期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Application of time-temperature superposition method in thermal aging life prediction of shipboard cables
1
作者 邓文东 CHEN Yi-yuan 《Journal of Chongqing University》 CAS 2014年第4期142-150,共9页
The life of shipboard cables will decrease due to the complex aging processes. In terms of the safety perspective, remaining life prediction of the cable is essential to maintain a reliable operation. In this paper, f... The life of shipboard cables will decrease due to the complex aging processes. In terms of the safety perspective, remaining life prediction of the cable is essential to maintain a reliable operation. In this paper, firstly, based on Arrhenius equation, residual life of new styrene-butadiene cable is calculated; result indicates that the degradation rate which changes with time is proportional to thermal temperature. Then second order dynamic model is adopted into the residual life prediction, combined with the time-temperature superposition method(TTSP), and a new residual life model is proposed. According to the accelerated thermal aging experiment data and Arrhenius equation, TTSP method demonstrates to be an efficient way for life prediction, and life at normal temperature can be estimated by this model. In order to monitor the state of styrene-butadiene cable more accurately, an improved residual life model based on equivalent environment temperature of cable is proposed, and life of cable under real operation is analyzed. Result indicates that this model is credible and reliable, and it provides an important theoretical base for residual life of cables. 展开更多
关键词 insulated cable thermal aging Arrhenius equation TTSP residual life
下载PDF
Application Strategy of Data Encryption Technology in Computer Network Security
2
作者 Yuantian Zhang Wei Yang Zhongxi Zhang 《Journal of Electronic Research and Application》 2018年第5期7-10,共4页
In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network... In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network security practice,which promotes the safe and reliable operation of the computer network to a certain extent.Based on this,our article regards data encryption technology as the main research object,focusing on its specific application in computer network security. 展开更多
关键词 COMPUTER NETWORK SECURITY DATA ENCRYPTION technology application STRATEGY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部