This paper presents an approximation method to display realistic pictures of numerical control (NC) machining simulation very quickly. T he tool movement envelope is divided into many small regions and the normal to...This paper presents an approximation method to display realistic pictures of numerical control (NC) machining simulation very quickly. T he tool movement envelope is divided into many small regions and the normal to t hese small regions is calculated. The system saves the calculated result in a fi le before starting animation display. When the system starts displaying machinin g animation, it does not need to calculate small triangular facets normal to the workpiece surface. It only needs to find out what part of the cutter cuts the w orkpiece surface and to read the normal from the file. A highly efficient NC cod e verification method is also presented in this paper. The method first detects the error in z direction. If some points are reported to be out of the tolerance , the system divides neighborhood of these points into smaller grids and calcula tes the normal surface at each grid intersection and the error in the normal ve ctor direction.展开更多
A series of AZ80 billets were compressed with 60%height reduction on hot process simulator at 250,300,350,400℃ under strain rates of 0.01,0.1,1 and 10 s- 1.In order to predict the occurrence of surface fracture,the v...A series of AZ80 billets were compressed with 60%height reduction on hot process simulator at 250,300,350,400℃ under strain rates of 0.01,0.1,1 and 10 s- 1.In order to predict the occurrence of surface fracture,the values of the Cockcroft-Latham equation were calculated by the corresponding finite element numerical algorithm developed.A concept about damage incremental ratio in plastic deformation was defined as the ratio of damage increment at one step to the accumulated value.A method of finding the intersection of incremental ratio varying curve and simulation step axis was brought forward to make the fracture step certain. Then,the effects of temperature and strain rate on critical damage value were achieved.The results show that the critical damage value is not a constant but changes in a range of 0.021 8-0.378 0.It decreases significantly with the increase of strain rate at a certain temperature.While under a certain strain rate,the critical damage value has little change with the increase of temperature.展开更多
In this paper,a low complexity ESPRIT algorithm based on power method and Orthogo- nal-triangular (QR) decomposition is presented for direction finding,which does not require a priori knowledge of source number and th...In this paper,a low complexity ESPRIT algorithm based on power method and Orthogo- nal-triangular (QR) decomposition is presented for direction finding,which does not require a priori knowledge of source number and the predetermined threshold (separates the signal and noise ei- gen-values).Firstly,according to the estimation of noise subspace obtained by the power method,a novel source number detection method without eigen-decomposition is proposed based on QR de- composition.Furthermore,the eigenvectors of signal subspace can be determined according to Q matrix and then the directions of signals could be computed by the ESPRIT algorithm.To determine the source number and subspace,the computation complexity of the proposed algorithm is approximated as (2log_2 n+2.67)M^3,where n is the power of covariance matrix and M is the number of array ele- ments.Compared with the Single Vector Decomposition (SVD) based algorithm,it has a substantial computational saving with the approximation performance.The simulation results demonstrate its effectiveness and robustness.展开更多
An Efficient and flexible implementation of block ciphers is critical to achieve information security processing.Existing implementation methods such as GPP,FPGA and cryptographic application-specific ASIC provide the...An Efficient and flexible implementation of block ciphers is critical to achieve information security processing.Existing implementation methods such as GPP,FPGA and cryptographic application-specific ASIC provide the broad range of support.However,these methods could not achieve a good tradeoff between high-speed processing and flexibility.In this paper,we present a reconfigurable VLIW processor architecture targeted at block cipher processing,analyze basic operations and storage characteristics,and propose the multi-cluster register-file structure for block ciphers.As for the same operation element of block ciphers,we adopt reconfigurable technology for multiple cryptographic processing units and interconnection scheme.The proposed processor not only flexibly accomplishes the combination of multiple basic cryptographic operations,but also realizes dynamic configuration for cryptographic processing units.It has been implemented with0.18μm CMOS technology,the test results show that the frequency can reach 350 MHz.and power consumption is 420 mw.Ten kinds of block and hash ciphers were realized in the processor.The encryption throughput of AES,DES,IDEA,and SHA-1 algorithm is1554 Mbps,448Mbps,785 Mbps,and 424 Mbps respectively,the test result shows that our processor's encryption performance is significantly higher than other designs.展开更多
The permutation flow shop scheduling problems with deteriorating jobs and rejection on dominant machines were studied.The objectives are to minimize the makespan of scheduled jobs plus the total rejection penalty and ...The permutation flow shop scheduling problems with deteriorating jobs and rejection on dominant machines were studied.The objectives are to minimize the makespan of scheduled jobs plus the total rejection penalty and the total completion time of scheduled jobs plus the total rejection penalty.For each objective, polynomial time algorithms based on dynamic programming were presented.展开更多
