Reduction of nitrate by zero-valent iron is a highly exergonic reaction that has long been known to occur. Use of scrap iron filings (SIF) as the PRB (Permeable Reactive Barrier) material can be used to recycle certai...Reduction of nitrate by zero-valent iron is a highly exergonic reaction that has long been known to occur. Use of scrap iron filings (SIF) as the PRB (Permeable Reactive Barrier) material can be used to recycle certain by-products, and identify cheaper replacements for expensive conventional PRB materials, especially pure metallic iron. The feasibility of reductive denitrification of nitrate by SIF was studied by batch experiments. Operational parameters such as pH value, SIF dosage and initial concentration of nitrate were investigated. The removal efficiency of nitrate reached 80% under the conditions of pH of 2.5, nitrate initial con- centration of 45 mg/L and SIF dosage of 100 g/L within 4 h. Results indicated that nitrate removal is inversely related to pH. Low pH value condition favors for the nitrate transformation. Different from the results of others who studied nitrate reduction using iron powder, we found that there was a lag time before nitrate reduction occurs, even at low pH. Finally, the possible mechanism of nitrate reduction by Fe0 is discussed.展开更多
In this paper, we deal with the problem of improving backup and recovery performance by compressing redundancies in large disk-based backup system. We analyze some general compression algorithms; evaluate their scalab...In this paper, we deal with the problem of improving backup and recovery performance by compressing redundancies in large disk-based backup system. We analyze some general compression algorithms; evaluate their scalability and applicability. We investigate the distribution features of the redundant data in whole system range, and propose a multi-resolution distributed compression algorithm which can discern duplicated data at granularity of file level, block level or byte level to reduce the redundancy in backup environment. In order to accelerate recovery, we propose a synthetic backup solution which stores data in a recovery-oriented way and can compose the final data in back-end backup server. Experiments show that this algorithm can greatly reduce bandwidth consumption, save storage cost, and shorten the backup and recovery time. We implement these technologies in our product, called H-info backup system, which is capable of achieving over 10x compression ratio in both network utilization and data storage during backup.展开更多
To better understand different users' accessing intentions, a novel clustering and supervising method based on accessing path is presented. This method divides users' interest space to express the distribution...To better understand different users' accessing intentions, a novel clustering and supervising method based on accessing path is presented. This method divides users' interest space to express the distribution of users' interests, and directly to instruct the constructing process of web pages indexing for advanced performance.展开更多
An experimental study on the thermal properties of iron filings and steel-fiber-reinforced concrete for solar/thermal energy storage application is presented in this report. It takes into account the results of measur...An experimental study on the thermal properties of iron filings and steel-fiber-reinforced concrete for solar/thermal energy storage application is presented in this report. It takes into account the results of measurements of thermal conductivity, thermal resistivity, thermal diffusivity and the results of compressive strength, density as well as energy storage capacity calculated from the knowledge of the above measured parameters. The experimental testing method is described as well: based upon the linear heat source theory, it requires the use of a special probe to be inserted into the sample. The experimentation was forwarded to test concrete aggregate mixtures with three different sizes and same quantity of steel fibers;two different quantities of iron filings and one plain concrete. The measurements were carried out from the pouring time of cubic samples and were ended up when hardened conditions were achieved. The results indicate that the steel fibers and iron filings have influence on the thermal and mechanical properties of the concretes tested, thus the iron filings and steel fibers reinforced concrete is suitable for better solar/thermal energy storage due to an increase in storage capacity over plain concrete.展开更多
According to the website of the World Intellectual Property Organization, ZTE filed for 2826 applications in 2011. The company moved up from its No. 2 spot in 2010 The statistics also show consistent growth in the num...According to the website of the World Intellectual Property Organization, ZTE filed for 2826 applications in 2011. The company moved up from its No. 2 spot in 2010 The statistics also show consistent growth in the number of international patents that ZTE has filed over the past five years. The number of patents ZTE filed for grew more than 50 per cent yearonyear in 2011.展开更多
