-
The Effects of Counterparts on the Wear Properties and Surface Microstructure of TC4 Alloy
Issue:
Volume 4, Issue 5-1, October 2015
Pages:
1-5
Received:
12 June 2015
Accepted:
18 June 2015
Published:
14 July 2015
DOI:
10.11648/j.pamj.s.2015040501.11
Downloads:
Views:
Abstract: The wear properties and wear surfaces microstructure of TC4 alloy were studied with GCr15 and SiC counterparts, respectively. The results show that the friction coefficients of TC4 alloy with GCr15 was higher and the mass loss was lower compared with those of SiC. The wear mechanisms of TC4 alloy with GCr15 and SiC could be concluded as grinding abrasion, adhesion abrasion and oxidation abrasion. However, adhesion abrasion and oxidation abrasion mechanisms were predominant with GCr15 counterpart.
Abstract: The wear properties and wear surfaces microstructure of TC4 alloy were studied with GCr15 and SiC counterparts, respectively. The results show that the friction coefficients of TC4 alloy with GCr15 was higher and the mass loss was lower compared with those of SiC. The wear mechanisms of TC4 alloy with GCr15 and SiC could be concluded as grinding ab...
Show More
-
The Higher Derivation of the Hurwitz Zeta-function
Issue:
Volume 4, Issue 5-1, October 2015
Pages:
6-14
Received:
17 June 2015
Accepted:
26 June 2015
Published:
14 July 2015
DOI:
10.11648/j.pamj.s.2015040501.12
Downloads:
Views:
Abstract: In this paper, the Euler-Maclaurin Summation formula was researched, the purpose of research is to promote the application of the Hurwitz Zeta-function ; Combination method of number theory special a function and Euler-Maclaurin Summation Formula was been used ; By three derivatives of the the Euler-Maclaurin Summation formula , three formulas of Hurwitz Zeta-function were been given.
Abstract: In this paper, the Euler-Maclaurin Summation formula was researched, the purpose of research is to promote the application of the Hurwitz Zeta-function ; Combination method of number theory special a function and Euler-Maclaurin Summation Formula was been used ; By three derivatives of the the Euler-Maclaurin Summation formula , three formulas of H...
Show More
-
On the Riesz Sums in Number Theory
Issue:
Volume 4, Issue 5-1, October 2015
Pages:
15-19
Received:
17 June 2015
Accepted:
19 June 2015
Published:
17 July 2015
DOI:
10.11648/j.pamj.s.2015040501.13
Downloads:
Views:
Abstract: The Riesz means, or sometimes typical means, were introduced by M. Riesz and have been studied in connection with summability of Fourier series and of Dirichlet series [8] and [11]. In number-theoretic context, it is the Riesz sum rather than the Riesz mean that has been extensively studied. The Riesz sums appear as long as there appears the G-function. Cf. Remark 1 and [14]. As is shown below, the Riesz sum corresponds to integration while Landau's differencing is an analogue of differentiation. This integration-differentiation aspect has been the driving force of many researches on number-theoretic asymptotic formulas. Ingham's decent treatment [13] of the prime number theorem is one typical example. We state some efficient theorems that give asymptotic formulas for the sums of coefficients of the generating Dirichlet series not necessarily satisfying the functional equation.
Abstract: The Riesz means, or sometimes typical means, were introduced by M. Riesz and have been studied in connection with summability of Fourier series and of Dirichlet series [8] and [11]. In number-theoretic context, it is the Riesz sum rather than the Riesz mean that has been extensively studied. The Riesz sums appear as long as there appears the G-func...
