Aim To develop an information processing system with real time processing capability and artistic user interface for the optoelectronic antagonism general measuring system. Methods The A/D board and the multifun...Aim To develop an information processing system with real time processing capability and artistic user interface for the optoelectronic antagonism general measuring system. Methods The A/D board and the multifunctional board communicating with every instruments were designed, data collecting and processing were realized by selecting appropriate software platform. Results Simulating results show the information processing system can operate correctly and dependably, the measuring rules, interactive interface and data handling method were all accepted by the user. Conclusion The designing approach based on the mix platform takes advantages of the two operating systems, the desired performances are acquired both in the real time processing and with the friendly artistic user interface.展开更多
Perfusion computed tomography (CT) has emerged as a novel functional imaging technique with gradually increasing importance in the management of colorectal cancer (CRC).By providing the functional tumor microvasculatu...Perfusion computed tomography (CT) has emerged as a novel functional imaging technique with gradually increasing importance in the management of colorectal cancer (CRC).By providing the functional tumor microvasculature,it also helps the assessment of therapeutic response of anti-angiogenic drugs as it may reflect tumor angiogenesis.Perfusion CT has been applied in clinical practice to delineate inflammatory or neoplastic lymph nodes irrespective of their size,identify micro-metastases and to predict metastases in advance of their development.It is of increasing significance for preoperative adjuvant therapies and avoidance of unnecessary interventions.Despite controversies regarding the techniques employed,its validity and reproducibility,it can be advantageous in the management of CRCs in which the prognosis is dependent on preoperative staging.With recent advances in the perfusion CT techniques,and incorporation to other modalities like positron emission tomography,perfusion CT will be a novel tool in the overall management of CRCs.This article aims at reviewing the existing clinical applications and recent advances of perfusion CT with a reference to future development in the management of CRCs.展开更多
This paper presents an overlay network topology called Virtual and Dynamic Hierarchical Architecture (VDHA) for discovering Grid services with high performance. Service discovery based on VDHA has scalable, autonomous...This paper presents an overlay network topology called Virtual and Dynamic Hierarchical Architecture (VDHA) for discovering Grid services with high performance. Service discovery based on VDHA has scalable, autonomous, efficient, reliable and quick responsive. We propose two service discovery algorithms. Full Search Query and Discovery Protocol (FSQDP) discovers the nodes that match the request message from all N nodes, which has time complexity O(logN), space complexity O(nvg) (nvg being node numbers of each virtual group), and message-cost O(N), and Domain-Specific Query and Discovery Protocol (DSQDP) searches nodes in only specific domains with time complexity O(nvg), space complexity O(nvg), and message-cost O(nvg). In this paper, we also describe VDHA, its formal definition, and Grid Group Management Protocol.展开更多
Applying IEEE802.11MAC protocols in baltery-powered devices make power consumption critical demand upon implementation.A statistical study on operator/bit usage,the weight of operator and operator type in the programs...Applying IEEE802.11MAC protocols in baltery-powered devices make power consumption critical demand upon implementation.A statistical study on operator/bit usage,the weight of operator and operator type in the programs has been done,including converting the MAC functions from SDL to C to ASM with tow RISC targts. The study shows that implementing MAC. functions should consider real-time protocol re3quirements by dividing MAC functions into sets. We enhance the set of time-critical functions implemented to dedicated hardwere and the set of non-time-critical functions implemented to software run with embedded processor. This heterogeneous system is proposed in consideration of our study results to reduce popwer consumption.展开更多
Objective: The aim was to evaluate the best intra-thoracoscopic surgery technique between video-assisted thoracic surgery (VATS) combined with laparoscopy and right open transthoracic esophagectomy, in patients with e...Objective: The aim was to evaluate the best intra-thoracoscopic surgery technique between video-assisted thoracic surgery (VATS) combined with laparoscopy and right open transthoracic esophagectomy, in patients with esophageal cancer. Methods: From November 2006 to May 2008, 221 patients with esophageal cancer were enrolled in this study, prospective randomized in two groups. 111 patients were performed the VATS technique (Experimental group), whereas in the other 110 patients esophagectomy was adopted by thoracotomy (Control group). Results: The time consuming of Experimental group was 272.3 min in average with a standard deviation(std) of 57.9, and it was 218.7 min in average with std of 91.0 in the control group (P=0.000). The operative blood loss was 219.7±194.4 mL in the Experimental group, compared with 590.0±324.4 mL in the control group, with significant difference (P=0.000). Postoperative hospital stay of Experimental group was 9.6±1.7d, and it was 11.4±2.3d in the control group (P=0.000). There was no-delayed union of incision in the Experimental group, but 6.36% in the control group (P=0.007). The disorder of gastric emptying occurred 0.9% in the Experimental group, whereas 6.4% in the Control group. There was no significant difference in survival curves and rates (P=0.555). Conclusion: There were several advantages of VATS technique, such as reduced hemorrhage, better recovery, few complications, and great number of lymph node dissection, although there was no significant difference in long-term survival rate. Thus the VATS combined with laparoscopy technique was worthy of generalization in esophageal surgery with good prospects.展开更多