As of January 1,2004,the first critical steps in seekingpatent protection in multiple countries will be easier as aresult of reforms to the international patent filing system.Aseries of reforms to the World Intellectu...As of January 1,2004,the first critical steps in seekingpatent protection in multiple countries will be easier as aresult of reforms to the international patent filing system.Aseries of reforms to the World Intellectual PropertyOrganisation's(WIPO)Patent Cooperation Treaty(PCT),ranging from a new simplified system of designatingcountries in which patent protection is sought to an enhancedsearch and preliminary examination system,will simplify thecomplex procedure of obtaining patent protection in severa...展开更多
The independent LNG(Liquified Nature Gas)containment is widely used for small or medium-sized LNG carrier and ship using LNG as fuels.The common tank pattern includes single-spherical-cylindrical tank and double-spher...The independent LNG(Liquified Nature Gas)containment is widely used for small or medium-sized LNG carrier and ship using LNG as fuels.The common tank pattern includes single-spherical-cylindrical tank and double-spherical-cylindrical tank,which is the key to design the hull structure and its support.The support is designed to connect the hull structure and LNG tank.Its main functions are heat transferring and force loading.This paper focus on the temperature field distribution of hull and its support structure.The thermal boundary conditions are simulated according to the heat transfer action,such as thermal convection,heat conduction and thermal radiation.The method on how to carry out thermal analysis is presented for an independent LNG containment.The case study is carried out with two typical independent LNG tanks.One is a tank with double spherical cylindrical in the LNG carrier,and the other is a tank with single spherical cylindrical on the deck of the ship using LNG as fuels.The result shows the method presented in this paper is a good reference for the structural design with independent LNG containment.展开更多
This article firstly described the related definition and technology of Ajax. Combined with Freemarker template engine with Spring and Hibernate framework technology to generate a page view, put forward the FSH the fr...This article firstly described the related definition and technology of Ajax. Combined with Freemarker template engine with Spring and Hibernate framework technology to generate a page view, put forward the FSH the framework of a complete program, and realize upload with progress bar display.展开更多
Communication security involves all aspects of the country and society,and financial security is of top priority.Through strong supervision and strong technical means,a“semaphore”file exchange station is established...Communication security involves all aspects of the country and society,and financial security is of top priority.Through strong supervision and strong technical means,a“semaphore”file exchange station is established.The data transmission system is composed of a sending server,a receiving server,and a“semaphore”communication box.Physical connections between internal and external networks are eliminated to achieve the purpose of“physical isolation”and“secure file transfer”.展开更多
Big data are always processed repeatedly with small changes, which is a major form of big data processing. The feature of incremental change of big data shows that incremental computing mode can improve the performanc...Big data are always processed repeatedly with small changes, which is a major form of big data processing. The feature of incremental change of big data shows that incremental computing mode can improve the performance greatly. HDFS is a distributed file system on Hadoop which is the most popular platform for big data analytics. And HDFS adopts fixed-size chunking policy, which is inefficient facing incremental computing. Therefore, in this paper, we proposed iHDFS (incremental HDFS), a distributed file system, which can provide basic guarantee for big data parallel processing. The iHDFS is implemented as an extension to HDFS. In iHDFS, Rabin fingerprint algorithm is applied to achieve content defined chunking. This policy make data chunking has much higher stability, and the intermediate processing results can be reused efficiently, so the performance of incremental data processing can be improved significantly. The effectiveness and efficiency of iHDFS have been demonstrated by the experimental results.展开更多
