Advanced Materials Research Vols. 834-836

Paper Title Page

Abstract: In order to ensure processing quality and validate the accurary of macro program. VERICUT software was often used to achieve five-axis gantry milling machine automatic tool changer (ATC) of the whole process simulation.The results show that the validity of macro program is verified by NC simulation and the efficiency of NC simulation is improved. It provides a guide for the modeling and simulation of multi-axis CNC machine tools.
1758
Abstract: Aiming at the question that processing information can not be extracted effectively because of heterogeneity of NC machine tools and information extracting method is not widely used. A multi-source isomerous NC machining process tracking and fusion method based on information fusion is proposed. This method can determine the current process state of NC machine to realize effective tracking of processing.
1762
Abstract: Working hours is a important link in product costing, it is also an important component of enterprise process management and Lean Production. The relationship of NC code and working hour was studied. As the corresponding mathematical models were established. It is more scientific, rationalization and precise for the CNC Milling Machining hours. An actual case was given.
1766
Abstract: Information-theory has been used to research the manufacturing system complexity for decade years. In order to describe the complexity more accurately, the assembly manufacturing system is aimed in this paper. The hierarchy structure of the assembly manufacturing system is first analyzed. The assembly system complexity is classified as structure complexity, process complexity and control complexity. In order to improve the complexity model, the process complexity is furthermore classified as static and dynamic process complexity which can describe the complexity of ideal and actual production process respectively. Then an integrated complexity model is proposed based on the classification.
1770
Abstract: Manufacturing enterprise group possesses the greatest wealth of resources and knowledge for sustainable product and business development. These resources and knowledge have gradually become the key factor of core competitiveness and product innovation for manufacturing enterprise group. However, the resources inenterprise group are usually distributed in different subsidiary companies,which means they can’t be centralized used and can’t be made the most use of,constraining the competition and development of enterprise. It bring soutstanding contradiction problems between the demand and resources sharing. By the comparison of different resource sharing and coordination schemas of current advanced manufacturing paradigms, and the analyzing of the resource requirements and tendency of the sharing and centralized control of resources in manufacturing enterprise group from the develop point of view, a new cloud manufacturing service schema vision for manufacturing enterprise group is proposed based onthe Cloud Manufacturing idea to strengthen manufacturing enterprise group’s management and control power, enhance service capabilities of its resources. As same as the cloud manufacturing idea, the schema promises elasticity, flexibility and adaptability through the on-demand provisioning of manufacturing resources as a utility.
1776
Abstract: In order to avoid the ergonomic issues in the early planning stages of production line, and to achieve a more satisfactory planning and design, the ergonomic simulation is particularly important in the study of digital production line planning. An ergonomics analysis methods was presented making use of these two theory of OWAS and BSHA. The process of ergonomics analysis and simulation was discussed based on the platform of Process Simulate & Process Designer. Finally, take an example, how to consider the ergonomics problems in production line planning was introduced to make a better choice between different production line planning schemes.
1780
Abstract: In this paper, the spinning process of air jet vortex spinning was described. The structure of air jet vortex spun yarn was studied by means of blending tracer fibers in spinning. Then the yarns were viewed with the optical microscope and SEM etc. The result shows that air jet vortex spun yarn comprises two parts. The outer layer, composed of twisted fibers, presents helical form. And the inner layer contains about 30% fibers untwisted or slackly twisted. The distance between twisted fiber groups is very short, so the borderline isnt obvious. There is a certain angle between core fibers in parallel and the axes of the yarn. The coefficient of fiber migration of the yarn was calculated, and it is lower than that of ring spun yarn and compact spun yarn.
1784
Abstract: With increasing problems of network security, a server with high concurrency is designed here to deal with identity authentication. In the general design of the server, RSA and DES algorithm are used. RSA algorithm is used to encrypt or decrypt users identity information. DES algorithm is used to ensure the information will not be stolen. In order to ensure the server has high concurrency, the technology of epoll and thread pool is applied to design the server in the Linux system. In the end , integration testing and stress testing are performed to test its reliability and stability. The testing result shows that the server can run properly under heavy concurrent load.
1791
Abstract: In cloud computing applications, the data security is a primary concern of user. In this paper, for the problem that data of the HDFS cannot be destroyed completely in open source cloud storage system, which may lead to data leakage, it designs a destruction mechanism of HDFS with multiple security level. This mechanism make data effectively destroyed by the method of data overwrite which makes a balance between security requirements and performance requirements. The Simulation experiments show that the mechanism can override a Block file in HDFS environment effectively to achieve the purpose of data destroying. At the same the overhead of different overwrite algorithm is different also which can ensure the security and efficiency is balanced.
1795
Abstract: In this paper, we show that the symmetric group can be characterized by its order and degree pattern. In fact, we get the following theorem: Let G be a finite group such that and . Then G is isomorphisic to one of the almost simple groups: and . Particularly, is 3-fold OD-characterizable.
1799

Showing 341 to 350 of 403 Paper Titles