A theoretical protocol of quantum dialogue is proposed,which uses a class of three-photon W states asquantum channel.After two-step security check,four-bit secret message can be transmitted to each other by transmitti...A theoretical protocol of quantum dialogue is proposed,which uses a class of three-photon W states asquantum channel.After two-step security check,four-bit secret message can be transmitted to each other by transmittingof single photon with the aid of two-bit classical information.展开更多
With the development of Ethernet systems and the growing capacity of modem silicon technology, embedded communication networks are playing an increasingly important role in embedded and safety critical systems. Hardwa...With the development of Ethernet systems and the growing capacity of modem silicon technology, embedded communication networks are playing an increasingly important role in embedded and safety critical systems. Hardware/software co-design is a methodology for solving design problems in processor based embedded systems. In this work, we implemented a new 1-cycle pipeline microprocessor and a fast Ethemet transceiver and established a low cost, high performance embedded network controller, and designed a TCP/IP stack to access the Intemet. We discussed the hardware/software architecture in the forepart, and then the whole system-on-a-chip on Altera Stratix EP1S25F780C6 device. Using the FPGA environment and SmartBit tester, we tested the system's throughput. Our simulation results showed that the maximum throughput of Ethemet packets is up to 7 Mbps, that of UDP packets is up to 5.8 Mbps, and that of TCP packets is up to 3.4 Mbps, which showed that this embedded system can easily transmit basic voice and video signals through Ethemet, and that using only one chip can realize that many electronic devices access to the Intemet directly and get high performance.展开更多
The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer Network ( MP2...The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer Network ( MP2PN ). The MP2PN contains some super peers and each super peer controls a subgroup composed of regular peers. An efficient attribute-based signature based on Cipertext-Policy Attribute-Based Encryption (CP-ABE) is proposed and used in this group-key rmnagement protocol to authenticate a peer's at- tributes and identity. A peer can be described by a set of attributes or one unique special identity at- tribute. Peers that have some attributes in common can form a group and conmmnicate with each other anonymously and securely. Any super peer can initiate a group and act as a group controller. The group controller can authenticate a peer's attributes and identity as well as remove malicious peers. Any peer with attributes that rmtches the access structure can join the group and provide its input to form the group key. The proposed protocol pro- vides backward and forward secrecy. The sinmlation results show that this protocol is applicable for mobile devices and can meet the MP2PN requirements of group communication.展开更多
In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data...In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data collection and transmission, and function nodes are responsible for key management. There are more than one function nodes in the cluster consulting the key generation and other security decision-making. The function nodes are the second-class security center because of the characteristics of the distributed WSNs. Secondly, It is also described that the formation of function nodes and cluster heads under the control of the former, and five kinds of keys, i.e., individual key, pairwise keys, cluster key, management key, and group key. Finally, performance analysis and experiments show that, the protocol is superior in communication and energy consumption. The delay of establishing the cluster key meets the requirements, and a multiple pairwise key which adopts the coordinated security authentication scheme is provided.展开更多
A multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was proposed by Gao [Commun. Theor. Phys. 52 (2009) 421] recently. This study points out that the performance of Gao...A multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was proposed by Gao [Commun. Theor. Phys. 52 (2009) 421] recently. This study points out that the performance of Gao's protocol can be much improved by using the technique of decoy single photons and carefully modifying the protocol to remove some unnecessary unitary operations, devices, and transmissions.展开更多
With the increasing importance of cloud services worldwide, the cloud infrastructure and platform management has become critical for cloud service providers. In this paper, a novel architecture of intelligent server m...With the increasing importance of cloud services worldwide, the cloud infrastructure and platform management has become critical for cloud service providers. In this paper, a novel architecture of intelligent server management framework is proposed. In this framework, the communication layer is based on the Extensible Messaging and Presence Protocol (XMPP), which was developed for instant messaging and has been proven to be highly mature and suitable for mobile and large scalable deployment due to its extensibility and efficiency. The proposed architecture can simplify server management and increase flexibility and scalability when managing hundreds of thousands of servers in the cloud era.展开更多
Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws ...Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future.展开更多
Due to complex computation and poor real-time performance of the traditional iris recognition system,iris feature is extracted by using amplitude and phase information of the mean image blocks based on Gabor filtering...Due to complex computation and poor real-time performance of the traditional iris recognition system,iris feature is extracted by using amplitude and phase information of the mean image blocks based on Gabor filtering on image,and the k-nearest neighbor algorithm is combined to complete iris recognition function.The recognition reduces the recognition time and improves the recognition accuracy.At the same time,identification result is transmitted to the cloud server through ZigBee network to solve diffcult wiring problem.The experiment shows the system runs stably and has fast recognition speed.It has been applied to a security system.展开更多
Consensus tracking control problems for single-integrator dynamics of multi-agent systems with switching topology are investigated. In order to design effective consensus tracking protocols for a more general class of...Consensus tracking control problems for single-integrator dynamics of multi-agent systems with switching topology are investigated. In order to design effective consensus tracking protocols for a more general class of networks, which are aimed at ensuring that the concerned states of agents converge to a constant or time-varying reference state, new consensus tracking protocols with a constant and time-varying reference state are proposed, respectively. Particularly, by contrast with spanning tree, an improved condition of switching interaction topology is presented. And then, convergence analysis of two consensus tracking protocols is provided by Lyapunov stability theory. Moreover, consensus tracking protocol with a time-varying reference state is extended to achieve the fbrmation control. By introducing formation structure set, each agent can gain its individual desired trajectory. Finally, several simulations are worked out to illustrate the effectiveness of theoretical results. The test results show that the states of agents can converge to a desired constant or time-varying reference state. In addition, by selecting appropriate structure set, agents can maintain the expected formation under random switching interaction topologies.展开更多
In order to develop a practical postprocessor for 5-axis machine tool,the general equations of numerically controlled(NC) data for 5-axis configurations with non-orthogonal rotary axes were exactly expressed by the in...In order to develop a practical postprocessor for 5-axis machine tool,the general equations of numerically controlled(NC) data for 5-axis configurations with non-orthogonal rotary axes were exactly expressed by the inverse kinematics,and a windows-based postprocessor written with Visual Basic was developed according to the proposed algorithm.The developed postprocessor is a general system suitable for all kinds of 5-axis machines with orthogonal and non-orthogonal rotary axes.Through implementation of the developed postprocessor and verification by a cutting simulation and machining experiment,the effectiveness of the proposed algorithm is confirmed.Compatibility is improved by allowing exchange of data formats such as rotational total center position(RTCP) controlled NC data,vector post NC data,and program object file(POF) cutter location(CL) data,and convenience is increased by adding the function of work-piece origin offset.Consequently,a practical post-processor for 5-axis machining is developed.展开更多
In the knowledge management domain, the conversion of tacit knowledge to explicit knowledge is critical because it is a prerequisite to the knowledge amplification process wherein knowledge becomes part of an organiza...In the knowledge management domain, the conversion of tacit knowledge to explicit knowledge is critical because it is a prerequisite to the knowledge amplification process wherein knowledge becomes part of an organization's knowledge network. Although codified knowledge and its capture is commonplace, tacit knowledge has up until recent years proved elusive in its inclusion within the organization's knowledge base. In this paper, the conversion process has been dealt with the help of protocols. It is learned that while structure may significantly improve the tacit to explicit conversion process, it also may matter how the structure is employed. It is anticipated that eventual successful modeling of such knowledge will ultimately be undertaken in several organizations with a view to improving information capture and transference.展开更多
文摘Aim To develop an information processing system with real time processing capability and artistic user interface for the optoelectronic antagonism general measuring system. Methods The A/D board and the multifunctional board communicating with every instruments were designed, data collecting and processing were realized by selecting appropriate software platform. Results Simulating results show the information processing system can operate correctly and dependably, the measuring rules, interactive interface and data handling method were all accepted by the user. Conclusion The designing approach based on the mix platform takes advantages of the two operating systems, the desired performances are acquired both in the real time processing and with the friendly artistic user interface.
