107 resultados para Nucleophilic attack
em Chinese Academy of Sciences Institutional Repositories Grid Portal
Resumo:
Poly(propylene carbonate) (PPC) with number average molecular weight (M-n) higher than 200 kg/mol was prepared via the terpolymerization of carbon dioxide, propylene oxide and diepoxide using Y(CCl3OO)(3)-ZnEt2-glycerine coordination catalyst. When equimolar ZnEt2 and diepoxide were used, double propagation active species were generated in situ by nucleophilic attack of metal alkoxide on diepoxide, leading to PPC of doubled M-n value. The molecular weight of PPC has dramatic influence on its thermal and mechanical performances. PPC with M of 227 kg/mol showed modulus of 6900 MPa, while the modulus of PPC with M-n of 109 kg/mol was only 4300 MPa. Moreover, when M-n increased from 109 to 227 kg/mol, a 37 degrees C increase of the onset degradation temperature was observed.
Resumo:
To elucidate the mechanism of the catalyzed reaction of co-polyether (EO/THF) with N-100, the interaction and complex formation between reactants and catalysts were investigated by means of NMR spectroscopy. It is shown that the resonance peak of isocyanate carbon splits into two parts when the solutions of N-100 and co-polyether were mixed. The disappearing of proton resonance peak of hydroxyl group in NMR spectra when dibutyltin dilaurate(DBTDL) were added to the copolyether(THF/EO) solution indicates the complex formation, This interaction appears to be a bonding of tin to the oxygen of hydroxyl and make the hydrogen of the hydroxyl group very mobile and active, then exchange with other protons, In the case of triphenyl bismuth(TPB), the high field shift and intensity enhancement of proton peak were observed, which suggest a nucleophilic attack of the bismuth to the hydroxyl hydrogen.
Resumo:
The direct numerical simulation of boundary layer transition over a 5° half-cone-angle blunt cone is performed. The free-stream Mach number is 6 and the angle of attack is 1°. Random wall blow-and-suction perturbations are used to trigger the transition. Different from the authors’ previous work [Li et al., AIAA J. 46, 2899(2008)], the whole boundary layer flow over the cone is simulated (while in the author’s previous work, only two 45° regions around the leeward and the windward sections are simulated). The transition location on the cone surface is determined through the rapid increase in skin fraction coefficient (Cf). The transition line on the cone surface shows a nonmonotonic curve and the transition is delayed in the range of 0° ≤ θ ≤ 30° (θ = 0° is the leeward section). The mechanism of the delayed transition is studied by using joint frequency spectrum analysis and linear stability theory (LST). It is shown that the growth rates of unstable waves of the second mode are suppressed in the range of 20° ≤ θ ≤ 30°, which leads to the delayed transition location. Very low frequency waves VLFWs� are found in the time series recorded just before the transition location, and the periodic times of VLFWs are about one order larger than those of ordinary Mack second mode waves. Band-pass filter is used to analyze the low frequency waves, and they are deemed as the effect of large scale nonlinear perturbations triggered by LST waves when they are strong enough.The direct numerical simulation of boundary layer transition over a 5° half-cone-angle blunt cone is performed. The free-stream Mach number is 6 and the angle of attack is 1°. Random wall blow-and-suction perturbations are used to trigger the transition. Different from the authors’ previous work [ Li et al., AIAA J. 46, 2899 (2008) ], the whole boundary layer flow over the cone is simulated (while in the author’s previous work, only two 45° regions around the leeward and the windward sections are simulated). The transition location on the cone surface is determined through the rapid increase in skin fraction coefficient (Cf). The transition line on the cone surface shows a nonmonotonic curve and the transition is delayed in the range of 20° ≤ θ ≤ 30° (θ = 0° is the leeward section). The mechanism of the delayed transition is studied by using joint frequency spectrum analysis and linear stability theory (LST). It is shown that the growth rates of unstable waves of the second mode are suppressed in the range of 20° ≤ θ ≤ 30°, which leads to the delayed transition location. Very low frequency waves (VLFWs) are found in the time series recorded just before the transition location, and the periodic times of VLFWs are about one order larger than those of ordinary Mack second mode waves. Band-pass filter is used to analyze the low frequency waves, and they are deemed as the effect of large scale nonlinear perturbations triggered by LST waves when they are strong enough.
Resumo:
Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.
Resumo:
IEEE Computer Society
Resumo:
The nucleophilic displacement reaction of n-bromooctane and potassium iodide in ionic liquid based on cyclic guanidinium cation(2) was investigated. The kinetic reasult shows that the rate of the reaction is enhanced in ionic liquid (2). The same reaction in [bmim][PF6](1)(where bmim = 1-butyl-3-methylimidazolium) was also studied. It was found that as a reaction medium ionic liquid (2) is better than (1) for nucelophilic displacement reactions.
