منابع مشابه
Creep of Al-Sc Microalloys with Rare-Earth Element Additions
Cast and aged Al-Sc microalloys are creep-resistant to 300, due to the blocking of dislocations by nanosize, coherent Al3Sc (L12) precipitates. Rare-earth elements substitute for Sc in these precipitates, leading to a higher number density of smaller precipitates, which have a greater lattice-parameter mismatch with Al than in the Al-Sc binary microalloy. This leads to an improvement in both a...
متن کاملCreep and Creep–Rupture Behavior of Wood-Based Structural Panels
This paper summarizes a cooperative research program between the USDA Forest Service, Forest Products Laboratory (FPL), in Madison, Wisconsin, and Forintek Canada Corp. in Vancouver, British Columbia, Canada. This research program provided detailed creep–rupture and some creep information for composite panel products. Commercially produced plywood, oriented strandboard (OSB), and minimally alig...
متن کاملTransformation-Induced Creep and Creep Recovery of Shape Memory Alloy
If the shape memory alloy is subjected to the subloop loading under the stress-controlled condition, creep and creep recovery can appear based on the martensitic transformation. In the design of shape memory alloy elements, these deformation properties are important since the deflection of shape memory alloy elements can change under constant stress. The conditions for the progress of the marte...
متن کاملCreep Deformation of Ice
Knowledge of the creep properties of ice often is needed in field and theoretical studies of the flow and deformation of glaciers, ice shelves, and ice sheets. Recently many of the icy moons in the solar system have become much better known as a result of the successful deep-space probe missions. An understanding of the physical processes that take place within them requires information about t...
متن کاملCurbing Android Permission Creep
The Android platform has about 130 application level permissions that govern access to resources. The determination of which permissions to request is left solely to the application developer. Users are prompted to approve all application permissions at install time, and permissions are silently enforced at execution time. Although many applications make use of a wide range of permissions, we h...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Geological Magazine
سال: 1909
ISSN: 0016-7568,1469-5081
DOI: 10.1017/s0016756800120709