|
|
|
Changxi Liu, Jun Hu, Zhaonan Yu, Yufei Li, Shengxue Zhao, Qingda Li and Wei Zhang
A fast spraying speed, wide working area, and easy operation are the operational advantages of high-clearance boom sprayers. To address the issue of spray boom mechanical vibration affecting the spraying effect, a double-link trapezoidal boom suspension ...
ver más
|
|
|
|
|
|
|
Haoyu Tai, Yonghua Xia, Xiangrong He, Xuequn Wu, Chen Li, Min Yan, Xiali Kong and Minglong Yang
With the rapid development of the geographic information service industry, point cloud data are widely used in various fields, such as architecture, planning, cultural relics protection, mining engineering, etc. Despite that there are many approaches to ...
ver más
|
|
|
|
|
|
|
Haoliang Wu, Jing Yu, Jiajia Zhou, Weiwen Li and Christopher K. Y. Leung
Conventionally, a soil nail is a piece of steel reinforcement installed inside a hole drilled into the slope and filled with cement paste (CP) grout. Chloride penetration is a major deterioration mechanism of conventional soil nails as the CP grout is ea...
ver más
|
|
|
|
|
|
|
Alexey Pashchenko, Oleksandr Gritsunov, Oksana Babichenko
Pág. 176 - 185
The subject of research in the article is the energy spectrum of a multilayer quantum sized structure with an energy profile of a complex shape. The goal of this work is to study the interaction of quantum-confined and quasi- continuum energy states of p...
ver más
|
|
|
|
|
|
|
Chao Wang, Yajing Zhang, Zheng Wu, Guoxu Zhang, Yiyang Zhang and Linghong Jiang
In this paper, the all-solid dual-concentric-core microstructure fiber (MSF) with ultra-broadband dispersion compensation characteristics is designed. The effects of microstructure fiber structure parameters on dispersion, phase-matching wavelength, and ...
ver más
|
|
|
|
|
|
|
Bhavana Gupta, Vikas Jian, Rajesh Tiwari
Pág. 2570 - 2579
Security is a vital requirement in mobile ad hoc networks to provide secured communication among mobile nodes. Due to different characteristics of MANETS, it creates a number of consequential challenges to its security design. To overcome the challenges,...
ver más
|
|
|
|