In this article,SolidWorks 3D software is used to draw the end actuator 3D solid model of palletizing robots,and the end actuator is taken to FEM analysis on SolidWorks Simulation *** Results validate that the way is ...
详细信息
In this article,SolidWorks 3D software is used to draw the end actuator 3D solid model of palletizing robots,and the end actuator is taken to FEM analysis on SolidWorks Simulation *** Results validate that the way is correct of SolidWorks Simulation Steps described in *** is effectively to prevent the operation of converting data problems and defects from designing 3D solid model to FEM analysising in other 3D solid modeling software used for FEM analysis of mechanical *** is of reference to researchers for Static Analysis of mechanical components and providing methods for the practical application.
Urban underground space is being recognized as a valuable resource for sustainable city development.A fundamental step in this development is the understanding of the quality of urban underground living conditions and...
详细信息
Urban underground space is being recognized as a valuable resource for sustainable city development.A fundamental step in this development is the understanding of the quality of urban underground living conditions and the capacity for urban underground space planning and *** paper adopts fuzzy comprehensive evaluation methods to focus on an engineering suitability assessment of underground *** the National Code for Urban Planning Engineering Geotechnical Investigation and Surveying,the assessment criteria are defined,as well as the sub-factors associated with each *** fuzzy comprehensive assessment method is applied to Binhai New Region of TianJin *** aim of obtaining the distribution of urban underground space suitable for geo-engineering,both in quantity and quality,is realized.
In both the academic and industrial worlds, cloud technology is becoming a widely used research area. Both providers of cloud services and consumers profit from cloud computation. The literature has mostly focused on ...
In both the academic and industrial worlds, cloud technology is becoming a widely used research area. Both providers of cloud services and consumers profit from cloud computation. The literature has mostly focused on the security issues related to the cloud. This thorough literature study's objective is to assess the state of knowledge on dangers, difficulties, and privacy for public cloud. This studies from different countries at the areas of study that some well rising institutions are focusing between on 2010. and 2020. We chose 81 papers after carefully examining several attempts to solve the stated research issues. The study's results revealed seven serious security threats to internet data centres. The results revealed that a few of the extensively covered subjects with in chosen works included data modification and leaking. Network discontinuities, storing, and information inside the realm of public cloud were also recognised potential threats. The findings of this Study also shown that CSPs and internet users alike still have difficulties when reassessing client data. The cryptocurrency was identified in our research report as an innovation activitythat would help to allay security worries. The SLR findings reveal a few things that should be done in efforts to provide categorization, legitimacy, and information availability in the present.
Analysed the advantages of 3D configuration software and the issues which need to be resolved. Proposed the design method of semantic-based intelligent component library. Using ontology to describe the graphics compon...
详细信息
Analysed the advantages of 3D configuration software and the issues which need to be resolved. Proposed the design method of semantic-based intelligent component library. Using ontology to describe the graphics components of the 3D configuration software. Analysed the feasibility of using Ontology in the 3D configuration software. Proposed the architecture of the 3D intelligent components. And described the method of describing the 3D components using ontology. Depending on the support of the ontology library, it can reduce the complexity and difficulty to create the 3D monitor scene by the 3D configuration software using the intelligent components. This makes the automation engineers create 3D monitoring scene so easily who has no 3D experience in the 3D development.
Ant colony algorithm is a new algorithm of heuristic bionic ***,it has been widely applied in many fields of combinatorial *** paper elaborates the basic principle and mathematical model of typical ant colony algorith...
详细信息
Ant colony algorithm is a new algorithm of heuristic bionic ***,it has been widely applied in many fields of combinatorial *** paper elaborates the basic principle and mathematical model of typical ant colony algorithm for solving the traveling salesman problem,and analyzes impact of the optimal parameters to the performance of *** on its shortages,an improved algorithm by dynamically adjusting parameters is ***,the paper gives the simulation result,and it indicates the improved algorithm has a better performance.
Energy is the main material basis of human social progress. Energy security is a complex problem which involves many fields and includes multiple objects. This article, based on the information entropy theory and comb...
详细信息
Energy is the main material basis of human social progress. Energy security is a complex problem which involves many fields and includes multiple objects. This article, based on the information entropy theory and combining the current situation of energy supply and demand in China, proposes concepts of energy structure entropy and energy comprehensive weight, and puts forward effective suggestions for the future energy structure adjustment through analysis of China’s current energy structure.
The core of question answering is a searching based on natural language *** of the flexibility and complexity of Chinese,the study of the Chinese question answering has become very *** current Chinese question answeri...
详细信息
The core of question answering is a searching based on natural language *** of the flexibility and complexity of Chinese,the study of the Chinese question answering has become very *** current Chinese question answering relies on keywords to query and retrieve the *** nature of these systems is the keyword *** is a kind of simple natural language *** answering accuracy is *** this paper,the research methods of the question answering in Chinese syntax and semantic analysis,which based on the knowledge representation of the conceptual graphs,is *** to the methods,the question answering is formal defined,and the system structure is *** conceptual graphs of the interrogative sentences in Chinese are also constructed by common statement in Chinese interrogative sentences in this *** test,the conceptual graphs of the interrogative sentences reflect the basic situation of existing questions in Chinese,and the solution is *** research methods are valuable for the question answering and natural language understanding.
Most existing methods of Web data extraction realize goals based on DOM tree analysis or wrapper building. However,applicability and efficiency of these methods need to be further improved. According to the amount of ...
详细信息
Most existing methods of Web data extraction realize goals based on DOM tree analysis or wrapper building. However,applicability and efficiency of these methods need to be further improved. According to the amount of information,Web pages will be divided into two structure types which are 1:1 and 1:N type respectively. As same type of Web pages has similar structure features,the paper proposes an approach of two-phase Web data extraction base on structure feature. In the phase of samples learning,structure feature and depository rules of Web pages are obtained according to the text feature of sample pages. In the phase of information extraction,Web data extraction is implemented by matching the page to be extracted with depository rules in knowledge base. Experimental results show that the approach proposed in the paper has well applicability and high efficiency.
An engine condition monitoring system was established with the Freescale MC9S12DG128 chip which self-equipped with the CAN bus controller. This system collects such key parameters as oil pressure and rotation speed,as...
详细信息
An engine condition monitoring system was established with the Freescale MC9S12DG128 chip which self-equipped with the CAN bus controller. This system collects such key parameters as oil pressure and rotation speed,as well as trouble code information and so on through designed CAN nodes,and transmits these parameters to the remote monitoring center through GPRS modules. It is proven by tests that this system is able to well accomplish each function.
Risk analysis and assessment is essentially a synthesis and amalgamation of the empirical and normative,the quantitative and qualitative,and the objective and subjective *** order to deal with quantitative and qualita...
详细信息
Risk analysis and assessment is essentially a synthesis and amalgamation of the empirical and normative,the quantitative and qualitative,and the objective and subjective *** order to deal with quantitative and qualitative data,empirical and subjective knowledge,and incomplete,ignorant,fuzzy,vague information in risk analysis and assessment,a novel risk analysis method is proposed in this paper,which refers to evidential risk *** proposed method represents risk by the fuzzy belief structure,aggregates the multiple decision maker opinions using the evidential reasoning approach,and makes risk decision support using belief *** evidential risk analysis process and algorithm is illuminated step by ***,a case study of bridge risk assessment is explored to show validity and applicability of the proposed method.
暂无评论