期刊文献+
共找到3,256篇文章
< 1 2 163 >
每页显示 20 50 100
Public-Key Function-Private Inner-Product Predicate Encryption from Pairings
1
作者 WAN Ming WANG Geng GU Da-Wu 《密码学报(中英文)》 北大核心 2025年第1期227-246,共20页
This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals noth... This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals nothing about the predicate f,as long as f is drawn from an evasive distribution with sufficient entropy.The proposed scheme extends the group-based public-key function-private predicate encryption(FP-PE)for“small superset predicates”proposed by Bartusek et al.(Asiacrypt 19),to the setting of inner-product predicates.This is the first construction of public-key FP-PE with enhanced function privacy security beyond the equality predicates,which is previously proposed by Boneh et al.(CRYPTO 13).The proposed construction relies on bilinear groups,and the security is proved in the generic bilinear group model. 展开更多
关键词 predicate encryption function privacy inner product generic group model
在线阅读 下载PDF
Advancing Code Obfuscation: Novel Opaque Predicate Techniques to Counter Dynamic Symbolic Execution
2
作者 Yan Cao Zhizhuang Zhou Yan Zhuang 《Computers, Materials & Continua》 2025年第7期1545-1565,共21页
Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are w... Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are widely used to increase control-flow complexity.However,traditional opaque predicates are increasingly vulnerable to Dynamic Symbolic Execution(DSE)attacks,which can efficiently identify and eliminate them.To address this issue,this paper proposes a novel approach for anti-DSE opaque predicates that effectively resists symbolic execution-based deobfuscation.Our method introduces two key techniques:single-way function opaque predicates,which leverage hash functions and logarithmic transformations to prevent constraint solvers from generating feasible inputs,and path-explosion opaque predicates,which generate an excessive number of execution paths,overwhelming symbolic execution engines.To evaluate the effectiveness of our approach,we implemented a prototype obfuscation tool and tested it against prominent symbolic execution engines.Experimental results demonstrate that our approach signifi-cantly increases resilience against symbolic execution attacks while maintaining acceptable performance overhead.This paper provides a robust and scalable obfuscation technique,contributing to the enhancement of software protection strategies in adversarial environments. 展开更多
关键词 Dynamic symbolic execution opaque predicates code obfuscation
在线阅读 下载PDF
Analysis and modeling of web services flow using π-calculus
3
作者 何涛 缪淮扣 钱忠胜 《Journal of Southeast University(English Edition)》 EI CAS 2006年第3期315-318,共4页
In order to increase the effectiveness and the reliability of web services flow, the ~r-calculus formal method is introduced as a development language for web services flow. The π-calculus overcomes inabilities of we... In order to increase the effectiveness and the reliability of web services flow, the ~r-calculus formal method is introduced as a development language for web services flow. The π-calculus overcomes inabilities of web service flow languages in demonstrating the consistency, validating the correctness and so on. The π- calculus analysis and modeling of web services flow is presented, the dynamic actions and basic activities of WS-BPEL with π-calculus formally are described, and the mapping from π-calculus expression to WS-BPEL is built. The basic construction of web services flow with the π-calculus method after the analysis of the syntax of WS-BPEL and inter-description between WS-BPEL and π-calculus is expressed. Also discussed are the approaches to web services flow by modeling from different views, and the proposed approaches through the development and modeling of an e-commerce web service flow application are illustrated. 展开更多
关键词 business process execution language (BPEL) web services work flow Π-calculus
在线阅读 下载PDF
英藏“谓语”比较与英文教学中Predicate一词藏译略考
4
作者 阿努 赤列德吉 《海外英语》 2016年第3期177-178,共2页
我区实施"藏汉英三语"教育可谓喜忧参半,拉萨等城市虽取得显著成效,而偏远农牧区的藏族学生却因作为英文课堂媒介语的汉语基础薄弱,英文学习效果欠佳。因此,英藏双语的直接对比研究的缺乏,是导致农牧区英文教育处境艰难的重... 我区实施"藏汉英三语"教育可谓喜忧参半,拉萨等城市虽取得显著成效,而偏远农牧区的藏族学生却因作为英文课堂媒介语的汉语基础薄弱,英文学习效果欠佳。因此,英藏双语的直接对比研究的缺乏,是导致农牧区英文教育处境艰难的重要原因。该文以英文教学为主体,旨在通过对英藏基础句法中"Predicate"一词的直接对比和语法术语的藏译探讨,望能解决农牧区藏族学生英文教学中的理解困扰。 展开更多
关键词 英藏 谓语 比较 教学 predicate 藏译
在线阅读 下载PDF
英语谓语(Predicate)的概念功能
5
作者 桂永霞 《宜春学院学报》 2013年第4期136-138,共3页