The implementation of small size cryptography algorithm is a critical problem for wireless sensor network. A low cost compact intellectual property (IP) core of the entire advanced encryption standard (AES) algori...The implementation of small size cryptography algorithm is a critical problem for wireless sensor network. A low cost compact intellectual property (IP) core of the entire advanced encryption standard (AES) algorithm for wireless sensor network is presented in this paper. A compact encryption and decryption system using only four sharing S-Boxes is obtained, employing sharing between the encryption and decryption processes. Our design proposes use of composite field data path for the SubBytes and InvSubBytes transformations. With an implementation of the AES block cipher with Virtex Ⅱ Pro FPGA using0.13μm and 90nm process technology, our area optimized consumes 16.8k equivalent gates. The speed of this implementation is also reduced to 0.45Gbits/s. Compared with previous implementations, our design achieves significant low-cost area with acceptable throughput.展开更多
Estimation of domestic and overseas value-added of manufacturing sector is an important and difficult subject for the science-based evaluation of a country's trade interests under global value chain. Traditional HIY ...Estimation of domestic and overseas value-added of manufacturing sector is an important and difficult subject for the science-based evaluation of a country's trade interests under global value chain. Traditional HIY approach overestimates the domestic value- added of export. Although Koopman's method made certain improvements, it cannot utilize traditional I/O matrix and direct input coefficient matrix under the condition of incomplete information. By creating GAMS model, this paper addresses the above-mentioned problems and employs an improved model for the estimation of variations in domestic and overseas value-added of Chinese exports between 2002 and 2012. Our results indicate that by neglecting the export of processing trade, HIY approach overestimates the domestic value- added ratio of Chinese exports. As more imported intermediate inputs have been used in the export of processing trade, the estimation result of this paper have corrected deviations in the forecast of overseas value-added ratio and its tendencies based on HIY method Further analysis of specific factors of domestic value-added of export led to the discovery that the domestic value-added of export of processing trade and mixed trade is highly vulnerable to the impact of international capital inflow. It can be seen that the improved method for the estimation of value-added has indeed corrected the deviations in the estimation of China's value-added. In conclusion, China should accelerate the development of export of non- processing trade and trade in high-end services, and balance the relationship of export between local firms and foreign-funded firms, with a view to improving trade dependence and increasing the trade status of Chinese manufaeturing firms in global value chain.展开更多
Proposed a novel approach to detect changes in the product quality of process systems by using negative selection algorithms inspired by the natural immune system. The most important input variables of the process sys...Proposed a novel approach to detect changes in the product quality of process systems by using negative selection algorithms inspired by the natural immune system. The most important input variables of the process system was represented by artificial immune cells, from which product quality was inferred, instead of directly using the prod- uct quality which was hard to measure online, e.g. the ash content of coal flotation con- centrate. The experiment was presented and then the result was analyzed.展开更多
Previous weighted frequent pattern (WFP) mining algorithms are not suitable for data streams for they need multiple database scans. In this paper, we present an efficient algorithm SWFP-Miner to mine weighted freque...Previous weighted frequent pattern (WFP) mining algorithms are not suitable for data streams for they need multiple database scans. In this paper, we present an efficient algorithm SWFP-Miner to mine weighted frequent pattern over data streams. SWFP-Miner is based on sliding window and can discover important frequent pattern from the recent data. A new refined weight definition is proposed to keep the downward closure property, and two pruning strategies are presented to prune the weighted infrequent pattern. Experimental studies are performed to evaluate the effectiveness and efficiency of SWFP-Miner.展开更多
In this paper, by considering the fuzzy nature of the data in real-life problems, single machine scheduling problems with fuzzy processing time and multiple objectives are formulated and an efficient genetic algorithm...In this paper, by considering the fuzzy nature of the data in real-life problems, single machine scheduling problems with fuzzy processing time and multiple objectives are formulated and an efficient genetic algorithm which is suitable for solving these problems is proposed. As illustrative numerical examples, twenty jobs processing on a machine is considered. The feasibility and effectiveness of the proposed method have been demonstrated in the simulation.展开更多
文摘This paper presents an approximation method to display realistic pictures of numerical control (NC) machining simulation very quickly. T he tool movement envelope is divided into many small regions and the normal to t hese small regions is calculated. The system saves the calculated result in a fi le before starting animation display. When the system starts displaying machinin g animation, it does not need to calculate small triangular facets normal to the workpiece surface. It only needs to find out what part of the cutter cuts the w orkpiece surface and to read the normal from the file. A highly efficient NC cod e verification method is also presented in this paper. The method first detects the error in z direction. If some points are reported to be out of the tolerance , the system divides neighborhood of these points into smaller grids and calcula tes the normal surface at each grid intersection and the error in the normal ve ctor direction.
