首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Spectral optical techniques are combined to characterise the distribution of large-molecule soot precursors, nanoparticles of organic carbon, and soot in two turbulent non-premixed ethylene flames with differing residence times. Laser-induced fluorescence, laser-induced incandescence and light scattering are used to define distributions across the particle size distribution. From the scattering and laser-induced emission measurements it appears that two classes of particles are formed. The first ones are preferentially formed in the fuel-rich region of the flame closer to the nozzle, have sizes of the order of few nanometers but are not fully solid particles, because the constituent molecules still maintain their individual identity exhibiting strong broadband fluorescence in the UV. The second class of particles constituted by solid particles, with sizes of the order of tens of nanometers are able to absorb a sufficient number of photons to be heated to incandescent temperatures. These larger particles are formed at larger residence times in the flame since they are the result of slow growth processes such as coagulation or carbonization. The flames are also modeled in order to produce mixture fraction maps. A new discovery is that nanoparticles of organic carbon concentration, unlike soot, does correlate well with mixture fraction, independent of position in the flame. This is likely to be a significant benefit to future modelling of soot inception processes in turbulent non-premixed flames.  相似文献   

2.
Target tracking technology that is based on aerial videos is widely used in many fields; however, this technology has challenges, such as image jitter, target blur, high data dimensionality, and large changes in the target scale. In this paper, the research status of aerial video tracking and the characteristics, background complexity and tracking diversity of aerial video targets are summarized. Based on the findings, the key technologies that are related to tracking are elaborated according to the target type, number of targets and applicable scene system. The tracking algorithms are classified according to the type of target, and the target tracking algorithms that are based on deep learning are classified according to the network structure. Commonly used aerial photography datasets are described, and the accuracies of commonly used target tracking methods are evaluated in an aerial photography dataset, namely, UAV123, and a long-video dataset, namely, UAV20L. Potential problems are discussed, and possible future research directions and corresponding development trends in this field are analyzed and summarized.  相似文献   

3.
杨静  王川  张茹 《中国物理 B》2010,19(11):110311-110311
An improved quantum secure direct communication (QSDC) protocol is proposed in this paper.Blocks of entangled photon pairs are transmitted in two steps in which secret messages are transmitted directly.The single logical qubits and unitary operations under decoherence free subspaces are presented and the generalized Bell states are constructed which are immune to the collective noise.Two steps of qubit transmission are used in this protocol to guarantee the security of communication.The security of the protocol against various attacks are discussed.  相似文献   

4.
The results of Monte Carlo simulations of xenon monolayers deposited on graphite are presented. Systems of various surface densities and in a wide range of temperatures are investigated. The results are compared to the experimental data and to the previous results for nitrogen. The results of simulations are in good agreement with the experimental ones and confirm that melting in two dimensions is vacancy-driven. Typical real-space configurations of Xe atoms and calculated specific heat results are shown.  相似文献   

5.
Linear and nonlinear electrostatic waves in unmagnetized electron-positron-ion (e-p-i) plasmas are studied. The electrons and positrons are assumed to be isothermal and dynamic while ions are considered to be stationary to neutralize the plasma background only. It is found that both upper (fast) and lower (slow) Langmuir waves can propagates in such a type of pair (e-p) plasma in the presence of ions. The small amplitude electrostatic Korteweg-de Vries (KdV) solitons are also obtained using reductive perturbation method. The electrostatic potential hump structures are found to exist when the temperature of the electrons is larger than the positrons, while the electrostatic potential dips are obtained in the reverse temperature conditions for electrons and positrons in e-p-i plasmas. The numerical results are also shown for illustration. The effects of different ion concentration and temperature ratios of electrons and positrons, on the formation of nonlinear electrostatic potential structures in e-p-i plasmas are also discussed.  相似文献   

6.
As borders between different entities, lines are an important element of natural images. Indeed, the neurons of the mammalian visual cortex are tuned to respond best to lines of a given orientation. This preferred orientation varies continuously across most of the cortex, but also has vortex-like singularities known as pinwheels. In attempting to describe such patterns of orientation preference, we are led to consider underlying rotation symmetries: Oriented segments in natural images tend to be collinear; neurons are more likely to be connected if their preferred orientations are aligned to their topographic separation. These are indications of a reduced symmetry requiring joint rotations of both orientation preference and the underlying topography. This is verified by direct statistical tests in both natural images and in cortical maps. Using the statistics of natural scenes we construct filters that are best suited to extracting information from such images, and find qualitative similarities to mammalian vision. PACS84.35+i 89.70.+c 87.57.Nk  相似文献   