将谓语定义为"限定成分+谓体"。谓语动词具有概念功能、人际功能和语篇功能。本文只讨论谓语动词的概念功能。谓语动词的概念功能体现在及物性系统,语态和归一度三个方面。谓语是及物性系统的三要素之一,并且及物系统的六个... 将谓语定义为"限定成分+谓体"。谓语动词具有概念功能、人际功能和语篇功能。本文只讨论谓语动词的概念功能。谓语动词的概念功能体现在及物性系统,语态和归一度三个方面。谓语是及物性系统的三要素之一,并且及物系统的六个过程是按照动词的种类来划分的;语态是由动词过程与哪一个参与者首先发生关系来决定的;归一度即肯定或否定的判断,是由谓语(限定成分)加否定副词(not)构成的。 展开更多
关键词 英语 谓语 概念功能
在线阅读 下载PDF
Theory of Approximate Reasoning in Two-Valued Predicate Logic Based on the Quasi-truth Degrees 被引量:2
6
作者 秦晓燕 刘军 +2 位作者 徐扬 陈树伟 刘熠 《Journal of Donghua University(English Edition)》 EI CAS 2012年第1期23-27,共5页
Based on the theory of the quasi-truth degrees in two-valued predicate logic, some researches on approximate reasoning are studied in this paper. The relation of the pseudo-metric between first-order formulae and the ... Based on the theory of the quasi-truth degrees in two-valued predicate logic, some researches on approximate reasoning are studied in this paper. The relation of the pseudo-metric between first-order formulae and the quasi-truth degrees of first-order formulae is discussed, and it is proved that there is no isolated point in the logic metric space (F, ρ ). Thus the pseudo-metric between first-order formulae is well defined to develop the study about approximate reasoning in the logic metric space (F, ρ ). Then, three different types of approximate reasoning patterns are proposed, and their equivalence under some condition is proved. This work aims at filling in the blanks of approximate reasoning in quantitative predicate logic. 展开更多
关键词 approximate reasoning PSEUDO-METRIC quasi-truth degree predicate logic
在线阅读 下载PDF
Predicate Oriented Pattern Analysis for Biomedical Knowledge Discovery 被引量:2
7
作者 Feichen Shen Hongfang Liu +2 位作者 Sunghwan Sohn David W. Larson Yugyung Lee 《Intelligent Information Management》 2016年第3期66-85,共20页
In the current biomedical data movement, numerous efforts have been made to convert and normalize a large number of traditional structured and unstructured data (e.g., EHRs, reports) to semi-structured data (e.g., RDF... In the current biomedical data movement, numerous efforts have been made to convert and normalize a large number of traditional structured and unstructured data (e.g., EHRs, reports) to semi-structured data (e.g., RDF, OWL). With the increasing number of semi-structured data coming into the biomedical community, data integration and knowledge discovery from heterogeneous domains become important research problem. In the application level, detection of related concepts among medical ontologies is an important goal of life science research. It is more crucial to figure out how different concepts are related within a single ontology or across multiple ontologies by analysing predicates in different knowledge bases. However, the world today is one of information explosion, and it is extremely difficult for biomedical researchers to find existing or potential predicates to perform linking among cross domain concepts without any support from schema pattern analysis. Therefore, there is a need for a mechanism to do predicate oriented pattern analysis to partition heterogeneous ontologies into closer small topics and do query generation to discover cross domain knowledge from each topic. In this paper, we present such a model that predicates oriented pattern analysis based on their close relationship and generates a similarity matrix. Based on this similarity matrix, we apply an innovated unsupervised learning algorithm to partition large data sets into smaller and closer topics and generate meaningful queries to fully discover knowledge over a set of interlinked data sources. We have implemented a prototype system named BmQGen and evaluate the proposed model with colorectal surgical cohort from the Mayo Clinic. 展开更多
关键词 Biomedical Knowledge Discovery Pattern Analysis predicate Query Generation
在线阅读 下载PDF
Control of Non-Deterministic Systems With μ-Calculus Specifications Using Quotienting 被引量:1
8
作者 Samik Basu Ratnesh Kumar 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第5期953-970,共18页