基金Projects(CSTC,cstc2009aa3012-1)supported by Science and Technology Committee of Chongqing,ChinaProject(20100470813)supported by China Postdoctoral Science FoundationProject(2010011511)supported by Sharing Fund of Chongqing University’s Large-scale Equipment
文摘A series of AZ80 billets were compressed with 60%height reduction on hot process simulator at 250,300,350,400℃ under strain rates of 0.01,0.1,1 and 10 s- 1.In order to predict the occurrence of surface fracture,the values of the Cockcroft-Latham equation were calculated by the corresponding finite element numerical algorithm developed.A concept about damage incremental ratio in plastic deformation was defined as the ratio of damage increment at one step to the accumulated value.A method of finding the intersection of incremental ratio varying curve and simulation step axis was brought forward to make the fracture step certain. Then,the effects of temperature and strain rate on critical damage value were achieved.The results show that the critical damage value is not a constant but changes in a range of 0.021 8-0.378 0.It decreases significantly with the increase of strain rate at a certain temperature.While under a certain strain rate,the critical damage value has little change with the increase of temperature.
基金Supported by the National Natural Science Foundation of China (No.60102005).
文摘In this paper,a low complexity ESPRIT algorithm based on power method and Orthogo- nal-triangular (QR) decomposition is presented for direction finding,which does not require a priori knowledge of source number and the predetermined threshold (separates the signal and noise ei- gen-values).Firstly,according to the estimation of noise subspace obtained by the power method,a novel source number detection method without eigen-decomposition is proposed based on QR de- composition.Furthermore,the eigenvectors of signal subspace can be determined according to Q matrix and then the directions of signals could be computed by the ESPRIT algorithm.To determine the source number and subspace,the computation complexity of the proposed algorithm is approximated as (2log_2 n+2.67)M^3,where n is the power of covariance matrix and M is the number of array ele- ments.Compared with the Single Vector Decomposition (SVD) based algorithm,it has a substantial computational saving with the approximation performance.The simulation results demonstrate its effectiveness and robustness.
基金supported by National Natural Science Foundation of China with granted No.61404175
文摘An Efficient and flexible implementation of block ciphers is critical to achieve information security processing.Existing implementation methods such as GPP,FPGA and cryptographic application-specific ASIC provide the broad range of support.However,these methods could not achieve a good tradeoff between high-speed processing and flexibility.In this paper,we present a reconfigurable VLIW processor architecture targeted at block cipher processing,analyze basic operations and storage characteristics,and propose the multi-cluster register-file structure for block ciphers.As for the same operation element of block ciphers,we adopt reconfigurable technology for multiple cryptographic processing units and interconnection scheme.The proposed processor not only flexibly accomplishes the combination of multiple basic cryptographic operations,but also realizes dynamic configuration for cryptographic processing units.It has been implemented with0.18μm CMOS technology,the test results show that the frequency can reach 350 MHz.and power consumption is 420 mw.Ten kinds of block and hash ciphers were realized in the processor.The encryption throughput of AES,DES,IDEA,and SHA-1 algorithm is1554 Mbps,448Mbps,785 Mbps,and 424 Mbps respectively,the test result shows that our processor's encryption performance is significantly higher than other designs.
