Search Results - "Yisheng, Rong"
-
1
Drag reduction research in supersonic flow with opposing jet
Published in Acta astronautica (01-10-2013)“…A CFD study on drag reduction in supersonic flow with opposing jet has been conducted. Flowfield parameters, reattachment point position and surface pressure…”
Get full text
Journal Article -
2
Coexistence mechanism of ecological specialists and generalists based on a network dimension reduction method
Published in Ecology and evolution (01-02-2024)“…As an ecological strategy for species coexistence, some species adapt to a wide range of habitats, while others specialize in particular environments. Such…”
Get full text
Journal Article -
3
Research on thermal protection by opposing jet and transpiration for high speed vehicle
Published in Aerospace science and technology (01-01-2016)“…A thermal protection structure that unites the opposing jet and platelet transpiration is introduced, whose cooling effect is conducted through numerical…”
Get full text
Journal Article -
4
Acceleration Level Control of Redundant Manipulators with Physical Constraints Compliance and Disturbance Rejection under Complex Environment
Published in Complexity (New York, N.Y.) (2020)“…Investigation of joint torque constraint compliance is of significance for robot manipulators especially working in complex environments. A lot of which is…”
Get full text
Journal Article -
5
Efficacy and safety of Jiuhua hemorrhoid suppository plus diosmin for the treatment of hemorrhoid hemorrhage: a multicenter, randomized, and controlled trial
Published in Digital Chinese medicine (Online) (01-12-2023)“…To compare the efficacy and safety of combining diosmin with Jiuhua hemorrhoid suppository versus diosmin alone for the treatment of hemorrhoid hemorrhage. The…”
Get full text
Journal Article -
6
Heat-balance Thermal Protection with Heat Pipes for Hypersonic Vehicle
Published in MATEC Web of Conferences (01-01-2016)“…Heat-balance thermal protection is non-ablating thermal protection for leading edge of hypersonic vehicle. Heat will be quickly transferred from high…”
Get full text
Journal Article Conference Proceeding -
7
Related-key impossible differential cryptanalysis on lightweight cipher TWINE
Published in Journal of ambient intelligence and humanized computing (14-02-2019)Get full text
Journal Article -
8
Research on Cooling Effect with Coolant Groove Structure Parameters in Platelet Transpiration Cooled Nosetip
Published in Journal of thermal science (01-10-2010)“…A platelet transpiration cooled nosetip is considered as thermal protection system (TPS) to prevent hypersonic ve- hicle from the serious aerodynamic heating…”
Get full text
Journal Article -
9
Controlling of nonlinear dynamical networks based on decoupling and re-coupling method
Published in Chaos, solitons and fractals (01-10-2022)“…Although a large number of studies have verified and explained the controllability of complex networks in real life and nature, there is a deficiency of…”
Get full text
Journal Article -
10
Predicting the cascading failure of dynamical networks based on a new dimension reduction method
Published in Physica A (15-11-2022)Get full text
Journal Article -
11
A flux vector splitting scheme for low Mach number flows in preconditioning method
Published in Applied mathematics and computation (01-09-2014)“…The stiffness of Euler equations system increases, with the decreasing of Mach number, which results in poor convergence when solving steady flow problems…”
Get full text
Journal Article -
12
Related-key impossible differential cryptanalysis on lightweight cipher TWINE
Published in Journal of ambient intelligence and humanized computing (01-02-2019)“…Lightweight block cipher is usually used in smart environment to protect confidentiality as well as to authentication. TWINE is a lightweight block cipher…”
Get full text
Journal Article -
13
New Differential Fault Attack on Lightweight Cipher LBlock
Published in 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS) (01-09-2016)“…LBlock is a lightweight block cipher designed for tiny computing devices, such as RFID tags and sensor network nodes. The cipher algorithm iterates a Feistel…”
Get full text
Conference Proceeding