Simulation and Analysis of Thermal Fatigue Based on Imperfection Model of Brake Discs
نویسندگان
چکیده
منابع مشابه
fabrication of new ion sensitive field effect transistors (isfet) based on modification of junction-fet for analysis of hydronium, potassium and hydrazinium ions
a novel and ultra low cost isfet electrode and measurement system was designed for isfet application and detection of hydronium, hydrazinium and potassium ions. also, a measuring setup containing appropriate circuits, suitable analyzer (advantech board), de noise reduction elements, cooling system and pc was used for controlling the isfet electrode and various characteristic measurements. the t...
content analysis of l1 and l2 writing textbooks and the perception analysis of university professors on the influence of english writing expertise on the persian in an efl context
the importance of writing as a complex skill in applied linguistics has drawn the attention of many researchers to evaluate textbooks in order to help learners gain self-sufficiency and autonomy in the field of language use and communication. investigations have shown that developments in textbooks evaluation can promote the quality of pedagogies and consequently the learning. this study attemp...
Analysis of Thermal-Mechanical Coupling of Automotive Disc Brake Based on Numerical Simulation Method
The background and necessity of application of numerical simulation method in research on friction materials of automotive brake are analysed. The numerical analysis methods of conversion of braking energy, distribution of friction heat, transfer of friction heat and thermal mechanical coupling, are discussed. The dynamic temperature field and thermal stress field of the same brake disc and two...
متن کاملthe effect of explicit teaching of metacognitive vocabulary learning strategies on recall and retention of idioms
چکیده ندارد.
15 صفحه اولstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: PAMM
سال: 2009
ISSN: 1617-7061
DOI: 10.1002/pamm.200910239