This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree.Firstly,other programming software is used to perform the middle order traversal,and the plai...This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree.Firstly,other programming software is used to perform the middle order traversal,and the plaintext image is sorted according to the middle order traversal sequence on the permutation.Secondly,the chaotic sequence is generated using the coupled map lattice to set the chaotic interference value.Finally,the XOR operation between the adjacent pixel values of the replacement image is completed to generate the ciphertext matrix.The simulation and experimental results show that the proposed algorithm can resist typical attacks and has good robustness.展开更多
<p align="left"> <span style="font-family:Verdana;">During the model-based software testing process, test cases are generated from modeled requirements to conduct acceptance testing. Ho...<p align="left"> <span style="font-family:Verdana;">During the model-based software testing process, test cases are generated from modeled requirements to conduct acceptance testing. However, existing approaches generate erroneous test cases, lack full coverage criteria and prototype tools. Therefore, the aim of this research is to develop an approach capable of reducing erroneous test case generation based on full coverage criteria and a prototype tool. The method employed was to develop a parser to extract information from the XMI file of a modeling diagram where a tree is constructed and a traversal operation executed on the nodes and edges to generate test cases. The results obtained from the proposed approach showed that 97.35% of the generated test cases were precise and comprehensive enough to conduct testing because 99.01% of all the nodes and edges were fully covered during the traversal operations.</span> </p>展开更多
Binary tree is a very important data structure in computer science. Some major properties are discussed. Both recursive and non-recursive traversal methods of binary tree are discussed in detail. Some improvement...Binary tree is a very important data structure in computer science. Some major properties are discussed. Both recursive and non-recursive traversal methods of binary tree are discussed in detail. Some improvements in programming are proposed.展开更多
This paper presents a new generating criterion for self-similar geometric fractalsDynamic Traversal Criterion (DTC) and the principle to practice it. According to the principle,symbol shifting technique is put forward...This paper presents a new generating criterion for self-similar geometric fractalsDynamic Traversal Criterion (DTC) and the principle to practice it. According to the principle,symbol shifting technique is put forward which can control the traversal symbols dynamically in recursive procession. The Dynamic Traversal Criterion inherits the mechanism for generating self-similar fractals from traditional way and creates more fractal images from one initiator and generator than Static traversal strategy.展开更多
With the increasing complexity of distribution network structures originating from the high penetration of renewable energy and responsive loads,fast and accurate fault location technology for distribution networks is...With the increasing complexity of distribution network structures originating from the high penetration of renewable energy and responsive loads,fast and accurate fault location technology for distribution networks is a prerequisite for rapid isolation of faults and restoration of the power supply.In this paper,a fault location method based on community graph depth-first traversal is proposed for fast location of single-phase ground faults in distribution networks.First,this paper defines the fault graph weight of the vertices in the distribution network graph model,which can be used to reflect the topology of the vertices and fault points as well as the fluctuation of the vertices’currents.Then,the vertices on the graph model are clustered by using an improved parallel louvain method(IPLM).Finally,the community formed by IPLM is used as the smallest unit for depth-first traversal to achieve fast and accurate location of the fault section.The paper develops a distribution network graph model of IEEE 33-bus system on the graph database for testing.And three other methods are selected for comparison with IPLMDF.The test results show that IPLMDF can achieve fast and accurate fault location when half of the nodes in the distribution network are equipped with D-PMUs.When some of the D-PMUs lose time synchronization,it is still possible to locate the fault section,and at the same time,the locating results can be avoided by falling into local optimal solutions.展开更多
Grahne et al. have presented a graph algorithm for evaluating a subset of recursive queries. This method consists of two phases. In the first phase, the method transforms a linear binary-chain program into a set of eq...Grahne et al. have presented a graph algorithm for evaluating a subset of recursive queries. This method consists of two phases. In the first phase, the method transforms a linear binary-chain program into a set of equations over expressions containing predicate symbols. In the second phase, a graph is constructed from the equations and the answers are produced by traversing the relevant paths. A new algorithm is described which requires less time than Grahne’ s. The key idea of the improvement is to reduce the search space that will be traversed when a query is invoked. Further, the evaluation of cyclic data is speeded up by generating most answers directly in terms of the answers already found and the associated 'path information' instead of traversing the corresponding paths as usual. In this way, this algorithm achieves a linear time complexity for both acyclic and most of cyclic data.展开更多