The PAN Hongbin case raised to the academic circles the question of how to connect with the court proceedings after the People’s Congress filed for review.The solution to this problem should focus on the functional p...The PAN Hongbin case raised to the academic circles the question of how to connect with the court proceedings after the People’s Congress filed for review.The solution to this problem should focus on the functional positioning of China’s recording and review system,whether it involves the specific rights of citizens in individual cases.From the actual situation in China,the development trend of the constitutional review systems in various countries in the world,and the attitudes of the National People’s Congress and the academic circle,the protection of civil rights should be one of the functions of record review.According to the relevant provisions of the Legislative Law and the Law on the Supervision of Standing Committees of People’s Congresses at Various Levels,our courts should construct a dual complementary mechanism for review requests from the Supreme People’s Court and review recommendations from local people’s courts at all levels in the litigation process.Meanwhile,according to the retrospective theory of the law,the filing review filed by the parties after the court ’s lawsuit should be retroactive to the parties themselves,and the law should provide for a system to initiate retrial proceedings in this case to relieve the parties’ rights.展开更多
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear...Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.展开更多
Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity,and because of its complexity and evasiveness,it is challenging to identify using traditional signature-based detection a...Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity,and because of its complexity and evasiveness,it is challenging to identify using traditional signature-based detection approaches.The study article discusses the growing danger to cybersecurity that malware hidden in PDF files poses,highlighting the shortcomings of conventional detection techniques and the difficulties presented by adversarial methodologies.The article presents a new method that improves PDF virus detection by using document analysis and a Logistic Model Tree.Using a dataset from the Canadian Institute for Cybersecurity,a comparative analysis is carried out with well-known machine learning models,such as Credal Decision Tree,Naïve Bayes,Average One Dependency Estimator,Locally Weighted Learning,and Stochastic Gradient Descent.Beyond traditional structural and JavaScript-centric PDF analysis,the research makes a substantial contribution to the area by boosting precision and resilience in malware detection.The use of Logistic Model Tree,a thorough feature selection approach,and increased focus on PDF file attributes all contribute to the efficiency of PDF virus detection.The paper emphasizes Logistic Model Tree’s critical role in tackling increasing cybersecurity threats and proposes a viable answer to practical issues in the sector.The results reveal that the Logistic Model Tree is superior,with improved accuracy of 97.46%when compared to benchmark models,demonstrating its usefulness in addressing the ever-changing threat landscape.展开更多
To address the hazardous by-product of zinc smelting and resource utilization of jarosite residue,this study applies an electric field-assisted hot acid treatment to completely recycle iron(Fe).This innovative approac...To address the hazardous by-product of zinc smelting and resource utilization of jarosite residue,this study applies an electric field-assisted hot acid treatment to completely recycle iron(Fe).This innovative approach aims to enhance the leaching efficiency of Fe from jarosite residue.The introduction of an electric field changes the charge distribution on the surface of the particles to enhance ions and electrons exchange and promotes the collision between particles to strengthen reaction kinetics.Based on the above,the leaching efficiency of Fe in jarosite under sulfuric acid attack has improved observably.The result shows that Fe leaching efficiency reaches 98.83%,which is increased by 28%under the optimal experimental conditions:current density of 30 mA·cm^(-2),H_(2)SO_(4) concentration of 1.5 mol·L^(-1),solid-liquid ratio of 70 g·L^(-1),temperature of 80℃ and time of 12 h.Leaching kinetics calculations show that the apparent activation energy is 16.97 kJ·mol^(-1) and the leaching of jarosite residue is controlled by a mixture of chemical reaction and diffusion,as well as the temperature and concentration of the leaching solution have an influence on leaching.This work provides a feasible idea for the efficient leaching of Fe from jarosite residue.展开更多
This work is a simulation model with the LAMMPS calculation code of an electrode based on alkali metal oxides (lithium, sodium and potassium) using the Lennard Jones potential. For a multiplicity of 8*8*8, we studied ...This work is a simulation model with the LAMMPS calculation code of an electrode based on alkali metal oxides (lithium, sodium and potassium) using the Lennard Jones potential. For a multiplicity of 8*8*8, we studied a gap-free model using molecular dynamics. Physical quantities such as volume and pressure of the Na-O and Li-O systems exhibit similar behaviors around the thermodynamic ensembles NPT and NVE. However, for the Na2O system, at a minimum temperature value, we observe a range of total energy values;in contrast, for the Li2O system, a minimum energy corresponds to a range of temperatures. Finally, for physicochemical properties, we studied the diffusion coefficient and activation energy of lithium and potassium oxides around their melting temperatures. The order of magnitude of the diffusion coefficients is given by the relation Dli-O >DNa-O for the multiplicity 8*8*8, while for the activation energy, the order is well reversed EaNa-O > EaLi-O.展开更多
