise to rich phenomena, especially for amplitude death (AD). The relationship among various dynamics and possible transitions to AD are illustrated. When the system is in the maximally stable AD, we observe the transient behavior of in-phase (high frequency) and out-of-phase (low frequency) motions. The mechanism behind the phenomenon is given.
To avoid the precision loss caused by combining data- flow facts impossible to occur in the same execution path in dependence analysis for C programs, this paper first proposes a flow-sensitive and context-insensitive...
详细信息
To avoid the precision loss caused by combining data- flow facts impossible to occur in the same execution path in dependence analysis for C programs, this paper first proposes a flow-sensitive and context-insensitive points-to analysis algorithm and then presents a new dependence analysis approach based on it. The approach makes more sufficient consideration on the executa- ble path problem and can avoid invalid combination between points-to relations and between points-to relations and reaching definitions. The results of which are therefore more precise than those of the ordinary dependence analysis approaches.
Real time and low occupation of memory must be satisfied in the error controlling of computer networks. Cyclic redundancy code generation algorithm based on small lookup table (CRCGA) is presented in this paper, which...
详细信息
ISBN:
(纸本)9781424448166
Real time and low occupation of memory must be satisfied in the error controlling of computer networks. Cyclic redundancy code generation algorithm based on small lookup table (CRCGA) is presented in this paper, which is based on ¿slicing-by-4¿ algorithm proposed by M. E. Kounavis et. al. and uses the distributive property of mod function in modulo-2 arithmetic to reduce the size of cache demanded by the algorithm by half. CRCGA reads 32 bits at a time, only needs 2-KByte cache footprint. Simulation results show that CRCGA can be applied to small control equipment in distributed control system.
A tridimensional model of alpha-Fe 2 O 3 and models of (0001) and (1102) surfaces on it were built. Then the structural optimization of the (0001) surface was presented which explored the influence of the system scal...
详细信息
A tridimensional model of alpha-Fe 2 O 3 and models of (0001) and (1102) surfaces on it were built. Then the structural optimization of the (0001) surface was presented which explored the influence of the system scale and the terminal surface configuration. Four different models including two different system scale structures (MODEL square and MODEL square) and two different terminal structures (MODEL square and MODEL square) were analyzed in this paper. It was concluded that the boundary effect was more important in a smaller system in the structure optimization. And the Fe-terminated was more stable than the O-terminated structure which was agreed with the experiences, this structural model can be used in further work including the monatomic adsorption/desorption and the chemical reactions on this surface.
In order to avoid dioxin emission from municipal solid waste combustion (MSW), chemical looping combustion was considered. The interaction between HCl and Fe 2 O 3 was studied in this paper and experiments were carri...
详细信息
In order to avoid dioxin emission from municipal solid waste combustion (MSW), chemical looping combustion was considered. The interaction between HCl and Fe 2 O 3 was studied in this paper and experiments were carried out in a fixed bed reactor. Chlorine was measured by methyl orange spectrophotometric method. The intermediate reactions were calculated with standard Gibbs free energy and reaction equilibrium constants. The result showed that: when Fe 2 O 3 is used as oxygen carrier, the conversion of HCl to chlorine can be suppressed, thus reduce Dioxin emission.
Based on the structure of HTTP protocol, a real-time information hiding algorithm was proposed in this paper, to solve the problem that embedding a mass of data in the TCP/IP packet. The secret information is embedded...
详细信息
ISBN:
(纸本)9781424448999
Based on the structure of HTTP protocol, a real-time information hiding algorithm was proposed in this paper, to solve the problem that embedding a mass of data in the TCP/IP packet. The secret information is embedded in HTTP protocol header fields. It's proved that the capacity of the algorithm is perfect by experiments, and more than 1000 bytes of data could be embedded in a HTTP request-packet (Get-packet), while the transparency is very well. At the same time, the information hidden will not affect on packets transmitting.
Recently, Das et al. and Tseng et al. proposed a remote user authentication scheme using bilinear pairings, respectively. They can provide a flexible password change option to the users without any help from the remot...
详细信息
Recently, Das et al. and Tseng et al. proposed a remote user authentication scheme using bilinear pairings, respectively. They can provide a flexible password change option to the users without any help from the remote server. However, some weaknesses of the two bilinear pairing based remote password authentication schemes are found in the paper. The schemes suffer from offline password guessing attack and impersonation attacks.
Internet topology measurement is an important part of Network measurement. Nowadays, traceroute probing method is widely used to obtain the original route data, and the IP alias resolution technique is to identify IP ...
详细信息
暂无评论