In this paper, an optimal method to handle cyclic and acyclic data relations in the linear recursive queries is proposed. High efficiency is achieved by integrating graph traversal mechanisms into a top-down evaluatio...In this paper, an optimal method to handle cyclic and acyclic data relations in the linear recursive queries is proposed. High efficiency is achieved by integrating graph traversal mechanisms into a top-down evaluation. In such a way the subsumption checks and the identification of cyclic data can be done very efficielltly First, based on the subsumption checks, the search space can be reduced drastically by avoiding any redundant expansion operation. In fact, in the case of non-cyclic data, the proposed algorithm requires only linear time for evaluating a linear recursive query. On the other hand, in the case of cyclic data, by using the technique for isolating strongly connected components a lot of answers can be generated directly in terms of the intermediate results and the relevant path information instead of evaluating them by performing algebraic operations. Since the cost of generating an answer is much less than that of evaluating an answer by algebraic operations, the time consumption for cyclic data can be reduced by an order of magnitude or more.展开更多
With increasing demands of virtual reality(VR) applications, efficient VR rendering techniques are becoming essential. Because VR stereo rendering has increased computational costs to separately render views for the l...With increasing demands of virtual reality(VR) applications, efficient VR rendering techniques are becoming essential. Because VR stereo rendering has increased computational costs to separately render views for the left and right eyes, to reduce the rendering cost in VR applications, we present a novel traversal order for tile-based mobile GPU architectures: Z^2 traversal order. In tile-based mobile GPU architectures,a tile traversal order that maximizes spatial locality can increase GPU cache efficiency. For VR applications, our approach improves upon the traditional Z order curve.We render corresponding screen tiles in left and right views in turn, or simultaneously, and as a result, we can exploit spatial adjacency of the two tiles. To evaluate our approach, we conducted a trace-driven hardware simulation using Mesa and a hardware simulator. Our experimental results show that Z^2 traversal order can reduce external memory bandwidth requirements and increase rendering performance.展开更多
While wormholes are as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. In particular, holding a wormhole open requires a violation of the null...While wormholes are as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. In particular, holding a wormhole open requires a violation of the null energy condition, calling for the existence of exotic matter. The Casimir effect has shown that this physical requirement can be met on a small scale, thereby solving a key conceptual problem. The Casimir effect does not, however, guarantee that the small-scale violation is sufficient for supporting a macroscopic wormhole. The purpose of this paper is to connect the Casimir effect to noncommutative geometry, which also aims to accommodate small-scale effects, the difference being that these can now be viewed as intrinsic properties of spacetime. As a result, the noncommutative effects can be implemented by modifying only the energy momentum tensor in the Einstein field equations, while leaving the Einstein tensor unchanged. The wormhole can therefore be macroscopic in spite of the small Casimir effect.展开更多
The main goal of this paper is to determine the effect of an extra dimension on a traversable wormhole. Here an earlier study by the author [Phys. Rev. D 98, 064041 (2018)] is extended in several significant ways. To ...The main goal of this paper is to determine the effect of an extra dimension on a traversable wormhole. Here an earlier study by the author [Phys. Rev. D 98, 064041 (2018)] is extended in several significant ways. To begin with, the extra spatial dimension is assumed to be time dependent, while the redshift and shape functions, as well as the extra dimension, are functions of both r and l, the respective radial and extra coordinates;the last of these is therefore a function of r, l, and t. The main objective is to determine the conditions that allow the throat of the wormhole to be threaded with ordinary matter (by respecting the null energy condition) and that the same conditions lead to a violation of the null energy condition in the fifth dimension, which is therefore responsible for sustaining the wormhole. The dependence of the extra dimension on l and t is subject to additional conditions that are subsequently analyzed in this paper. Finally, the extra dimension may be extremely small or even curled up.展开更多
To understand the physical meaning of phase time further more, we discuss the reflection phase time of quantum-particles passing though a potential well It is shown that the reflection phase time is equal to the trans...To understand the physical meaning of phase time further more, we discuss the reflection phase time of quantum-particles passing though a potential well It is shown that the reflection phase time is equal to the transmission phase time in value and negative under certain conditions for a square potential well by analyzing While quantum-particles passing through the potential well, we think that this course can be described only with the velocity of energy of quantum mechanics whether or not they are reflected or transmitted eventually展开更多
A binary tree can be represented by a code reflecting the traversal of the corresponding regular binary tree in given monotonic order. A different coding scheme based on the branches of a regular binary tree with n-no...A binary tree can be represented by a code reflecting the traversal of the corresponding regular binary tree in given monotonic order. A different coding scheme based on the branches of a regular binary tree with n-nodes is proposed. It differs from the coding scheme generally used and makes no distinction between internal nodes and terminal nodes. A code of a regular binary tree with nnodes is formed by labeling the left branches by O’s and the right branches by l’s and then traversing these branches in pre-order. Root is always assumed to be on a left branch.展开更多