Show More
-
On The Parameter Function Involving Gamma Function and Its Applications
Issue:
Volume 4, Issue 5-1, October 2015
Pages:
20-23
Received:
18 June 2015
Accepted:
11 July 2015
Published:
25 July 2015
DOI:
10.11648/j.pamj.s.2015040501.14
Downloads:
Views:
Abstract: In this paper, the complete monotonic parameter function involving the Gamma function is considered. The necessary and sufficient condition of the parameter f is presented. As an application, two meaningful inequalities of Gamma function are obtained
-
Study on Stable Scanning of Terminal Sensitivity Projectile and Hardware-in-the-Loop Simulation System
Yuan Wei,
Zhang Jianqi,
Feng Yang
Issue:
Volume 4, Issue 5-1, October 2015
Pages:
24-27
Received:
12 June 2015
Accepted:
14 July 2015
Published:
29 July 2015
DOI:
10.11648/j.pamj.s.2015040501.15
Downloads:
Views:
Abstract: In order to study the attitude control and target detectivity of terminal sensitivity projectile during the process of attacking the target, theoretical modeling is firstly conducted for the steady scanning process of terminal sensitivity projectile; on this basis, the core part of terminal sensitivity projectile -- infrared detector is introduced as hardware to hardware-in-the-loop simulation loop with hardware-in-the-loop simulation technology and virtual reality technology, and an analysis is made from the aspects of attacking accuracy, false detection rate and miss rate of terminal sensitivity projectile to verify the performance of such detector and also provide reference for new weapon development in the future
Abstract: In order to study the attitude control and target detectivity of terminal sensitivity projectile during the process of attacking the target, theoretical modeling is firstly conducted for the steady scanning process of terminal sensitivity projectile; on this basis, the core part of terminal sensitivity projectile -- infrared detector is introduced ...
Show More
-
An Approach for Intrusion Detection of IPv6 Network Based on LS-SVM Algorithm
Issue:
Volume 4, Issue 5-1, October 2015
Pages:
28-32
Received:
8 July 2015
Accepted:
14 July 2015
Published:
29 July 2015
DOI:
10.11648/j.pamj.s.2015040501.16
Downloads:
Views:
Abstract: IPv6 has enough IP addresses to solve the problem of lack of IP address space. However, there are many security problems to be concerned. The detection ability of current intrusion detection system is poor when given less priori knowledge. In this paper, we analyze the Least Squares Support Vector Machine (LS-SVM) algorithm and the working process of snort intrusion detection system. And then we study the methods of intrusion detection in IPv6, and use LS-SVM to optimize snort intrusion detection system. Simulation results show that intrusion detection system with LS-SVM has a robust performance and has high detection efficiency
Abstract: IPv6 has enough IP addresses to solve the problem of lack of IP address space. However, there are many security problems to be concerned. The detection ability of current intrusion detection system is poor when given less priori knowledge. In this paper, we analyze the Least Squares Support Vector Machine (LS-SVM) algorithm and the working process ...
Show More
-
Some identities on the Higher-order Daehee and Changhee Numbers
Nian Liang Wang,
Hailong Li
Issue:
Volume 4, Issue 5-1, October 2015
Pages:
33-37
Received:
1 June 2015
Accepted:
16 June 2015
Published:
5 August 2015
DOI:
10.11648/j.pamj.s.2015040501.17
Downloads:
Views:
Abstract: In this note, we shall give an explicit formula for the coefficients of the expansion of given generating function, when that function has an appropriate form, the coefficients can be represented by the higher-order Daehee and Changhee polynomials and numbers of the first kind. By the classical method of comparing the coefficients of the generating function, we show some interesting identities related to the Higher-order Daehee and Changhee numbers.
Abstract: In this note, we shall give an explicit formula for the coefficients of the expansion of given generating function, when that function has an appropriate form, the coefficients can be represented by the higher-order Daehee and Changhee polynomials and numbers of the first kind. By the classical method of comparing the coefficients of the generating...