The supervisory control problem for discrete event system(DES) under control involves identifying the supervisor, if one exists, which, when synchronously composed with the DES,results in a system that conforms to the... The supervisory control problem for discrete event system(DES) under control involves identifying the supervisor, if one exists, which, when synchronously composed with the DES,results in a system that conforms to the control specification. In this context, we consider a non-deterministic DES under complete observation and control specification expressed in action-based propositional μ-calculus. The key to our solution is the process of quotienting the control specification against the plan resulting in a new μ-calculus formula such that a model for the formula is the supervisor. Thus the task of control synthesis is reduced a problem of μ-calculus satisfiability. In contrast to the existing μ-calculus quotienting-based techniques that are developed in deterministic setting, our quotienting rules can handle nondeterminism in the plant models. Another distinguishing feature of our technique is that while existing techniques use a separate μ-calculus formula to describe the controllability constraint(that uncontrollable events of plants are never disabled by a supervisor), we absorb this constraint as part of quotienting which allows us to directly capture more general state-dependent controllability constraints. Finally, we develop a tableau-based technique for verifying satisfiability of quotiented formula and model generation. The runtime for the technique is exponential in terms of the size of the plan and the control specification. A better complexity result that is polynomial to plant size and exponential to specification size is obtained when the controllability property is state-independent. A prototype implementation in a tabled logic programming language as well as some experimental results are presented. 展开更多
关键词 Discrete event systems(DES) non-deterministic plant μ-calculus supervisory control
在线阅读 下载PDF
A Contrastive Analysis of Subject and Predicate in English and Chinese
9
作者 张晰 《海外英语》 2013年第15期263-264,275,共3页
Respectively belonging to different language families,English and Chinese naturally have many differences in morphology and syntax.This paper intends to give a contrastive analysis of subject and predicate in English ... Respectively belonging to different language families,English and Chinese naturally have many differences in morphology and syntax.This paper intends to give a contrastive analysis of subject and predicate in English and Chinese,focusing on differences of subject and predicate usages in the two languages,and the problems they cause for Chinese students in English learning and translation. 展开更多
关键词 ENGLISH CHINESE SUBJECT predicate DIFFERENCES
在线阅读 下载PDF
Functionality Semantics of Predicate Data Flow Diagram
10
作者 高晓雷 缪淮扣 刘玲 《Journal of Shanghai University(English Edition)》 CAS 2004年第3期309-316,共8页
SOZL (structured methodology + object-oriented methodology + Z language) is a language that attempts to integrate structured method, object-oriented method and formal method. The core of this language is predicate dat... SOZL (structured methodology + object-oriented methodology + Z language) is a language that attempts to integrate structured method, object-oriented method and formal method. The core of this language is predicate data flow diagram (PDFD). In order to eliminate the ambiguity of predicate data flow diagrams and their associated textual specifications, a formalization of the syntax and semantics of predicate data flow diagrams is necessary. In this paper we use Z notation to define an abstract syntax and the related structural constraints for the PDFD notation, and provide it with an axiomatic semantics based on the concept of data availability and functionality of predicate operation. Finally, an example is given to establish functionality consistent decomposition on hierarchical PDFD (HPDFD). 展开更多
关键词 predicate data flow diagram (PDFD) predicate operation (PO) hierarchical predicate data flow diagram (HPDFD) AVAILABILITY functionality semantics.
在线阅读 下载PDF
Application of the Constrained Predicated Nets and Interval Logic to Production Systems
11
作者 徐林 吴智铭 曹木亮 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2003年第2期74-81,共8页
A method to model and analyze the hybrid systems is presented. The time to be considered in the plant is taken as an explicit parameter through the constrained predicated net (CPN). The CPN's basic structure is a ... A method to model and analyze the hybrid systems is presented. The time to be considered in the plant is taken as an explicit parameter through the constrained predicated net (CPN). The CPN's basic structure is a Petri net with predicated transition. All components of the net are expressed by annotation which is defined on rational set Q. The analysis method for the plant is interval temporal logic represented by Petri nets. This paper combines the above two methods to synthesize the hybrid system, gives a simple and clear expression of the expected action of the studied plant. 展开更多
关键词 Temporal constrained predicated nets Temporal logic Hybrid systems Petri nets.