Web applications have become a widely accepted method to support the internet for the past decade.Since they have been successfully installed in the business activities and there is a requirement of advanced functiona...Web applications have become a widely accepted method to support the internet for the past decade.Since they have been successfully installed in the business activities and there is a requirement of advanced functionalities,the configuration is growing and becoming more complicated.The growing demand and complexity also make these web applications a preferred target for intruders on the internet.Even with the support of security specialists,they remain highly problematic for the complexity of penetration and code reviewing methods.It requires considering different testing patterns in both codes reviewing and penetration testing.As a result,the number of hacked websites is increasing day by day.Most of these vulnerabilities also occur due to incorrect input validation and lack of result validation for lousy programming practices or coding errors.Vulnerability scanners for web applications can detect a few vulnerabilities in a dynamic approach.These are quite easy to use;however,these often miss out on some of the unique critical vulnerabilities in a different and static approach.Although these are time-consuming,they can find complex vulnerabilities and improve developer knowledge in coding and best practices.Many scanners choose both dynamic and static approaches,and the developers can select them based on their requirements and conditions.This research explores and provides details of SQL injection,operating system command injection,path traversal,and cross-site scripting vulnerabilities through dynamic and static approaches.It also examines various security measures in web applications and selected five tools based on their features for scanning PHP,and JAVA code focuses on SQL injection,cross-site scripting,Path Traversal,operating system command.Moreover,this research discusses the approach of a cyber-security tester or a security developer finding out vulnerabilities through dynamic and static approaches using manual and automated web vulnerability scanners.展开更多
This paper presents a novel technique for identifying soil parameters for a wheeled vehicle traversing unknown terrain. The identified soil parameters are required for predicting vehicle drawbar pull and wheel drive t...This paper presents a novel technique for identifying soil parameters for a wheeled vehicle traversing unknown terrain. The identified soil parameters are required for predicting vehicle drawbar pull and wheel drive torque, which in turn can be used for traversability prediction, traction control, and performance optimization of a wheeled vehicle on unknown terrain. The proposed technique is based on the Newton Raphson method. An approximated form of a wheel-soil interaction model based on Composite Simpson's Rule is employed for this purpose. The key soil parameters to be identified are internal friction angle, shear deformation modulus, and lumped pressure-sinkage coefficient. The fourth parameter, cohesion, is not too relevant to vehicle drawbar pull, and is assigned an average value during the identification process. Identified parameters are compared with known values, and shown to be in agreement. The identification method is relatively fast and robust. The identified soil parameters can effectively be used to predict drawbar pull and wheel drive torque with good accuracy. The use of identified soil parameters to design a traversability criterion for wheeled vehicles traversing unknown terrain is presented.展开更多
The magnetically constricted arc technique was implemented to mitigate the heat input related metallurgical problems in Gas Tungsten Arc Welding(GTAW)of Inconel 718 alloy particularly Nb segregation and subsequent lav...The magnetically constricted arc technique was implemented to mitigate the heat input related metallurgical problems in Gas Tungsten Arc Welding(GTAW)of Inconel 718 alloy particularly Nb segregation and subsequent laves phase evolution in fusion zone.This paper reports the direct effect of magnetically constricted arc traverse speed(MCATS)on bead profile,tensile properties and microstructural evolution of Inconel 718 alloy sheets joined by Gas Tungsten Constricted Arc Welding(GTCAW)process.The mechanism amenable for the microstructural modification and corresponding influence on the tensile properties of joints is investigated both in qualitative and quantitative manner related to the mechanics of arc constriction and pulsing.It is correlated to the solidification conditions during welding.The relationship between MCATS and Arc Constriction Current(ACC)was derived.Its interaction effect on the magnetic arc constriction and joint performance was analysed.Results showed that the joints fabricated using CATS of 70 mm/min exhibited superior tensile properties(98.39% of base metal strength with 31.50% elongation).It is attributed to the grain refinement in fusion zone microstructure leading to the evolution of finer,discrete laves phase in interdendritic areas.展开更多
基金Project supported by the National Natural Science Foundation of China(Grant No.61672124)the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund(Grant No.MMJJ20170203)+2 种基金Liaoning Province Science and Technology Innovation Leading Talents Program Project(Grant No.XLYC1802013)Key Research and Development Projects of Liaoning Province,China(Grant No.2019020105-JH2/103)Jinan City‘20 universities’Funding Projects Introducing Innovation Team Program(Grant No.2019GXRC031).
