2016
DOI: 10.1016/j.jnucmat.2016.07.040
|View full text |Cite
|
Sign up to set email alerts
|

Interaction behavior between binary xCe-yNd alloy and HT9

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 9 publications
1
2
0
Order By: Relevance
“…Since DL-1 and DL-2 are located on each side of the original interface boundary, they are formed by the diffusion of Fe into Ce, and the diffusion of Ce into HT9, respectively. The formation of CeFe 2 in DL-1 results in the decrease of Fe in DL-2, which is consistent with the previous study where Fe in the cladding material rapidly migrated into Ce, leaving an Fe-depleted region into which Ce diffuses [25]. The Cr content in DL-2 is much higher than HT9 due to the reduction of Fe content.…”
Section: Ht9/ce Interfacesupporting
confidence: 91%
“…Since DL-1 and DL-2 are located on each side of the original interface boundary, they are formed by the diffusion of Fe into Ce, and the diffusion of Ce into HT9, respectively. The formation of CeFe 2 in DL-1 results in the decrease of Fe in DL-2, which is consistent with the previous study where Fe in the cladding material rapidly migrated into Ce, leaving an Fe-depleted region into which Ce diffuses [25]. The Cr content in DL-2 is much higher than HT9 due to the reduction of Fe content.…”
Section: Ht9/ce Interfacesupporting
confidence: 91%
“…As IoT devices can generate high-dimensional data with obvious characteristics, such as temperature measurement, video monitoring, and water level telemetry, IoT devices have been deeply applied in many aspects [8,9]. e interaction of mobile network is mainly aimed at interaction behavior, because the interactive network is easy to accept, simple to operate, and so on and has been applied in many computer networks, bringing a lot of mobile network interaction behavior [10,11]. erefore, how to effectively identify abnormal behavior and distinguish normal mobile network interaction is worth studying.…”
Section: Introductionmentioning
confidence: 99%
“…Some scholars use a genetic algorithm to build a detection model to realize the aggregation of interactive behavior for overall anomaly detection. In addition, specific classification of abnormal behaviors is realized based on the discrimination of abnormal data by the wavelet model [10,12,13]. However, these methods have certain limitations, especially in feature extraction and direction recognition, which are difficult to be finely divided [14].…”
Section: Introductionmentioning
confidence: 99%