7.
S Sindhu  C S Menon 《Pramana》1996,47(6):435-445
Expressions for the higher order elastic constants are derived using the sublattice displacements to the second degree in strains. These expressions are used to obtain the higher order elastic constants and their pressure derivatives in gadolinium. The higher order elastic constants are used to find out the generalized Gruneisen parameters of the elastic waves propagating in different directions in gadolinium. The Brugger gammas are evaluated and the low temperature limit of the Gruneisen gamma is obtained. The results are compared with the available reported values.  相似文献   

8.
利用基于密度泛函理论的第一性原理计算,本文研究了二十面体硼化砷(B12As2)在外部静水压强0~30 GPa范围内的晶格结构变化.计算结果表明:二中心B-B键在高压下压缩率最大,硼二十面体基团相对比较稳定,外界压力对其影响较小.利用基于密度泛函微扰理论的计算,本文给出了在0~30 GPa范围内B12As2晶体所有12个...  相似文献   

9.
N.G. Nagaveni 《Phase Transitions》2013,86(12):1227-1240
The first examples of V-shaped liquid crystalline materials made of non-symmetrical molecules are reported. They belong to a homologous series of azo substituted compounds, wherein the two arms attached to the 1,2-positions of the benzene ring are different. The new compounds are characterised by the spectroscopic methods. The liquid crystalline properties are investigated using polarising optical microscopy, differential scanning calorimetry and X-ray diffraction studies. All the compounds synthesised here are found to be liquid crystalline. They exhibit nematic and smectic A mesophases, which are uniaxial in nature. The preliminary qualitative experiments showed that the compounds are photosensitive. Based on the X-ray results, the molecular arrangement of these compounds in their mesophases is illustrated. A relationship between molecular structures to mesomorphic properties in such systems has also been predicted.  相似文献   

10.
11.
Rapid granular flows are far-from-equilibrium-driven dissipative systems where the interaction between the particles dissipates energy, and so a continuous supply of energy is required to agitate the particles and facilitate the rearrangement required for the flow. This is in contrast to flows of molecular fluids, which are usually close to equilibrium, where the molecules are agitated by thermal fluctuations. Sheared granular flows form a class of flows where the energy required for agitating the particles in the flowing state is provided by the mean shear. These flows have been studied using the methods of kinetic theory of gases, where the particles are treated in a manner similar to molecules in a molecular gas, and the interactions between particles are treated as instantaneous energy-dissipating binary collisions. The validity of the assumptions underlying kinetic theory, and their applicability to the idealistic case of dilute sheared granular flows are first discussed. The successes and challenges for applying kinetic theory for realistic dense sheared granular flows are then summarised.  相似文献   

12.
The methods of separated or successive oscillatory fields (often called Ramsey methods) are described for radio, microwave and optical coherent radiation. The methods are initially described qualitatively. The quantitative theories of the methods are also given. For a two-level system at radio frequencies exact expressions for the transition probability amplitudes for an arbitrary number of successive oscillatory regions can be found in terms of products of successive transformation matrices. The expressions are greatly simplified if the oscillatory-field regions are very short. If there are only two oscillatory-field regions the situation is similar to a Young's two-slit interference pattern except that the two paths are separated in spin space rather than normal space. Some results from more than two oscillatory regions are discussed. The extensions of the methods and the theories to optical frequencies are described. The advantages and disadvantages of the methods are given as are the many extensions of the method beyond the original concept.I am honored to write an article in celebration of the sixtieth birthday of Herbert Walther. He has established one of the world's best atomic-physics laboratories and has made great contributions to physics, ranging from precision spectroscopy and laser cooling to measurements of fundamental atomic and quantum properties. He has also been a helpful consultant, adviser, and friend to many of us in the field. Happy birthday!!  相似文献   

13.
An encoding method is used to encrypt the Fourier-transformed information of a hidden (covert) digital image in an overt image, while the Fourier-transformed information must be encoded with binary codes. All of the pixels in an overt image are classified into five groups that are called identification, type, tracing, dimension, and information codes. Identification codes are used to judge if the overt image contains codes that belong to the proposed encoding method or not; type codes are used to judge the encoding type; tracing codes are used to judge the encoding trace; dimension codes are used to judge the size of the hidden information; and information codes are used to decode the hidden information. Applying the proposed encoding method is rather easy, and host images corresponding to overt images are not needed for decoding work. The experiment has demonstrated four types of encoding for the proposed encoding method to reconstruct covert images without any distortion or only with a little distortion.  相似文献   