文摘This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree.Firstly,other programming software is used to perform the middle order traversal,and the plaintext image is sorted according to the middle order traversal sequence on the permutation.Secondly,the chaotic sequence is generated using the coupled map lattice to set the chaotic interference value.Finally,the XOR operation between the adjacent pixel values of the replacement image is completed to generate the ciphertext matrix.The simulation and experimental results show that the proposed algorithm can resist typical attacks and has good robustness.
文摘<p align="left"> <span style="font-family:Verdana;">During the model-based software testing process, test cases are generated from modeled requirements to conduct acceptance testing. However, existing approaches generate erroneous test cases, lack full coverage criteria and prototype tools. Therefore, the aim of this research is to develop an approach capable of reducing erroneous test case generation based on full coverage criteria and a prototype tool. The method employed was to develop a parser to extract information from the XMI file of a modeling diagram where a tree is constructed and a traversal operation executed on the nodes and edges to generate test cases. The results obtained from the proposed approach showed that 97.35% of the generated test cases were precise and comprehensive enough to conduct testing because 99.01% of all the nodes and edges were fully covered during the traversal operations.</span> </p>
文摘Binary tree is a very important data structure in computer science. Some major properties are discussed. Both recursive and non-recursive traversal methods of binary tree are discussed in detail. Some improvements in programming are proposed.
文摘This paper presents a new generating criterion for self-similar geometric fractalsDynamic Traversal Criterion (DTC) and the principle to practice it. According to the principle,symbol shifting technique is put forward which can control the traversal symbols dynamically in recursive procession. The Dynamic Traversal Criterion inherits the mechanism for generating self-similar fractals from traditional way and creates more fractal images from one initiator and generator than Static traversal strategy.
基金supported by the National Natural Science Foundation of China (Grant Nos.52009106,51779206)the National Key R&D Program of China (No.2018YFB1500800)the Natural Science Fund Youth Project of Shaanxi Province (2019J-130).
文摘With the increasing complexity of distribution network structures originating from the high penetration of renewable energy and responsive loads,fast and accurate fault location technology for distribution networks is a prerequisite for rapid isolation of faults and restoration of the power supply.In this paper,a fault location method based on community graph depth-first traversal is proposed for fast location of single-phase ground faults in distribution networks.First,this paper defines the fault graph weight of the vertices in the distribution network graph model,which can be used to reflect the topology of the vertices and fault points as well as the fluctuation of the vertices’currents.Then,the vertices on the graph model are clustered by using an improved parallel louvain method(IPLM).Finally,the community formed by IPLM is used as the smallest unit for depth-first traversal to achieve fast and accurate location of the fault section.The paper develops a distribution network graph model of IEEE 33-bus system on the graph database for testing.And three other methods are selected for comparison with IPLMDF.The test results show that IPLMDF can achieve fast and accurate fault location when half of the nodes in the distribution network are equipped with D-PMUs.When some of the D-PMUs lose time synchronization,it is still possible to locate the fault section,and at the same time,the locating results can be avoided by falling into local optimal solutions.