Resumo:
The suppression method of vortex shedding from a circular cylinder has been studied experimentally in the Reynolds number range from 300 to 1600. The test is performed in a water channel. The model cylinder is 1 cm in diameter and 38 cm in length. A row of small rods of 0.18 cm in diameter and 1.5 cm in length are perpendicularly connected to the surface of the model cylinder and distributed along the meridian, The distance between the neighboring rods and the angle of attack of the rods can be changed so that the suppression effect on vortex shedding can be adjusted. The results show that vortex shedding can be suppressed effectively if the distance between the neighboring rods is smaller than 3 times and the cylinder diameter and the angle of attack is in the range of 30degreesless than or equal tobeta<90&DEG;.
Resumo:
Three kinds of forebody model of hypersonic vehicles were studied with numerical simulation method. It shows that the two- order compressive ramp model is the best selection among the three for its good evaluative parameters value at the cowl of the inlet . This model can provide higher value of flux coefficient and total pressure recovery coefficient and lower average Mach number compared with those of the other two models . Simultaneously different compressive angles may have different effects . The configuration which the firstorder of compressive angle is 4°and the second 5°is the optimum combination. Furthermore factors such as attack angle were concerned. Better result may be obtained with a range of attack angles . Based on the work above the integrated design for forebodyPinlet of a hypersonic vehicle was performed. The numerical result shows that this integrated model provides good flow field quality for inlet and engine work.
Resumo:
旋成弹体在大攻角超声速流动中其迎风面上有时会出现一种迎风激波.采用非定常雷诺平均的Navier-Stokes方程以及两方程kω-sst和代数B-L湍流模型成功地模拟了该现象,验证了该迎风激波是由于流场主旋涡导致超声速流动偏移造成的涡诱导激波的一部分的结论.
Resumo:
The performance of 23 kinds of waveriders, derived from different conical flowfields, is analyzed by the numerical computation under the conditions of fight speed of Mach 6, attack angle of 0° and flight altitude of 30 km. These results indicate that the performance is influenced by the shapes and the width to height ratios (W/H ) of generating cones. The geometrical parameter and the lift coefficient are proportional to W/H, while the drag coefficient and the lift to drag ratio (L/D ) have extreme values. Considering the base drag and the computation errors, the waverider with the highest L/D is cut from the elliptical cone’s flowfield (W/H = 1.5―1.618), and the configuration with the lowest drag can also be obtained at W/H = 1:1.5. Accordingly, good suggestions are proposed for practical design based on these computational results.
Resumo:
Bulk single crystals of GaN and AlN can be grown from supercritical fluids using the ammonothermal method, which utilizes ammonia as fluid rather than water as in the hydrothermal process. In this process, a mineralizer such as amide, imide or nitride is used to attack a bulk nitride feedstock at temperatures from 200°C to 500°C and pressures from 1 to 4 kbar. Ammonothermal systems have been modeled here using fluid dynamics, thermodynamics and heat transfer models. The nutrient is considered as a porous media bed and the fluid flow is simulated using the Darcy-Brinkman-Forchheimer model. The resulting governing equations are solved using the finite volume method. The effects of particle size on flow pattern and temperature distribution in an autoclave are analyzed.
Resumo:
A narrow strip is used to control mean and fluctuating forces on a circular cylinder at Reynolds numbers from 2.0 x 10(4) to 1.0 x 10(5). The axes of the strip and cylinder are parallel. The control parameters are strip width ratio and strip position characterized by angle of attack and distance from the cylinder. Wind tunnel tests show that the vortex shedding from both sides of the cylinder can be suppressed, and mean drag and fluctuating lift on the cylinder can be reduced if the strip is installed in an effective zone downstream of the cylinder. A phenomenon of mono-side vortex shedding is found. The strip-induced local changes of velocity profiles in the near wake of the cylinder are measured, and the relation between base suction and peak value in the power spectrum of fluctuating lift is studied. The control mechanism is then discussed from different points of view.
Resumo:
The expansion property of cement mortar under the attack of sulfate ions is studied by experimental and theoretical methods. First, cement mortars are fabricated with the ratio of water to cement of 0.4, 0.6, and 0.8. Secondly, the expansion of specimen immerged in sulphate solution is measured at different times. Thirdly, a theoretical model of expansion of cement mortar under sulphate erosion is suggested by virtue of represent volume element method. In this model, the damage evolution due to the interaction between delayed ettringite and cement mortar is taken into account. Finally, the numerical calculation is performed. The numerical and experimental results indicate that the model perfectly describes the expansion of the cement mortar.