نتایج جستجو برای: hardening models

تعداد نتایج: 917592  

2006
V. Tarvainen A. Ranta-Maunus A. Hanhijärvi H. Forsén

Case hardening is a feature of dried wood that causes the wood to deform (cup) after re-sawing and equalising the moisture content. VTT has analysed case hardening with the aid of the simulation model PEO and with experimental drying, conditioning and storage tests. Case hardening cannot be predicted by the moisture content gradient alone. However, the case hardening gap after drying to a high ...

Journal: :IACR Cryptology ePrint Archive 2010
Amir Herzberg Haya Shulman

Practical software hardening schemes are heuristic and are not proven to be secure. One technique to enhance security is robust combiners. An algorithm C is a robust combiner for speci cation S, e.g., privacy, if for any two implementations X and Y , of a cryptographic scheme, the combined scheme C(X, Y ) satis es S provided either X or Y satisfy S. We present the rst robust combiner for softwa...

2012
Ye Tan Kim Kiekens Frank Welkenhuyzen Jean-Pierre Kruth Wim Dewulf

The beam hardening effect is one of the major artifacts of X-ray computed tomography. It not only complicates medical inspection and material analysis, but also influences the accuracy and repeatability of dimensional measurements. Therefore, many efforts have been devoted to develop beam hardening correction methods since the early 1970s. In practice, the combination of hardware filters (pre-f...

2012
L. HU

Constitutive equations for the multiaxial stress-strain behavior of aluminum alloy 5754 sheets were developed, based on crystal plasticity. A Taylor-based polycrystal plasticity model, a tangent formulation of the self-consistent viscoplastic model (VPSC), and an N-site viscoplastic model based on the fast Fourier transform (VPFFT) were used to fit a single slip system hardening law to the avai...

2009
M. J. Starink S. C. Wang

Co-clusters in ternary or higher order metallic alloys are metastable structures involving two or more distinct alloying atoms that retain the structure of the host lattice. A thermodynamic model based on a single interaction energy of dissimilar nearest neighbour interaction energy is presented, and a model for the strengthening due to these co-cluster dimers is derived. The model includes a n...

Journal: :Physical review. E, Statistical, nonlinear, and soft matter physics 2008
Debashish Mukherji Cameron F Abrams

Using molecular dynamics simulations of a generic model, we observe strain hardening in highly cross-linked polymer glasses under tensile deformation. We show that formation of microvoids, without bond breaking, constitutes the microscopic origins of strain hardening. A well-defined functional form is observed for the void size distribution that is consistent with voids in dense equilibrium Len...

2003
V. A. Lubarda D. J. Benson M. A. Meyers

Stress–strain response under constant and variable strain-rate is studied for selected models of inelastic behavior. The derived closed-form solutions for uniaxial loading enable simple evaluation of the strain-rate effects on the material response. The effect of an abrupt change of strain-rate is also examined. Non-Newtonian viscosity which decreases with an increasing strain-rate is incorpora...

Journal: :Microelectronics Reliability 2012
Samuel Nascimento Pagliarini G. G. dos Santos Lirida A. B. Naviner Jean-François Naviner

In this work we introduce a cost-aware methodology for selective hardening of combinational logic cells, which provides a list of the most effective candidates for hardening. Two heuristics are proposed in order to define when selective hardening becomes unfeasible. The methodology and the heuristics are applied to a set of benchmark circuits using costs extracted from an actual standard cell l...

Journal: :CoRR 2014
Emmanuel Dreyfus

This document presents TLS and how to make it secure enough as of 2014 Spring. Of course all the information given here will rot with time. Protocols known as secure will be cracked and will be replaced with better versions. Fortunately we will see that there are ways to assess the current security of your setup, but this explains why you may have to read further from this document to get the u...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید