We present the discovery of 18 narrow line Seyfert 1 galaxies (NLS1). The optical spectra show the Balmer lines only slightly broader than the forbidden lines and contain strong Fe Ⅱ emission. No particularly soft X ...We present the discovery of 18 narrow line Seyfert 1 galaxies (NLS1). The optical spectra show the Balmer lines only slightly broader than the forbidden lines and contain strong Fe Ⅱ emission. No particularly soft X ray spectral slopes can be seen compared to a normal Seyfert 1 galaxies sample.展开更多
Shielding angle is one of the main factors influencing lightning performance of transmission lines,which always stays in the focus of the design and the evaluation of lightning protection.A formula for the improved sh...Shielding angle is one of the main factors influencing lightning performance of transmission lines,which always stays in the focus of the design and the evaluation of lightning protection.A formula for the improved shielding angle is proposed for evaluating the lightning performance in different terrains.The digital elevation model(DEM) is used to obtain the micro-topography data,such as the slope gradient,slope aspect,etc.The following results are obtained by analyzing the influence of topography factors on the improved shielding angle:(1) improved shielding angle non-linearly increases with the increase of the slope gradient and the slope aspect,(2) improved shielding angle is more sensitive to the slope gradient than to the slope aspect,(3) the improved shielding angle in the mountain terrains is much greater than the designed shielding angle.This may be the reason why the designed shielding angle is limited into the rational range,while the shielding faults occur frequently.展开更多
In this study,it is aimed to develop an encryption algorithm by finding a third point based on the line equation and the two points taken on it.In the literature review,a method was found to find the third point based...In this study,it is aimed to develop an encryption algorithm by finding a third point based on the line equation and the two points taken on it.In the literature review,a method was found to find the third point based on the two points given on the elliptic curves y2=x3+a·x+b,where a and b are real numbers.However,it has not been found adapted to the correct equation.In this study,it is proved that this method,which is primarily used in elliptic curves,is provided in line equations that intersect both axes.Then,using this method,an encryption algorithm has been made by connecting the points where the axes are cut to ASCII Character Codes and finding the third point.Thanks to the algorithm,an encryption consisting of two numbers was made for these binary characters by taking binary characters for each character of a secret text.This algorithm has some differences from other algorithms.The first of these is that normal encryption algorithms generate a separate password for each character,while a password is created for two characters in the algorithm.The second difference is that a character can be encoded in infinitely different ways due to the formation of the algorithm.When the software of this algorithm is made,it can be used in every field where Elliptic Curve Algorithm is used.In addition,instead of finding only a third point in encryption with the correct equation,studies can be done to create different algorithms by finding a different number of third points.展开更多
文摘We present the discovery of 18 narrow line Seyfert 1 galaxies (NLS1). The optical spectra show the Balmer lines only slightly broader than the forbidden lines and contain strong Fe Ⅱ emission. No particularly soft X ray spectral slopes can be seen compared to a normal Seyfert 1 galaxies sample.
基金Project supported by National Natural Science Foundation of China (51277064).
文摘Shielding angle is one of the main factors influencing lightning performance of transmission lines,which always stays in the focus of the design and the evaluation of lightning protection.A formula for the improved shielding angle is proposed for evaluating the lightning performance in different terrains.The digital elevation model(DEM) is used to obtain the micro-topography data,such as the slope gradient,slope aspect,etc.The following results are obtained by analyzing the influence of topography factors on the improved shielding angle:(1) improved shielding angle non-linearly increases with the increase of the slope gradient and the slope aspect,(2) improved shielding angle is more sensitive to the slope gradient than to the slope aspect,(3) the improved shielding angle in the mountain terrains is much greater than the designed shielding angle.This may be the reason why the designed shielding angle is limited into the rational range,while the shielding faults occur frequently.
文摘In this study,it is aimed to develop an encryption algorithm by finding a third point based on the line equation and the two points taken on it.In the literature review,a method was found to find the third point based on the two points given on the elliptic curves y2=x3+a·x+b,where a and b are real numbers.However,it has not been found adapted to the correct equation.In this study,it is proved that this method,which is primarily used in elliptic curves,is provided in line equations that intersect both axes.Then,using this method,an encryption algorithm has been made by connecting the points where the axes are cut to ASCII Character Codes and finding the third point.Thanks to the algorithm,an encryption consisting of two numbers was made for these binary characters by taking binary characters for each character of a secret text.This algorithm has some differences from other algorithms.The first of these is that normal encryption algorithms generate a separate password for each character,while a password is created for two characters in the algorithm.The second difference is that a character can be encoded in infinitely different ways due to the formation of the algorithm.When the software of this algorithm is made,it can be used in every field where Elliptic Curve Algorithm is used.In addition,instead of finding only a third point in encryption with the correct equation,studies can be done to create different algorithms by finding a different number of third points.