Suspension-like hardening behavior of HDPE and time-hardening superposition

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TLS hardening

This document presents TLS and how to make it secure enough as of 2014 Spring. Of course all the information given here will rot with time. Protocols known as secure will be cracked and will be replaced with better versions. Fortunately we will see that there are ways to assess the current security of your setup, but this explains why you may have to read further from this document to get the u...

متن کامل

Strain hardening behavior of aluminum alloyed Hadfield steel single crystals

Very high strain hardening coefficients (=G/23) are observed for aluminum-alloyed face-centered cubic Hadfield steel single crystals under tensile loading. Alloying with aluminum suppressed deformation twinning in two of the three crystallographic orientations studied, and transmission electron microscopy results revealed the existence of dense dislocation walls (sheets) along crystallographic ...

متن کامل

Improvement of Mechanical Properties and Work-Hardening Behavior of Intercritically Annealed Dual Phase Steel

The effect of the initial microstructure and intercritical annealing on mechanical properties and work-hardening response of a high-formability low carbon steel were studied. The work-hardening analysis was based on the modified Crussard–Jaoul method. The ferritic-pearlitic sheets showed low strength and high total elongation with the appearance of the yield point phenomenon. The occurrence of ...

متن کامل

Hardening Fingerprinting by Context

Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approaches to near-replica detection methods based on document signatures are particularly attractive due to their scalability to massive document collections and their ability to handle high throughput rates. Their weakness lies...

متن کامل

Hardening & FIPS 140

FIPS 140-2 does not presently have security requirements that cover software-hardening techniques. Software hardening is a method of transforming an executable and associated data into a form that does not easily permit reverse engineering or reconstruction, but that has the identical execution properties of the original software. With software hardening it is possible to embed secret data such...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Rheologica Acta

سال: 2011

ISSN: 0035-4511,1435-1528

DOI: 10.1007/s00397-011-0570-1