Critical power of keyhole formation in CW Nd:YAG laser deep penetration welding

来源 :中国焊接 | 被引量 : 0次 | 上传用户:ss22ss33
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The energy model was founded to calculate the critical power of keyhole formation by using the limit principle in CW (continuous wave) Nd:YAG laser deep penetration welding process. The model was validated by experiments. The results show that there are two errors between the calculated critical power of keyhole formation and that of experiments: one is that the calculated results is less than those of experiments, which is caused by not considering the energy loss by heat conduction in the model of keyhole formation. The other is that there is 0.9 mm error between the axis of the calculated curve of critical power with location of laser focus and that of experimental curve, which is induced by the excursion of laser focus in laser deep penetration welding. At last, the two errors were revised according to the analyses of the errors.
其他文献
In the complex mechanical vibration environment, the dominant frequency of the system varies remarkably and swiftly under various running conditions, which also
通过去叶和植株下放的处理方式改变雾化栽培马铃薯植株的源强来探讨源器官调控对植株生长的影响。结果表明:去叶和植株下放能显著增加雾化栽培马铃薯植株的高度,但会极显著降
本文介绍一种工艺茶--玉环茶的品质特点、制作方法和掌握的技术要领.
A SVMs (Support Vector Machines) based method to identify Chinese place names is presented. In our approach, place name candidate is located according to a rati
At present, most mobile terminals do not have any functions of rights management, and the cryptology-based method cannot resolve all the copyright problems in t
Creep property of solder alloys is one of the important factors to affect the reliability of soldered joints in SMT(surface mount technology). Particle-enhancem
The Ethernet over E1 approach,which takes advantage of widely deployed telecom networks,is an efficient and economical way to interconnect two Ethernets in diff
该文从挂篮荷载计算、施工流程、支座及临时固结施工、挂篮安装及试验、合拢段施工、模板制作安装、钢筋安装、混凝土的浇筑及养生、测量监控等方面人手,介绍了S226海滨大桥
To improve the performance of the 2 m telescope,the optimum design is applied to the telescope assemble.Referring to the telescope assemble with the dimetric tr
A proactive threshold signature scheme is very important to tolerate mobile attack in mobile ad hoc networks. In this paper, we propose an efficient proactive t