文摘Perfusion computed tomography (CT) has emerged as a novel functional imaging technique with gradually increasing importance in the management of colorectal cancer (CRC).By providing the functional tumor microvasculature,it also helps the assessment of therapeutic response of anti-angiogenic drugs as it may reflect tumor angiogenesis.Perfusion CT has been applied in clinical practice to delineate inflammatory or neoplastic lymph nodes irrespective of their size,identify micro-metastases and to predict metastases in advance of their development.It is of increasing significance for preoperative adjuvant therapies and avoidance of unnecessary interventions.Despite controversies regarding the techniques employed,its validity and reproducibility,it can be advantageous in the management of CRCs in which the prognosis is dependent on preoperative staging.With recent advances in the perfusion CT techniques,and incorporation to other modalities like positron emission tomography,perfusion CT will be a novel tool in the overall management of CRCs.This article aims at reviewing the existing clinical applications and recent advances of perfusion CT with a reference to future development in the management of CRCs.
文摘This paper presents an overlay network topology called Virtual and Dynamic Hierarchical Architecture (VDHA) for discovering Grid services with high performance. Service discovery based on VDHA has scalable, autonomous, efficient, reliable and quick responsive. We propose two service discovery algorithms. Full Search Query and Discovery Protocol (FSQDP) discovers the nodes that match the request message from all N nodes, which has time complexity O(logN), space complexity O(nvg) (nvg being node numbers of each virtual group), and message-cost O(N), and Domain-Specific Query and Discovery Protocol (DSQDP) searches nodes in only specific domains with time complexity O(nvg), space complexity O(nvg), and message-cost O(nvg). In this paper, we also describe VDHA, its formal definition, and Grid Group Management Protocol.
文摘Applying IEEE802.11MAC protocols in baltery-powered devices make power consumption critical demand upon implementation.A statistical study on operator/bit usage,the weight of operator and operator type in the programs has been done,including converting the MAC functions from SDL to C to ASM with tow RISC targts. The study shows that implementing MAC. functions should consider real-time protocol re3quirements by dividing MAC functions into sets. We enhance the set of time-critical functions implemented to dedicated hardwere and the set of non-time-critical functions implemented to software run with embedded processor. This heterogeneous system is proposed in consideration of our study results to reduce popwer consumption.
文摘Objective: The aim was to evaluate the best intra-thoracoscopic surgery technique between video-assisted thoracic surgery (VATS) combined with laparoscopy and right open transthoracic esophagectomy, in patients with esophageal cancer. Methods: From November 2006 to May 2008, 221 patients with esophageal cancer were enrolled in this study, prospective randomized in two groups. 111 patients were performed the VATS technique (Experimental group), whereas in the other 110 patients esophagectomy was adopted by thoracotomy (Control group). Results: The time consuming of Experimental group was 272.3 min in average with a standard deviation(std) of 57.9, and it was 218.7 min in average with std of 91.0 in the control group (P=0.000). The operative blood loss was 219.7±194.4 mL in the Experimental group, compared with 590.0±324.4 mL in the control group, with significant difference (P=0.000). Postoperative hospital stay of Experimental group was 9.6±1.7d, and it was 11.4±2.3d in the control group (P=0.000). There was no-delayed union of incision in the Experimental group, but 6.36% in the control group (P=0.007). The disorder of gastric emptying occurred 0.9% in the Experimental group, whereas 6.4% in the Control group. There was no significant difference in survival curves and rates (P=0.555). Conclusion: There were several advantages of VATS technique, such as reduced hemorrhage, better recovery, few complications, and great number of lymph node dissection, although there was no significant difference in long-term survival rate. Thus the VATS combined with laparoscopy technique was worthy of generalization in esophageal surgery with good prospects.
