On super-sonic or trans-sonic planar cascade wind tunnel of free jet intermittent type, wind blowing experiments were performed on the typical sections of stator and rotor blades in the last stage of ultra-ultra-criti...On super-sonic or trans-sonic planar cascade wind tunnel of free jet intermittent type, wind blowing experiments were performed on the typical sections of stator and rotor blades in the last stage of ultra-ultra-critical steam turbine with extra-long blade of 1200mm. The influences of attack angle and Mach number on the aerodynamic performances of these sections of the blade profiles were verified, and their operating ranges were also specified.展开更多
A numerical model was proposed to describe the modulus variation of mortar exposed to external sulfate attack and the effectivity was verified by experiments. The model joints statistical evolution of microcracks to e...A numerical model was proposed to describe the modulus variation of mortar exposed to external sulfate attack and the effectivity was verified by experiments. The model joints statistical evolution of microcracks to effective elastic modulus with microcracks and is applied to predict the damage degree of mortar attacked by sulfate. The experimental results show that the model can predict the modulus variation development of the specimen and the microcraks density. The elastic modulus values calculated by the model are consistent with that measured by experiments. The model focuses on nucleation of microcracks and finds that the theoretical results of microcracks number density show a linear growth over time in mortar. Compared with other sulfate attack damage model, this model provides a more suitable damage evolution equation that can be used to analyze the chemically assisted damage.展开更多
The GB/T 27930-2015 protocol is the communication protocol between the non-vehicle-mounted charger and the battery management system (BMS) stipulated by the state. However, as the protocol adopts the way of broadcast ...The GB/T 27930-2015 protocol is the communication protocol between the non-vehicle-mounted charger and the battery management system (BMS) stipulated by the state. However, as the protocol adopts the way of broadcast communication and plaintext to transmit data, the data frame does not contain the source address and the destination address, making the Electric Vehicle (EV) vulnerable to replay attack in the charging process. In order to verify the security problems of the protocol, this paper uses 27,655 message data in the complete charging process provided by Shanghai Thaisen electric company, and analyzes these actual data frames one by one with the program written by C++. In order to enhance the security of the protocol, Rivest-Shamir-Adleman (RSA) digital signature and adding random numbers are proposed to resist replay attack. Under the experimental environment of Eclipse, the normal charging of electric vehicles, RSA digital signature and random number defense are simulated. Experimental results show that RSA digital signature cannot resist replay attack, and adding random numbers can effectively enhance the ability of EV to resist replay attack during charging.展开更多
文摘On super-sonic or trans-sonic planar cascade wind tunnel of free jet intermittent type, wind blowing experiments were performed on the typical sections of stator and rotor blades in the last stage of ultra-ultra-critical steam turbine with extra-long blade of 1200mm. The influences of attack angle and Mach number on the aerodynamic performances of these sections of the blade profiles were verified, and their operating ranges were also specified.
基金Funded by the National Key R&D Program of China(No.2017YFB0309904)the 973 Program of China(No.2015CB655100)
文摘A numerical model was proposed to describe the modulus variation of mortar exposed to external sulfate attack and the effectivity was verified by experiments. The model joints statistical evolution of microcracks to effective elastic modulus with microcracks and is applied to predict the damage degree of mortar attacked by sulfate. The experimental results show that the model can predict the modulus variation development of the specimen and the microcraks density. The elastic modulus values calculated by the model are consistent with that measured by experiments. The model focuses on nucleation of microcracks and finds that the theoretical results of microcracks number density show a linear growth over time in mortar. Compared with other sulfate attack damage model, this model provides a more suitable damage evolution equation that can be used to analyze the chemically assisted damage.
文摘The GB/T 27930-2015 protocol is the communication protocol between the non-vehicle-mounted charger and the battery management system (BMS) stipulated by the state. However, as the protocol adopts the way of broadcast communication and plaintext to transmit data, the data frame does not contain the source address and the destination address, making the Electric Vehicle (EV) vulnerable to replay attack in the charging process. In order to verify the security problems of the protocol, this paper uses 27,655 message data in the complete charging process provided by Shanghai Thaisen electric company, and analyzes these actual data frames one by one with the program written by C++. In order to enhance the security of the protocol, Rivest-Shamir-Adleman (RSA) digital signature and adding random numbers are proposed to resist replay attack. Under the experimental environment of Eclipse, the normal charging of electric vehicles, RSA digital signature and random number defense are simulated. Experimental results show that RSA digital signature cannot resist replay attack, and adding random numbers can effectively enhance the ability of EV to resist replay attack during charging.