Show More
-
Emerging Importance of EVs in the Green Grid Era
Fuhuo Li,
S. Galhotra,
S. Kanemitsu
Issue:
Volume 4, Issue 5-1, October 2015
Pages:
38-45
Received:
27 July 2015
Accepted:
28 July 2015
Published:
2 September 2015
DOI:
10.11648/j.pamj.s.2015040501.18
Downloads:
Views:
Abstract: A very plausible picture of the near future–some decades from now–would be the Green Grid Era and the emerging importance of EVs in the spectrum, where by Green Grid we mean the advanced Smart Grid in which essential part of the whole electric power is supplied by distributed generation, i.e. it is generated by renewable energy including solar energy, biogas, geothermal energy, etc. The crucial ingredients in this grid system are enhanced batteries and the participation of EVs in the grid as a pool of electricity. Our primary concern in this paper is the control of EV participation in the Green Grid, and in particular the study of linear systems and elucidation of various state equations in [HHP] etc.
Abstract: A very plausible picture of the near future–some decades from now–would be the Green Grid Era and the emerging importance of EVs in the spectrum, where by Green Grid we mean the advanced Smart Grid in which essential part of the whole electric power is supplied by distributed generation, i.e. it is generated by renewable energy including solar ener...
Show More
-
An Improved Algorithm of Precise Point Cloud Registration
Issue:
Volume 4, Issue 5-1, October 2015
Pages:
46-50
Received:
28 July 2015
Accepted:
16 August 2015
Published:
2 September 2015
DOI:
10.11648/j.pamj.s.2015040501.19
Downloads:
Views:
Abstract: Basing on the application of digital protection of cultural sites, this paper presented a precise algorithm for the multi-resolution point cloud based on sequence iterative. Firstly, based on the synchronous scanning image, a rough registration of the adjacent point cloud can be obtained in an interactive way. Secondly, based on a normal-based algorithm of registration sphere center, the points of sphere surface are filtered from all scanned point cloud data according to the normal data points and the characteristic of viewpoint, and then the center of registration sphere can be calculated accurately and the initial registration of the adjacent point cloud can be obtained by setting Matching Registration Labels mode as the constraint condition. Finally, based on the 3D edge points of the adjacent point cloud from mahalanobis distance calculations, some overlapping images can be eliminated by the way of constantly optimizing the transition matrix in the iteration process. The engineering practice of the Small Wild Goose Pagoda in Tang Dynasty and the Ancient Tomb in Han Dynasty proves that the method is reliable and easy to design and implement and can effectively restrain the accumulative errors of sequence registrations.
Abstract: Basing on the application of digital protection of cultural sites, this paper presented a precise algorithm for the multi-resolution point cloud based on sequence iterative. Firstly, based on the synchronous scanning image, a rough registration of the adjacent point cloud can be obtained in an interactive way. Secondly, based on a normal-based algo...
Show More
-
Optimization and Analysis on Binary Tree Selection Sort Algorithm
Issue:
Volume 4, Issue 5-1, October 2015
Pages:
51-54
Received:
16 July 2015
Accepted:
7 September 2015
Published:
13 January 2016
DOI:
10.11648/j.pamj.s.2015040501.20
Downloads:
Views:
Abstract: With giving the design ideas and the algorithm descriptions in C, the binary tree selection sort algorithm is analyzed and introduced in detail. After the time complexity and the space complexity of the algorithms being analyzed in this paper, the binary tree selection sort algorithm is compared with the simple selection sort algorithm. This paper provides a theoretical basis on algorithm optimization.
Abstract: With giving the design ideas and the algorithm descriptions in C, the binary tree selection sort algorithm is analyzed and introduced in detail. After the time complexity and the space complexity of the algorithms being analyzed in this paper, the binary tree selection sort algorithm is compared with the simple selection sort algorithm. This paper ...
Show More
-
A Logarithmic Derivative of Theta Function and Implication
Yaling Men,
Jiaolian Zhao
Issue:
Volume 4, Issue 5-1, October 2015
Pages:
55-59
Received:
26 June 2015
Accepted:
28 June 2015
Published:
30 June 2016
DOI:
10.11648/j.pamj.s.2015040501.21
Downloads:
Views:
Abstract: In this paper we establish an identity involving logarithmic derivative of theta function by the theory of elliptic functions. Using these identities we introduce Ramanujan’s modular identities, and also re-derive the product identity, and many other new interesting identities.