基金Supported by the National Natural Science Foundation of China under Grant No.10704011the Research Programs of the Educational Office of Liaoning Province under Grant No.2008006
文摘A theoretical protocol of quantum dialogue is proposed,which uses a class of three-photon W states asquantum channel.After two-step security check,four-bit secret message can be transmitted to each other by transmittingof single photon with the aid of two-bit classical information.
文摘With the development of Ethernet systems and the growing capacity of modem silicon technology, embedded communication networks are playing an increasingly important role in embedded and safety critical systems. Hardware/software co-design is a methodology for solving design problems in processor based embedded systems. In this work, we implemented a new 1-cycle pipeline microprocessor and a fast Ethemet transceiver and established a low cost, high performance embedded network controller, and designed a TCP/IP stack to access the Intemet. We discussed the hardware/software architecture in the forepart, and then the whole system-on-a-chip on Altera Stratix EP1S25F780C6 device. Using the FPGA environment and SmartBit tester, we tested the system's throughput. Our simulation results showed that the maximum throughput of Ethemet packets is up to 7 Mbps, that of UDP packets is up to 5.8 Mbps, and that of TCP packets is up to 3.4 Mbps, which showed that this embedded system can easily transmit basic voice and video signals through Ethemet, and that using only one chip can realize that many electronic devices access to the Intemet directly and get high performance.
基金This paper was supported by the National Natural Science Foundation of China under Grant No. 61073042 the Fundamental Research Funds for the Central Universities under Grant No HEUCF100606 the Open Foundation of Network and Data Security Key Laboratory of Sichuan Province under Crant No 201107.
文摘The authentication and privacy of a group member is important in multicast communication. This paper proposes a privacy-preserving authenticated group-key management protocol for the Mobile Peer-to-Peer Network ( MP2PN ). The MP2PN contains some super peers and each super peer controls a subgroup composed of regular peers. An efficient attribute-based signature based on Cipertext-Policy Attribute-Based Encryption (CP-ABE) is proposed and used in this group-key rmnagement protocol to authenticate a peer's at- tributes and identity. A peer can be described by a set of attributes or one unique special identity at- tribute. Peers that have some attributes in common can form a group and conmmnicate with each other anonymously and securely. Any super peer can initiate a group and act as a group controller. The group controller can authenticate a peer's attributes and identity as well as remove malicious peers. Any peer with attributes that rmtches the access structure can join the group and provide its input to form the group key. The proposed protocol pro- vides backward and forward secrecy. The sinmlation results show that this protocol is applicable for mobile devices and can meet the MP2PN requirements of group communication.
基金Supported by the National Natural Science Foundation of China (No. 60475012)
文摘In this letter, a Function node-based Multiple Pairwise Keys Management (MPKMF) protocol for Wireless Sensor Networks (WSNs) is firstly designed, in which ordinary nodes and cluster head nodes are responsible for data collection and transmission, and function nodes are responsible for key management. There are more than one function nodes in the cluster consulting the key generation and other security decision-making. The function nodes are the second-class security center because of the characteristics of the distributed WSNs. Secondly, It is also described that the formation of function nodes and cluster heads under the control of the former, and five kinds of keys, i.e., individual key, pairwise keys, cluster key, management key, and group key. Finally, performance analysis and experiments show that, the protocol is superior in communication and energy consumption. The delay of establishing the cluster key meets the requirements, and a multiple pairwise key which adopts the coordinated security authentication scheme is provided.