14.
杨磊  边秀房  潘少鹏  秦敬玉 《物理学报》2012,61(3):36101-036101
与以往试验及模拟计算方法不同,文章利用从头计算分子动力学研究了液态Ga, In及Ga-In合金的偏结构. 发现合金偏双体相关函数gGaGa(r), gInIn(r)的第一峰的位置分别与液态纯Ga和纯In的第一峰 位置接近, gGaIn(r)第一峰位置大于纯Ga和纯In第一峰位置的平均值,说明液态Ga-In合金中异类原子 呈现排斥倾向, Ga-Ga, In-In团簇更容易出现.在纯Ga, 纯In中占据最高含量的1311键对在液态合金中占主导 地位,说明Ga-Ga, In-In团簇共存于液态Ga-In合金中. Voronoi多面体分析发现,随着In含量的增加, 在Ga100-xInx(30 ≤x≤qslant 50 at.% ) 区域内, Ga原子周围主配位数出现突变,由12降为10,证明Ga-Ga和In-In团簇倾向于分离.该研究结果不同于 通常的微观不均匀模型,揭示了液态Ga-In合金中团簇分离的机制.  相似文献   

15.
Microperforated panel absorbers are used in many noise control applications as an alternative to fibrous materials. In the past, perforations were circular in shape. However, perforations are now often pressed or cut into the metal. They are non-circular and are irregular shaped and are difficult to model. A nonlinear least squares data-fitting algorithm is utilized to estimate geometric parameters from measured absorption coefficient data. The circular perforation model proposed by Maa is used in the algorithm. The estimated geometric parameters are then used to calculate transfer impedance with good agreement compared to measured data. The procedure is then used to aid in understanding the effect of manufacturing variations, and dust and fluid contamination on the performance of microperforated panel absorbers.  相似文献   

16.
本文应用MUSIG模型[1]和均一直径模型对某溶液堆台架模型堆芯内气液流动传热进行了数值模拟.在MUSIG模型中堆芯内离散相气泡被分为5组不同直径的气泡,用于分析堆芯内气泡的流动变化和大小分布,采用Luo and Svendsen[2]和Prince and Blanch[3]模型描述不同直径气泡组间的破裂和聚合.在均一直径模型中,堆芯内的气体被考虑为同一直径的组分,并且不考虑其破裂与聚合现象.计算得到采用两个模型的模拟结果并且对其进行了对比研究.结果显示应用MUSIG模型的计算结果与台架实验结果吻合更好.  相似文献   

17.
Scattering characteristics of two plane waves are investigated for a circular cylinder covered by a dielectric substance. Fields are assumed to be transverse magnetic (TM) and represented in an exponential series form. The diffracted radiations are found by applying the boundary conditions to the wave functions. The wave transformation method and the orthogonality of the exponential functions are respectively employed to obtain an infinite series in the solution. Numerical results are evaluated by reducing the infinite series to a finite number of terms and comparing estimates with the single plane wave scattering situation.  相似文献   

18.
The longitudinal response functions are used to generalize the dispersion properties of electron acoustic waves (EAWs) in the presence of quantum recoil, for isotropic, non‐relativistic, degenerate/non‐degenerate plasmas. In order to study the EAWs, the constituents of non‐degenerate (thermal) plasma are considered to be of two groups of electrons having different number density and temperature, namely the cold electrons and the hot electrons. Similarly in degenerate (Fermi) plasma the two population of electrons are considered to be the thinly populated and the thickly populated electrons. The sparsely populated electrons are termed as cold electrons while the densely populated ones are termed as hot electrons. The ions are stationary which form the neutralizing background. The absorption coefficients for Landau damping with the inclusion of the quantum recoil in both plasmas are calculated and discussed. The results are discussed in the context of laser‐produced plasma.  相似文献   

19.
This paper proposes two measures for the evaluation of permutation techniques used in image encryption. First, a general mathematical framework for describing the permutation phase used in image encryption is presented. Using this framework, six different permutation techniques, based on chaotic and non-chaotic generators, are described. The two new measures are, then, introduced to evaluate the effectiveness of permutation techniques. These measures are (1) Percentage of Adjacent Pixels Count (PAPC) and (2) Distance Between Adjacent Pixels (DBAP). The proposed measures are used to evaluate and compare the six permutation techniques in different scenarios. The permutation techniques are applied on several standard images and the resulting scrambled images are analyzed. Moreover, the new measures are used to compare the permutation algorithms on different matrix sizes irrespective of the actual parameters used in each algorithm. The analysis results show that the proposed measures are good indicators of the effectiveness of the permutation technique.  相似文献   

20.
Recently, there has been enormous development due to advancements in technology. Industries and enterprises are moving towards a digital system, and the oil and gas industries are no exception. There are several threats and risks in digital systems, which are controlled through cyber-security. For the first time in the theory of fuzzy sets, this research analyzes the relationships between cyber-security and cyber-crimes in the oil and gas sectors. The novel concepts of complex intuitionistic fuzzy relations (CIFRs) are introduced. Moreover, the types of CIFRs are defined and their properties are discussed. In addition, an application is presented that uses the Hasse diagram to make a decision regarding the most suitable cyber-security techniques to implement in an industry. Furthermore, the omnipotence of the proposed methods is explained by a comparative study.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号