期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
确定燃煤锅炉卫燃带敷设面积的一种代数计算方法 被引量:2
1
作者 陈冬林 李慧勇 周臻 《动力工程》 CSCD 北大核心 2006年第5期638-640,675,共4页
沿用锅炉热力计算标准方法中的集总参数方法,建立了炉内火焰与水冷壁管及卫燃带间的换热方程,并据此建立了燃煤锅炉卫燃带敷设面积计算用的代数计算公式,并以一台400 t/h煤粉锅炉为例,用该公式详细分析了煤质特性、卫燃带的热物理参数... 沿用锅炉热力计算标准方法中的集总参数方法,建立了炉内火焰与水冷壁管及卫燃带间的换热方程,并据此建立了燃煤锅炉卫燃带敷设面积计算用的代数计算公式,并以一台400 t/h煤粉锅炉为例,用该公式详细分析了煤质特性、卫燃带的热物理参数、锅炉的运行方式及不投油稳燃负荷对所需卫燃带面积的影响。 展开更多
关键词 动力机械工程 燃煤锅炉 卫燃带敷设面积 代数计算方法
在线阅读 下载PDF
三个二次代数曲面的低次拼接 被引量:5
2
作者 薛长虹 于凯 《成都信息工程学院学报》 2002年第3期218-221,共4页
用计算机代数方法 ,研究了三个二次曲面的光滑拼接 ,给出了二次拼接曲面存在的判别方法 ,及计算拼接曲面的Matlab程序。
关键词 二次代数曲面 代数 拼接曲面 计算代数方法 光滑拼接 MATLAB程序
在线阅读 下载PDF
Some Notes for Toeplitz Matrix 被引量:1
3
作者 LIUShu-qiang ZHANGHe-ruing 《Chinese Quarterly Journal of Mathematics》 CSCD 2004年第3期286-291,共6页
In this paper,we study real symmetric Toeplitz matrices commutable with tridiagonal matrices, present more detailed results than those in [1], and extend them to nonsymmetric Toeplitz matrices. Also, complex Toeplitz ... In this paper,we study real symmetric Toeplitz matrices commutable with tridiagonal matrices, present more detailed results than those in [1], and extend them to nonsymmetric Toeplitz matrices. Also, complex Toeplitz matrices, especially the corresponding matrices of lower order, are discussed. 展开更多
关键词 MATRIX Toeplitz matrix Hermite matrix
在线阅读 下载PDF
Free Transverse Vibration Analysis of an Underwater Launcher Based on Fluid-Structure Interaction
4
作者 Qingyong Niu 《Journal of Marine Science and Application》 2014年第2期178-184,共7页
A pneumatic launcher is theoretically investigated to study its natural transverse vibration in water. Considering the mass effect of the sealing cover, the launcher is simplified as a uniform cantilever beam with a t... A pneumatic launcher is theoretically investigated to study its natural transverse vibration in water. Considering the mass effect of the sealing cover, the launcher is simplified as a uniform cantilever beam with a top point mass. By introducing the boundary and continuity conditions into the motion equation, the natural frequency equation and the mode shape function are derived. An iterative calculation method for added mass is also presented using the velocity potential function to account for the mass effect of the fluid on the launcher. The first 2 order natural frequencies and mode shapes are discussed in external flow fields and both external and internal flow fields. The results show good agreement with both natural frequencies and mode shapes between the theoretical analysis and the FEM studies. Also, the added mass is found to decrease with the increase of the mode shape orders of the launcher. And because of the larger added mass in both the external and internal flow fields than that in only the external flow field, the corresponding natural frequencies of the former are relatively smaller. 展开更多
关键词 underwater launcher free transverse vibration naturalfrequency mode shape added mass fluid-structure interaction
在线阅读 下载PDF
Cryptanalysis of Cryptosystems Based on General Linear Group 被引量:1
5
作者 Jianwei Jia Jinhui Liu Huanguo Zhang 《China Communications》 SCIE CSCD 2016年第6期217-224,共8页
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certai... Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certain mathematical problems on non-commutative algebraic structures until now. In this background, Majid Khan et al.proposed two novel public-key encryption schemes based on large abelian subgroup of general linear group over a residue ring. In this paper we show that the two schemes are not secure. We present that they are vulnerable to a structural attack and that, it only requires polynomial time complexity to retrieve the message from associated public keys respectively. Then we conduct a detailed analysis on attack methods and show corresponding algorithmic description and efficiency analysis respectively. After that, we propose an improvement assisted to enhance Majid Khan's scheme. In addition, we discuss possible lines of future work. 展开更多
关键词 CRYPTOGRAPHY post quantum computational cryptography CRYPTANALYSIS non-abelian algebraic structures linear equations
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部