在线阅读 下载PDF
δ-Calculus:A New Approach to Quantifying Location Privacy
12
作者 Lihua Yin Ran Li +4 位作者 Jingquan Ding Xiao Li Yunchuan Guo Huibing Zhang Ang Li 《Computers, Materials & Continua》 SCIE EI 2020年第6期1323-1342,共20页
With the rapid development of mobile wireless Internet and high-precision localization devices,location-based services(LBS)bring more convenience for people over recent years.In LBS,if the original location data are d... With the rapid development of mobile wireless Internet and high-precision localization devices,location-based services(LBS)bring more convenience for people over recent years.In LBS,if the original location data are directly provided,serious privacy problems raise.As a response to these problems,a large number of location-privacy protection mechanisms(LPPMs)(including formal LPPMs,FLPPMs,etc.)and their evaluation metrics have been proposed to prevent personal location information from being leakage and quantify privacy leakage.However,existing schemes independently consider FLPPMs and evaluation metrics,without synergizing them into a unifying framework.In this paper,a unified model is proposed to synergize FLPPMs and evaluation metrics.In detail,the probabilistic process calculus(calledδ-calculus)is proposed to characterize obfuscation schemes(which is a LPPM)and integrateα-entropy toδ-calculus to evaluate its privacy leakage.Further,we use two calculus moving and probabilistic choice to model nodes’mobility and compute its probability distribution of nodes’locations,and a renaming function to model privacy leakage.By formally defining the attacker’s ability and extending relative entropy,an evaluation algorithm is proposed to quantify the leakage of location privacy.Finally,a series of examples are designed to demonstrate the efficiency of our proposed approach. 展开更多
关键词 Location privacy δ-calculus relative entropy
在线阅读 下载PDF
Applying First Order Predicate to the Semantic Query of Chinese
13
作者 高昊宇 俞勇 《Journal of Shanghai Jiaotong university(Science)》 EI 2004年第3期55-59,共5页
This paper described an approach to make inferences on Chinese information using first order predicate logic, which could be used in the semantic query of Chinese. The predicates of the method were derived from the na... This paper described an approach to make inferences on Chinese information using first order predicate logic, which could be used in the semantic query of Chinese. The predicates of the method were derived from the natural language using rule based LFT, the axiom set was generated by extracting lexicon knowledge from HowNet, and the first order predicate inferences were made through symbol connection of center words. After all these were done, the evaluation and possible improvements of the method were provided. The experiment result shows a higher precision rate than that traditional methods can reach. 展开更多
关键词 first order predicate semantic query inference engine rule circuit
在线阅读 下载PDF
A Study of Nominal Predicate Sentences Under the Framework of Cognitive Grammar
14
作者 ZOU Wen-jie GAO Wen-cheng 《Journal of Literature and Art Studies》 2023年第9期704-707,共4页
Cognitive grammar,as a linguistic theory that attaches importance to the relationship between language and thinking,provides us with a more comprehensive way to understand the structure,semantics and cognitive process... Cognitive grammar,as a linguistic theory that attaches importance to the relationship between language and thinking,provides us with a more comprehensive way to understand the structure,semantics and cognitive processing of noun predicate sentences.Therefore,under the framework of cognitive grammar,this paper tries to analyze the semantic connection and cognitive process in noun predicate sentences from the semantic perspective and the method of example theory,and discusses the motivation of the formation of this construction,so as to provide references for in-depth analysis of the cognitive laws behind noun predicate sentences. 展开更多