基金Supported by the National Science Council of Taiwan under Contract No. NSC99-2221-E-471-001
文摘A multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was proposed by Gao [Commun. Theor. Phys. 52 (2009) 421] recently. This study points out that the performance of Gao's protocol can be much improved by using the technique of decoy single photons and carefully modifying the protocol to remove some unnecessary unitary operations, devices, and transmissions.
文摘With the increasing importance of cloud services worldwide, the cloud infrastructure and platform management has become critical for cloud service providers. In this paper, a novel architecture of intelligent server management framework is proposed. In this framework, the communication layer is based on the Extensible Messaging and Presence Protocol (XMPP), which was developed for instant messaging and has been proven to be highly mature and suitable for mobile and large scalable deployment due to its extensibility and efficiency. The proposed architecture can simplify server management and increase flexibility and scalability when managing hundreds of thousands of servers in the cloud era.
基金supported in part by the Natioual Natural Science Foundation of China(Grant No.60933003)the High Technical Research and Development Program of China(Grant No.2006AA01Z101)+1 种基金Shaanxi ISTC(Grant No.2008KW-02)IBM Joint Project
文摘Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future.
文摘Due to complex computation and poor real-time performance of the traditional iris recognition system,iris feature is extracted by using amplitude and phase information of the mean image blocks based on Gabor filtering on image,and the k-nearest neighbor algorithm is combined to complete iris recognition function.The recognition reduces the recognition time and improves the recognition accuracy.At the same time,identification result is transmitted to the cloud server through ZigBee network to solve diffcult wiring problem.The experiment shows the system runs stably and has fast recognition speed.It has been applied to a security system.
基金Projects(61075065,60774045) supported by the National Natural Science Foundation of ChinaProject supported by the Graduate Degree Thesis Innovation Foundation of Central South University,China
文摘Consensus tracking control problems for single-integrator dynamics of multi-agent systems with switching topology are investigated. In order to design effective consensus tracking protocols for a more general class of networks, which are aimed at ensuring that the concerned states of agents converge to a constant or time-varying reference state, new consensus tracking protocols with a constant and time-varying reference state are proposed, respectively. Particularly, by contrast with spanning tree, an improved condition of switching interaction topology is presented. And then, convergence analysis of two consensus tracking protocols is provided by Lyapunov stability theory. Moreover, consensus tracking protocol with a time-varying reference state is extended to achieve the fbrmation control. By introducing formation structure set, each agent can gain its individual desired trajectory. Finally, several simulations are worked out to illustrate the effectiveness of theoretical results. The test results show that the states of agents can converge to a desired constant or time-varying reference state. In addition, by selecting appropriate structure set, agents can maintain the expected formation under random switching interaction topologies.
基金Work supported by the Second Stage of Brain Korea 21 Projects
文摘In order to develop a practical postprocessor for 5-axis machine tool,the general equations of numerically controlled(NC) data for 5-axis configurations with non-orthogonal rotary axes were exactly expressed by the inverse kinematics,and a windows-based postprocessor written with Visual Basic was developed according to the proposed algorithm.The developed postprocessor is a general system suitable for all kinds of 5-axis machines with orthogonal and non-orthogonal rotary axes.Through implementation of the developed postprocessor and verification by a cutting simulation and machining experiment,the effectiveness of the proposed algorithm is confirmed.Compatibility is improved by allowing exchange of data formats such as rotational total center position(RTCP) controlled NC data,vector post NC data,and program object file(POF) cutter location(CL) data,and convenience is increased by adding the function of work-piece origin offset.Consequently,a practical post-processor for 5-axis machining is developed.
文摘In the knowledge management domain, the conversion of tacit knowledge to explicit knowledge is critical because it is a prerequisite to the knowledge amplification process wherein knowledge becomes part of an organization's knowledge network. Although codified knowledge and its capture is commonplace, tacit knowledge has up until recent years proved elusive in its inclusion within the organization's knowledge base. In this paper, the conversion process has been dealt with the help of protocols. It is learned that while structure may significantly improve the tacit to explicit conversion process, it also may matter how the structure is employed. It is anticipated that eventual successful modeling of such knowledge will ultimately be undertaken in several organizations with a view to improving information capture and transference.