The influence of filling parameters including pouring temperature, filling speed, boost pressure and synchronous pressure on the fatigue of A357 alloy produced by counter pressure plaster casting was studied. The Tagu...The influence of filling parameters including pouring temperature, filling speed, boost pressure and synchronous pressure on the fatigue of A357 alloy produced by counter pressure plaster casting was studied. The Taguchi method was used to investigate the relationship between the fatigue performance and filling parameters. The results show that filling speed is the most significant factor among the four parameters. Synchronous pressures is less influential on the fatigue life when the value of synchronous pressure is from 400 kPa to 600 kPa.展开更多
基金Project (No. 20407015) supported by the National Natural Sci-ence Foundation of China
文摘Reduction of nitrate by zero-valent iron is a highly exergonic reaction that has long been known to occur. Use of scrap iron filings (SIF) as the PRB (Permeable Reactive Barrier) material can be used to recycle certain by-products, and identify cheaper replacements for expensive conventional PRB materials, especially pure metallic iron. The feasibility of reductive denitrification of nitrate by SIF was studied by batch experiments. Operational parameters such as pH value, SIF dosage and initial concentration of nitrate were investigated. The removal efficiency of nitrate reached 80% under the conditions of pH of 2.5, nitrate initial con- centration of 45 mg/L and SIF dosage of 100 g/L within 4 h. Results indicated that nitrate removal is inversely related to pH. Low pH value condition favors for the nitrate transformation. Different from the results of others who studied nitrate reduction using iron powder, we found that there was a lag time before nitrate reduction occurs, even at low pH. Finally, the possible mechanism of nitrate reduction by Fe0 is discussed.
基金Supported by the National Natural Science Foun-dation of China (60473023) the National Innovation Foundationfor Small Technology-Based Firms (04C26214201280)
文摘In this paper, we deal with the problem of improving backup and recovery performance by compressing redundancies in large disk-based backup system. We analyze some general compression algorithms; evaluate their scalability and applicability. We investigate the distribution features of the redundant data in whole system range, and propose a multi-resolution distributed compression algorithm which can discern duplicated data at granularity of file level, block level or byte level to reduce the redundancy in backup environment. In order to accelerate recovery, we propose a synthetic backup solution which stores data in a recovery-oriented way and can compose the final data in back-end backup server. Experiments show that this algorithm can greatly reduce bandwidth consumption, save storage cost, and shorten the backup and recovery time. We implement these technologies in our product, called H-info backup system, which is capable of achieving over 10x compression ratio in both network utilization and data storage during backup.
文摘To better understand different users' accessing intentions, a novel clustering and supervising method based on accessing path is presented. This method divides users' interest space to express the distribution of users' interests, and directly to instruct the constructing process of web pages indexing for advanced performance.
文摘An experimental study on the thermal properties of iron filings and steel-fiber-reinforced concrete for solar/thermal energy storage application is presented in this report. It takes into account the results of measurements of thermal conductivity, thermal resistivity, thermal diffusivity and the results of compressive strength, density as well as energy storage capacity calculated from the knowledge of the above measured parameters. The experimental testing method is described as well: based upon the linear heat source theory, it requires the use of a special probe to be inserted into the sample. The experimentation was forwarded to test concrete aggregate mixtures with three different sizes and same quantity of steel fibers;two different quantities of iron filings and one plain concrete. The measurements were carried out from the pouring time of cubic samples and were ended up when hardened conditions were achieved. The results indicate that the steel fibers and iron filings have influence on the thermal and mechanical properties of the concretes tested, thus the iron filings and steel fibers reinforced concrete is suitable for better solar/thermal energy storage due to an increase in storage capacity over plain concrete.