关键词 nominal predicate sentences cognitive grammar SEMANTICS
在线阅读 下载PDF
AGREEMENT BETWEEN THE SUBJECT AND THE PREDICATE
15
作者 孙永峰 《河北旅游职业学院学报》 2000年第1期8-9,共2页
关键词 AGREEMENT BETWEEN THE SUBJECT AND THE predicate THAN
在线阅读 下载PDF
Modified Neural Network Used for Host Utilization Predication in Cloud Computing Environment
16
作者 Arif Ullah Siti Fatimah Abdul Razak +1 位作者 Sumendra Yogarayan Md Shohel Sayeed 《Computers, Materials & Continua》 2025年第3期5185-5204,共20页
Networking,storage,and hardware are just a few of the virtual computing resources that the infrastruc-ture service model offers,depending on what the client needs.One essential aspect of cloud computing that improves ... Networking,storage,and hardware are just a few of the virtual computing resources that the infrastruc-ture service model offers,depending on what the client needs.One essential aspect of cloud computing that improves resource allocation techniques is host load prediction.This difficulty means that hardware resource allocation in cloud computing still results in hosting initialization issues,which add several minutes to response times.To solve this issue and accurately predict cloud capacity,cloud data centers use prediction algorithms.This permits dynamic cloud scalability while maintaining superior service quality.For host prediction,we therefore present a hybrid convolutional neural network long with short-term memory model in this work.First,the suggested hybrid model is input is subjected to the vector auto regression technique.The data in many variables that,prior to analysis,has been filtered to eliminate linear interdependencies.After that,the persisting data are processed and sent into the convolutional neural network layer,which gathers intricate details about the utilization of each virtual machine and central processing unit.The next step involves the use of extended short-term memory,which is suitable for representing the temporal information of irregular trends in time series components.The key to the entire process is that we used the most appropriate activation function for this type of model a scaled polynomial constant unit.Cloud systems require accurate prediction due to the increasing degrees of unpredictability in data centers.Because of this,two actual load traces were used in this study’s assessment of the performance.An example of the load trace is in the typical dispersed system.In comparison to CNN,VAR-GRU,VAR-MLP,ARIMA-LSTM,and other models,the experiment results demonstrate that our suggested approach offers state-of-the-art performance with higher accuracy in both datasets. 展开更多
关键词 Cloud computing DATACENTER virtual machine(VM) predicATION algorithm
在线阅读 下载PDF
Utility of inflammatory markers as predictors of recurrence in gastrointestinal stromal tumors:Insights from a nomogram-based approach
17
作者 Chris B Lamprecht Tyler Kashuv Brandon Lucke-Wold 《World Journal of Gastrointestinal Oncology》 2025年第9期385-390,共6页
Gastrointestinal stromal tumors(GISTs),the most prevalent mesenchymal tumors,often have poor outcomes due to high recurrence rates.However,the specific risk factors for GISTs,particularly those concerning the innate i... Gastrointestinal stromal tumors(GISTs),the most prevalent mesenchymal tumors,often have poor outcomes due to high recurrence rates.However,the specific risk factors for GISTs,particularly those concerning the innate immune-inflammatory response,remain poorly understood.This editorial highlights key prognostic factors that impact GIST progression and prognosis,while discussing the findings of a recent study that investigated the prognostic value of systemic inflammatory markers:systemic immune-inflammation index,neutrophil/lym-phocyte ratio,platelet/lymphocyte ratio,and monocyte/lymphocyte ratio,on recurrence-free survival in GIST