文摘The permutation flow shop scheduling problems with deteriorating jobs and rejection on dominant machines were studied.The objectives are to minimize the makespan of scheduled jobs plus the total rejection penalty and the total completion time of scheduled jobs plus the total rejection penalty.For each objective, polynomial time algorithms based on dynamic programming were presented.
文摘The implementation of small size cryptography algorithm is a critical problem for wireless sensor network. A low cost compact intellectual property (IP) core of the entire advanced encryption standard (AES) algorithm for wireless sensor network is presented in this paper. A compact encryption and decryption system using only four sharing S-Boxes is obtained, employing sharing between the encryption and decryption processes. Our design proposes use of composite field data path for the SubBytes and InvSubBytes transformations. With an implementation of the AES block cipher with Virtex Ⅱ Pro FPGA using0.13μm and 90nm process technology, our area optimized consumes 16.8k equivalent gates. The speed of this implementation is also reduced to 0.45Gbits/s. Compared with previous implementations, our design achieves significant low-cost area with acceptable throughput.
基金Project of the National Natural Sciences Foundation"Study on Trade,Investment and Industrial Relocation Based on Value Chain for the Belt and Road Initiative"(Approval No.71441039)
文摘Estimation of domestic and overseas value-added of manufacturing sector is an important and difficult subject for the science-based evaluation of a country's trade interests under global value chain. Traditional HIY approach overestimates the domestic value- added of export. Although Koopman's method made certain improvements, it cannot utilize traditional I/O matrix and direct input coefficient matrix under the condition of incomplete information. By creating GAMS model, this paper addresses the above-mentioned problems and employs an improved model for the estimation of variations in domestic and overseas value-added of Chinese exports between 2002 and 2012. Our results indicate that by neglecting the export of processing trade, HIY approach overestimates the domestic value- added ratio of Chinese exports. As more imported intermediate inputs have been used in the export of processing trade, the estimation result of this paper have corrected deviations in the forecast of overseas value-added ratio and its tendencies based on HIY method Further analysis of specific factors of domestic value-added of export led to the discovery that the domestic value-added of export of processing trade and mixed trade is highly vulnerable to the impact of international capital inflow. It can be seen that the improved method for the estimation of value-added has indeed corrected the deviations in the estimation of China's value-added. In conclusion, China should accelerate the development of export of non- processing trade and trade in high-end services, and balance the relationship of export between local firms and foreign-funded firms, with a view to improving trade dependence and increasing the trade status of Chinese manufaeturing firms in global value chain.
文摘Proposed a novel approach to detect changes in the product quality of process systems by using negative selection algorithms inspired by the natural immune system. The most important input variables of the process system was represented by artificial immune cells, from which product quality was inferred, instead of directly using the prod- uct quality which was hard to measure online, e.g. the ash content of coal flotation con- centrate. The experiment was presented and then the result was analyzed.
文摘Previous weighted frequent pattern (WFP) mining algorithms are not suitable for data streams for they need multiple database scans. In this paper, we present an efficient algorithm SWFP-Miner to mine weighted frequent pattern over data streams. SWFP-Miner is based on sliding window and can discover important frequent pattern from the recent data. A new refined weight definition is proposed to keep the downward closure property, and two pruning strategies are presented to prune the weighted infrequent pattern. Experimental studies are performed to evaluate the effectiveness and efficiency of SWFP-Miner.
基金supported by the National Natural Science Foundation of China(NNSFC)(the grant No.60274043)supported by the National High-tech Research&Development Project(863)(the grant No.2002AA412610)
文摘In this paper, by considering the fuzzy nature of the data in real-life problems, single machine scheduling problems with fuzzy processing time and multiple objectives are formulated and an efficient genetic algorithm which is suitable for solving these problems is proposed. As illustrative numerical examples, twenty jobs processing on a machine is considered. The feasibility and effectiveness of the proposed method have been demonstrated in the simulation.