EXPERIMENTAL STUDY ON WATER CURTAIN FIGHTING FIRE BASED ON INFRARED TECHNIQUE
نویسندگان
چکیده
منابع مشابه
Experimental Study on Water Curtain Fighting Fire Based on Infrared Technique
Infrared radiation is a type of electromagnetic radiation and invisible to human eyes. It is used widely in industrial, scientific, and medical applications. Pool fire is an emergent accident, which emits intense thermal radiation. In order to quantify the performance of water curtain fighting fire, a testing platform is built and experimental studies are carried out. An infrared imager is used...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
A Study on the Multiple UAVs Cooperative Fire Fighting based on Consensus Algorithm
As for multi-uninhabited aerial vehicle cooperative fire fighting problem, a multiuninhabited aerial vehicle cooperative control method was proposed based on consensus algorithm. multi-uninhabited aerial vehicle cooperative control problem was divided into two steps: 1) a multi-uninhabited aerial vehicle arrival simultaneous control strategy under influence of wind field based on consensus algo...
متن کاملmortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولDoS: Fighting Fire with Fire
We consider DoS attacks on servers in which attackers’ requests are indistinguishable from legitimate requests. Most current defenses against this class of attack rely on legitimate users in aggregate having more of some resource (CPU cycles, memory cycles, human attention, etc.) than attackers. A server so defended asks prospective clients to prove their legitimacy by spending some of this res...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Frontiers in Heat and Mass Transfer
سال: 2017
ISSN: 2151-8629
DOI: 10.5098/hmt.8.17