patients.This editorial examines strategies to enhance the clinical applicability of the nomogram developed in the study,ensuring its effectiveness for robust implementation.Future directions outlined in the editorial stress the importance of integrating molecular insights,including KIT and PDGFRA mutations,tumor staging,and mitotic rates to refine predictive models.The editorial also underscores the value of multi-center studies to enhance the generalizability and clinical relevance of these approaches.By bridging inflammatory biomarkers with genetic and clinicopathologic factors,a more comprehensive understanding of GIST pathophysiology can be developed,paving the way for improved management strategies and patient outcomes.This perspective serves as a call to action for continued research into the interplay between genetic mutations,inflammatory marker modulation,and GIST progression,aiming to expand the scope of personalized oncology through a deeper understanding of GIST progression. 展开更多
关键词 Gastrointestinal stromal tumor Recurrence prediction Nomogram predicative modeling Inflammatory markers Tumor risk factors
暂未订购
多k位数阈值的谓词加密方案
18
作者 李婷 陈振华 《计算机应用与软件》 北大核心 2026年第1期338-347,共10页
现有支持比较大小的谓词加密方案没有考虑属性值的排序位置,且大多数方案没有实现更强的隐私性——属性隐藏。针对这两个问题,提出一种具有属性隐藏的多k位数阈值谓词加密方案。设计一种新的编码,将多个排序后的属性值和多个阈值的比较... 现有支持比较大小的谓词加密方案没有考虑属性值的排序位置,且大多数方案没有实现更强的隐私性——属性隐藏。针对这两个问题,提出一种具有属性隐藏的多k位数阈值谓词加密方案。设计一种新的编码,将多个排序后的属性值和多个阈值的比较大小转化为多内积问题;采用对偶向量空间上的内积加密技术,构造随机数等式实现多内积问题;构造属性盲化方法实现属性隐藏。安全性证明和性能分析表明,所提方案在标准模型下是可以抵抗选择明文攻击的,且具备较好的存储性能。 展开更多
关键词 谓词加密 k 位数阈值 比较大小 属性隐藏
在线阅读 下载PDF
术前血清CXCR4、HIF-1α水平在预测食管癌根治术后淋巴结转移中的应用价值
19
作者 田伟 侯彬 +1 位作者 豆亚伟 戴云 《胃肠病学和肝病学杂志》 2026年第2期199-202,共4页
目的 研究术前血清CXC趋化因子受体4(CXC chemokine receptor 4,CXCR4)、缺氧诱导因子-1α(hypoxia inducible factor-1α,HIF-1α)水平在预测食管癌术后淋巴转移的效果。方法 选取2018年8月至2023年8月在我院行食管癌根治术且术中行淋... 目的 研究术前血清CXC趋化因子受体4(CXC chemokine receptor 4,CXCR4)、缺氧诱导因子-1α(hypoxia inducible factor-1α,HIF-1α)水平在预测食管癌术后淋巴转移的效果。方法 选取2018年8月至2023年8月在我院行食管癌根治术且术中行淋巴结清扫的384例患者,根据3∶1的比例随机分为训练集(n=288)和验证集(n=96)。在训练集中根据术后淋巴结病理检查结果将患者分为转移组(n=132)和未转移组(n=156),比较两组患者临床资料及血清标志物的差异,通过统计学方法总结淋巴结转移的危险因素及CXCR4、HIF-1α的预测价值。结果 训练集中转移组患者的血清CXCR4、HIF-1α、CYFRA21-1、SCC-Ag水平高于未转移组,差异有统计学意义(P<0.05),血清CEA、CA199水平及其他临床资料与未转移组比较差异无统计学意义(P>0.05)。血清CXCR4、HIF-1α是食管癌根治术后淋巴结转移的危险因素(P<0.05)。血清CXCR4、HIF-1α及联合方程预测淋巴结转移的AUC分别为0.855(95%CI:0.812~0.898)、0.907(95%CI:0.874~0.940)、0.975(95%CI:0.959~0.991),联合方程的AUC高于CXCR4、HIF-1α(Z=4.951、4.231,P<0.05);验证集中联合方程预测淋巴结转移的C-指数为0.961(95%CI:0.921~0.995),预测的准确性良好。结论 术前血清CXCR4、HIF-1α可有效预测食管癌根治术后淋巴结转移的风险。 展开更多
关键词 食管癌根治术 淋巴结转移 CXC趋化因子受体4 缺氧诱导因子-1Α 预测
暂未订购
Prediction of compressive strength of cement mortars with fly ash and activated coal gangue 被引量:6
20
作者 周双喜 陈益民 张文生 《Journal of Southeast University(English Edition)》 EI CAS 2006年第4期549-552,共4页
The pozzolanic activity of coal gangue, which is calcining at 500 to 1 000 ℃, differs distinctly. The simplex-centroid design with upper and lower bounds of component proportion is adopted to study the compressive st... The pozzolanic activity of coal gangue, which is calcining at 500 to 1 000 ℃, differs distinctly. The simplex-centroid design with upper and lower bounds of component proportion is adopted to study the compressive strength of mortars made with ternary blends of cement, activated coal gangue and fly ash. Based on the results of a minimum of seven design points, three special cubic polynomial models are used to establish the strength predicating equations at different ages for mortars. Five experimental checkpoints were also designed to verify the precision of the equations. The most frequent errors of the predicted values are within 3%. A simple and practical way is provided for determining the optimal proportion of two admixtures when they are used in concrete. 展开更多
关键词 thermal activated coal gangue simplex-centroid design predicating equation compressive strength
在线阅读 下载PDF
上一页 1 2 163 下一页 到第
使用帮助 返回顶部