文摘Grahne et al. have presented a graph algorithm for evaluating a subset of recursive queries. This method consists of two phases. In the first phase, the method transforms a linear binary-chain program into a set of equations over expressions containing predicate symbols. In the second phase, a graph is constructed from the equations and the answers are produced by traversing the relevant paths. A new algorithm is described which requires less time than Grahne’ s. The key idea of the improvement is to reduce the search space that will be traversed when a query is invoked. Further, the evaluation of cyclic data is speeded up by generating most answers directly in terms of the answers already found and the associated 'path information' instead of traversing the corresponding paths as usual. In this way, this algorithm achieves a linear time complexity for both acyclic and most of cyclic data.
文摘In this paper, an optimal method to handle cyclic and acyclic data relations in the linear recursive queries is proposed. High efficiency is achieved by integrating graph traversal mechanisms into a top-down evaluation. In such a way the subsumption checks and the identification of cyclic data can be done very efficielltly First, based on the subsumption checks, the search space can be reduced drastically by avoiding any redundant expansion operation. In fact, in the case of non-cyclic data, the proposed algorithm requires only linear time for evaluating a linear recursive query. On the other hand, in the case of cyclic data, by using the technique for isolating strongly connected components a lot of answers can be generated directly in terms of the intermediate results and the relevant path information instead of evaluating them by performing algebraic operations. Since the cost of generating an answer is much less than that of evaluating an answer by algebraic operations, the time consumption for cyclic data can be reduced by an order of magnitude or more.
文摘With increasing demands of virtual reality(VR) applications, efficient VR rendering techniques are becoming essential. Because VR stereo rendering has increased computational costs to separately render views for the left and right eyes, to reduce the rendering cost in VR applications, we present a novel traversal order for tile-based mobile GPU architectures: Z^2 traversal order. In tile-based mobile GPU architectures,a tile traversal order that maximizes spatial locality can increase GPU cache efficiency. For VR applications, our approach improves upon the traditional Z order curve.We render corresponding screen tiles in left and right views in turn, or simultaneously, and as a result, we can exploit spatial adjacency of the two tiles. To evaluate our approach, we conducted a trace-driven hardware simulation using Mesa and a hardware simulator. Our experimental results show that Z^2 traversal order can reduce external memory bandwidth requirements and increase rendering performance.
文摘While wormholes are as good a prediction of Einstein’s theory as black holes, they are subject to severe restrictions from quantum field theory. In particular, holding a wormhole open requires a violation of the null energy condition, calling for the existence of exotic matter. The Casimir effect has shown that this physical requirement can be met on a small scale, thereby solving a key conceptual problem. The Casimir effect does not, however, guarantee that the small-scale violation is sufficient for supporting a macroscopic wormhole. The purpose of this paper is to connect the Casimir effect to noncommutative geometry, which also aims to accommodate small-scale effects, the difference being that these can now be viewed as intrinsic properties of spacetime. As a result, the noncommutative effects can be implemented by modifying only the energy momentum tensor in the Einstein field equations, while leaving the Einstein tensor unchanged. The wormhole can therefore be macroscopic in spite of the small Casimir effect.
文摘The main goal of this paper is to determine the effect of an extra dimension on a traversable wormhole. Here an earlier study by the author [Phys. Rev. D 98, 064041 (2018)] is extended in several significant ways. To begin with, the extra spatial dimension is assumed to be time dependent, while the redshift and shape functions, as well as the extra dimension, are functions of both r and l, the respective radial and extra coordinates;the last of these is therefore a function of r, l, and t. The main objective is to determine the conditions that allow the throat of the wormhole to be threaded with ordinary matter (by respecting the null energy condition) and that the same conditions lead to a violation of the null energy condition in the fifth dimension, which is therefore responsible for sustaining the wormhole. The dependence of the extra dimension on l and t is subject to additional conditions that are subsequently analyzed in this paper. Finally, the extra dimension may be extremely small or even curled up.
