Fundamental Research on Explosive Forming : 1st Report, Loading Mechanism

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

In vitro studies of primary explosive blast loading on neurons.

In a military setting, traumatic brain injury (TBI) is frequently caused by blast waves that can trigger a series of neuronal biochemical changes. Although many animal models have been used to study the effects of primary blast waves, elucidating the mechanisms of damage in a whole-animal model is extremely complex. In vitro models of primary blast, which allow for the deconvolution of mechanis...

متن کامل

Stratospheric Loading of Sulfur from Explosive Volcanic Eruptions1

This paper is an attempt to measure our understanding of volcano/atmosphere interactions by comparing a box model of potential volcanogenic aerosol production and removal in the stratosphere with the stratospheric aerosol optical depth over the period of 1979 to 1994. Model results and observed data are in good agreement both in magnitude and removal rates for the two largest eruptions, El Chic...

متن کامل

Report on the 1st Indian Cancer Congress 2013

The 1st Indian Cancer Congress (Delhi, 21-24th Nov) has been a reminder that the world of cancer is not all about the ASCOs and the ECCOs. What made this conference arguably more impactful and important globally than most others, was its relevance not just for India but also for many other emerging and low-income economies. Most cancer patients will live and die far away from high-income system...

متن کامل

1st Annual PKI Research Workshop---Proceedings

This paper focuses upon the security characteristics of cryptographic mobility (CM) solutions. CM solutions allow the roaming user to make use of their cryptographic credentials from any workstation or system that has network connectivity to the appropriate credential server(s), without the need to carry portable software or hardware tokens. While CM implementations have a greater potential for...

متن کامل

1st Annual PKI Research Workshop---Proceedings

This paper contrasts the use of an ID PKI (Public Key Infrastructure) with the use of delegatable, direct authorization. It first addresses some commonly held beliefs about an ID PKI – that you need a good ID certificate to use digital signatures, that the ID certificate should come from a CA that has especially good private key security, that use of the ID certificate allows you to know with w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Transactions of the Japan Society of Mechanical Engineers

سال: 1963

ISSN: 0029-0270,2185-9485

DOI: 10.1299/kikai1938.29.1889