文摘According to the website of the World Intellectual Property Organization, ZTE filed for 2826 applications in 2011. The company moved up from its No. 2 spot in 2010 The statistics also show consistent growth in the number of international patents that ZTE has filed over the past five years. The number of patents ZTE filed for grew more than 50 per cent yearonyear in 2011.
文摘As of January 1,2004,the first critical steps in seekingpatent protection in multiple countries will be easier as aresult of reforms to the international patent filing system.Aseries of reforms to the World Intellectual PropertyOrganisation's(WIPO)Patent Cooperation Treaty(PCT),ranging from a new simplified system of designatingcountries in which patent protection is sought to an enhancedsearch and preliminary examination system,will simplify thecomplex procedure of obtaining patent protection in severa...
文摘The independent LNG(Liquified Nature Gas)containment is widely used for small or medium-sized LNG carrier and ship using LNG as fuels.The common tank pattern includes single-spherical-cylindrical tank and double-spherical-cylindrical tank,which is the key to design the hull structure and its support.The support is designed to connect the hull structure and LNG tank.Its main functions are heat transferring and force loading.This paper focus on the temperature field distribution of hull and its support structure.The thermal boundary conditions are simulated according to the heat transfer action,such as thermal convection,heat conduction and thermal radiation.The method on how to carry out thermal analysis is presented for an independent LNG containment.The case study is carried out with two typical independent LNG tanks.One is a tank with double spherical cylindrical in the LNG carrier,and the other is a tank with single spherical cylindrical on the deck of the ship using LNG as fuels.The result shows the method presented in this paper is a good reference for the structural design with independent LNG containment.
文摘This article firstly described the related definition and technology of Ajax. Combined with Freemarker template engine with Spring and Hibernate framework technology to generate a page view, put forward the FSH the framework of a complete program, and realize upload with progress bar display.
文摘Communication security involves all aspects of the country and society,and financial security is of top priority.Through strong supervision and strong technical means,a“semaphore”file exchange station is established.The data transmission system is composed of a sending server,a receiving server,and a“semaphore”communication box.Physical connections between internal and external networks are eliminated to achieve the purpose of“physical isolation”and“secure file transfer”.
文摘Big data are always processed repeatedly with small changes, which is a major form of big data processing. The feature of incremental change of big data shows that incremental computing mode can improve the performance greatly. HDFS is a distributed file system on Hadoop which is the most popular platform for big data analytics. And HDFS adopts fixed-size chunking policy, which is inefficient facing incremental computing. Therefore, in this paper, we proposed iHDFS (incremental HDFS), a distributed file system, which can provide basic guarantee for big data parallel processing. The iHDFS is implemented as an extension to HDFS. In iHDFS, Rabin fingerprint algorithm is applied to achieve content defined chunking. This policy make data chunking has much higher stability, and the intermediate processing results can be reused efficiently, so the performance of incremental data processing can be improved significantly. The effectiveness and efficiency of iHDFS have been demonstrated by the experimental results.
基金a phased result of the Research on the Jurisprudence,Operation and Effectiveness of Constitution Publicity,a research project of humanities and social sciences launched by Chongqing Municipal Education Commission. The project No. is 19SKCH017
文摘The PAN Hongbin case raised to the academic circles the question of how to connect with the court proceedings after the People’s Congress filed for review.The solution to this problem should focus on the functional positioning of China’s recording and review system,whether it involves the specific rights of citizens in individual cases.From the actual situation in China,the development trend of the constitutional review systems in various countries in the world,and the attitudes of the National People’s Congress and the academic circle,the protection of civil rights should be one of the functions of record review.According to the relevant provisions of the Legislative Law and the Law on the Supervision of Standing Committees of People’s Congresses at Various Levels,our courts should construct a dual complementary mechanism for review requests from the Supreme People’s Court and review recommendations from local people’s courts at all levels in the litigation process.Meanwhile,according to the retrospective theory of the law,the filing review filed by the parties after the court ’s lawsuit should be retroactive to the parties themselves,and the law should provide for a system to initiate retrial proceedings in this case to relieve the parties’ rights.
