Function Design of Automatic Vertical Long Tube Inner Wall Rotating Sand-Blasting Machine

2020 ◽  
Vol 2 (3) ◽  
pp. 71-79
Author(s):  
Liu Yi
1921 ◽  
Vol 3 (3supp) ◽  
pp. 283-283
Author(s):  
C. W. Starker
Keyword(s):  

Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


2021 ◽  
Vol 4 (2) ◽  
pp. 31
Author(s):  
Haoxuan Yu ◽  
Shuai Li

With the continuous development of the mining industry, the world’s major mines have gradually entered the intelligent stage. In intelligent underground mines, the operation roads of the underground transportation equipment are very complicated, and the monitoring and control of the underground traffic have become the problems to be solved in the intelligent underground mines. Therefore, on the basis of solving the practical problems of underground mines, the concept paper discusses the possibility of the communication-based train control (CBTC) system being applied to underground mines through the summary and induction of the related literature. As mining engineers, we have proposed the function design for the CBTC system to solve the problems in underground mine rail transportation, but we still need to continue to work hard for the future development of the underground mines. The concept paper serves as a guide to the Tossing out a brick to get a jade gem, and it has implications for the development and the future of underground mine transportation.


Designs ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 31
Author(s):  
Daniel Moran ◽  
Atila Ertas ◽  
Utku Gulbulak

The continued displacement of refugees from their homes and homelands (now greater than 50 million people worldwide) places increased focus and attention on evolving the designs of temporary housing that is available to be provided to the refugee population, especially in rural areas where housing does not already exist and must be constructed in very little time. Complex engineering problems involving social issues, such as this case study, benefit from the use of Integrated Transdisciplinary (TD) Tools (ITDT) to effectively and efficiently address the design questions related to them. The integrated use of TD Tools such as Kano Analysis, KJ Diagrams, Critical to Quality (CTQ), House of Quality (HOQ)/Quality Function Design (QFD), Theory of Inventive Problem Solving (TRIZ), Axiomatic Design (AD), Interpretive Structural Modeling (ISM), and Design Structure Matrix (DSM) through an end-to-end unique design process leads to innovation and elimination of design conflicts for especially complicated design problems. The objective of this study is to examine the design of temporary refugee housing using integrated TD tools mentioned above. This research concludes that the use of the ITDT approach provides an innovative, decoupled design.


Sign in / Sign up

Export Citation Format

Share Document