文摘To understand the physical meaning of phase time further more, we discuss the reflection phase time of quantum-particles passing though a potential well It is shown that the reflection phase time is equal to the transmission phase time in value and negative under certain conditions for a square potential well by analyzing While quantum-particles passing through the potential well, we think that this course can be described only with the velocity of energy of quantum mechanics whether or not they are reflected or transmitted eventually
文摘A binary tree can be represented by a code reflecting the traversal of the corresponding regular binary tree in given monotonic order. A different coding scheme based on the branches of a regular binary tree with n-nodes is proposed. It differs from the coding scheme generally used and makes no distinction between internal nodes and terminal nodes. A code of a regular binary tree with nnodes is formed by labeling the left branches by O’s and the right branches by l’s and then traversing these branches in pre-order. Root is always assumed to be on a left branch.
基金The author swould like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under Project Number No-R-14xx-4x.
文摘Web applications have become a widely accepted method to support the internet for the past decade.Since they have been successfully installed in the business activities and there is a requirement of advanced functionalities,the configuration is growing and becoming more complicated.The growing demand and complexity also make these web applications a preferred target for intruders on the internet.Even with the support of security specialists,they remain highly problematic for the complexity of penetration and code reviewing methods.It requires considering different testing patterns in both codes reviewing and penetration testing.As a result,the number of hacked websites is increasing day by day.Most of these vulnerabilities also occur due to incorrect input validation and lack of result validation for lousy programming practices or coding errors.Vulnerability scanners for web applications can detect a few vulnerabilities in a dynamic approach.These are quite easy to use;however,these often miss out on some of the unique critical vulnerabilities in a different and static approach.Although these are time-consuming,they can find complex vulnerabilities and improve developer knowledge in coding and best practices.Many scanners choose both dynamic and static approaches,and the developers can select them based on their requirements and conditions.This research explores and provides details of SQL injection,operating system command injection,path traversal,and cross-site scripting vulnerabilities through dynamic and static approaches.It also examines various security measures in web applications and selected five tools based on their features for scanning PHP,and JAVA code focuses on SQL injection,cross-site scripting,Path Traversal,operating system command.Moreover,this research discusses the approach of a cyber-security tester or a security developer finding out vulnerabilities through dynamic and static approaches using manual and automated web vulnerability scanners.
基金This work was supported in part by the EPSRC (No.GR/S31402/01).
文摘This paper presents a novel technique for identifying soil parameters for a wheeled vehicle traversing unknown terrain. The identified soil parameters are required for predicting vehicle drawbar pull and wheel drive torque, which in turn can be used for traversability prediction, traction control, and performance optimization of a wheeled vehicle on unknown terrain. The proposed technique is based on the Newton Raphson method. An approximated form of a wheel-soil interaction model based on Composite Simpson's Rule is employed for this purpose. The key soil parameters to be identified are internal friction angle, shear deformation modulus, and lumped pressure-sinkage coefficient. The fourth parameter, cohesion, is not too relevant to vehicle drawbar pull, and is assigned an average value during the identification process. Identified parameters are compared with known values, and shown to be in agreement. The identification method is relatively fast and robust. The identified soil parameters can effectively be used to predict drawbar pull and wheel drive torque with good accuracy. The use of identified soil parameters to design a traversability criterion for wheeled vehicles traversing unknown terrain is presented.
基金funded by Indian Space Research Organization (ISRO) India. Project No. ISRO/RES/3/728/16e17
文摘The magnetically constricted arc technique was implemented to mitigate the heat input related metallurgical problems in Gas Tungsten Arc Welding(GTAW)of Inconel 718 alloy particularly Nb segregation and subsequent laves phase evolution in fusion zone.This paper reports the direct effect of magnetically constricted arc traverse speed(MCATS)on bead profile,tensile properties and microstructural evolution of Inconel 718 alloy sheets joined by Gas Tungsten Constricted Arc Welding(GTCAW)process.The mechanism amenable for the microstructural modification and corresponding influence on the tensile properties of joints is investigated both in qualitative and quantitative manner related to the mechanics of arc constriction and pulsing.It is correlated to the solidification conditions during welding.The relationship between MCATS and Arc Constriction Current(ACC)was derived.Its interaction effect on the magnetic arc constriction and joint performance was analysed.Results showed that the joints fabricated using CATS of 70 mm/min exhibited superior tensile properties(98.39% of base metal strength with 31.50% elongation).It is attributed to the grain refinement in fusion zone microstructure leading to the evolution of finer,discrete laves phase in interdendritic areas.