基金Deanship of Scientific Research at Majmaah University for supporting this work under Project Number R-2023-811.
文摘Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
基金This research work was funded by Institutional Fund Projects under Grant No.(IFPIP:211-611-1443).
文摘Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity,and because of its complexity and evasiveness,it is challenging to identify using traditional signature-based detection approaches.The study article discusses the growing danger to cybersecurity that malware hidden in PDF files poses,highlighting the shortcomings of conventional detection techniques and the difficulties presented by adversarial methodologies.The article presents a new method that improves PDF virus detection by using document analysis and a Logistic Model Tree.Using a dataset from the Canadian Institute for Cybersecurity,a comparative analysis is carried out with well-known machine learning models,such as Credal Decision Tree,Naïve Bayes,Average One Dependency Estimator,Locally Weighted Learning,and Stochastic Gradient Descent.Beyond traditional structural and JavaScript-centric PDF analysis,the research makes a substantial contribution to the area by boosting precision and resilience in malware detection.The use of Logistic Model Tree,a thorough feature selection approach,and increased focus on PDF file attributes all contribute to the efficiency of PDF virus detection.The paper emphasizes Logistic Model Tree’s critical role in tackling increasing cybersecurity threats and proposes a viable answer to practical issues in the sector.The results reveal that the Logistic Model Tree is superior,with improved accuracy of 97.46%when compared to benchmark models,demonstrating its usefulness in addressing the ever-changing threat landscape.
基金The National Natural Science Foundation of China(22276153,51974262)funded this work。
文摘To address the hazardous by-product of zinc smelting and resource utilization of jarosite residue,this study applies an electric field-assisted hot acid treatment to completely recycle iron(Fe).This innovative approach aims to enhance the leaching efficiency of Fe from jarosite residue.The introduction of an electric field changes the charge distribution on the surface of the particles to enhance ions and electrons exchange and promotes the collision between particles to strengthen reaction kinetics.Based on the above,the leaching efficiency of Fe in jarosite under sulfuric acid attack has improved observably.The result shows that Fe leaching efficiency reaches 98.83%,which is increased by 28%under the optimal experimental conditions:current density of 30 mA·cm^(-2),H_(2)SO_(4) concentration of 1.5 mol·L^(-1),solid-liquid ratio of 70 g·L^(-1),temperature of 80℃ and time of 12 h.Leaching kinetics calculations show that the apparent activation energy is 16.97 kJ·mol^(-1) and the leaching of jarosite residue is controlled by a mixture of chemical reaction and diffusion,as well as the temperature and concentration of the leaching solution have an influence on leaching.This work provides a feasible idea for the efficient leaching of Fe from jarosite residue.
文摘This work is a simulation model with the LAMMPS calculation code of an electrode based on alkali metal oxides (lithium, sodium and potassium) using the Lennard Jones potential. For a multiplicity of 8*8*8, we studied a gap-free model using molecular dynamics. Physical quantities such as volume and pressure of the Na-O and Li-O systems exhibit similar behaviors around the thermodynamic ensembles NPT and NVE. However, for the Na2O system, at a minimum temperature value, we observe a range of total energy values;in contrast, for the Li2O system, a minimum energy corresponds to a range of temperatures. Finally, for physicochemical properties, we studied the diffusion coefficient and activation energy of lithium and potassium oxides around their melting temperatures. The order of magnitude of the diffusion coefficients is given by the relation Dli-O >DNa-O for the multiplicity 8*8*8, while for the activation energy, the order is well reversed EaNa-O > EaLi-O.
文摘The influence of filling parameters including pouring temperature, filling speed, boost pressure and synchronous pressure on the fatigue of A357 alloy produced by counter pressure plaster casting was studied. The Taguchi method was used to investigate the relationship between the fatigue performance and filling parameters. The results show that filling speed is the most significant factor among the four parameters. Synchronous pressures is less influential on the fatigue life when the value of synchronous pressure is from 400 kPa to 600 kPa.