Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Masanori Yasutomi"'
Publikováno v:
Journal of Graphic Science of Japan. 41:117-122
Publikováno v:
Journal of Graphic Science of Japan. 41:139-144
Autor:
Hiroshi An, Yasuhiro Masutani, Koji Mori, Haruyuki Yoshida, Toshihiro Ozasa, Toshio Motoba, Masanori Yasutomi
Publikováno v:
Journal of JSEE. 54:35-40
“Creative Exercise” is one of the most important articles in the course of technology educations at the universities and the colleges. In this paper, some trials for the creative exercises developed in Osaka Electro-Communication University are i
Publikováno v:
Journal of Graphic Science of Japan. 40:17-21
Publikováno v:
Journal of Japan Institute of Light Metals. 49:112-117
To clarify the tool wear mechanism in cutting fiber reinforced metal (FRM), turning three kinds of FRM were carried out. They are two kinds of SiC whisker reinforced Al (A6061) and Al2O3 short fiber reinforced Al (A6061). In cutting them, it is known
Publikováno v:
TRANSACTIONS OF THE JAPAN SOCIETY OF MECHANICAL ENGINEERS Series C. 64:4065-4071
As austempered ductile iron (ADI) has high tensile strength and high hardness, it is expected to be widely used in the future. However, the tool wear in ADI becomes larger than that in the gray cast iron and the tool reaches the tool life in a few mi
Publikováno v:
ICPADS
Reputation aggregation methods in unstructured Peer-to-Peer(P2P) networks are used to evaluate the trustworthiness of participating peers and to combat malicious peer’s behaviors. In the reputation aggregation method, each peer calculates global sc
Publikováno v:
ICDCS Workshops
Peer-to-Peer (P2P) reputation aggregation methods are used to evaluate the trustworthiness of participating peers and to combat dishonest and malicious peer behaviors. The reputation aggregation method is to calculate the global reputation score from
Publikováno v:
NBiS
In P2P networks, there are attacks known as Sybil attacks, where malicious users attempt to gain control over the network by using multiple nodes. To inhibit Sybil attacks, it is effective to set limits on the number of nodes per user. A decentralize
Publikováno v:
Journal of the Japan Institute of Metals. 41:237-243