The design of sleeve detach and reunion drive device of screw melt ex- truder equipment was optimized, based on the present installation of hygraulic drive device to achieve the mechanical opening and closing of the s...The design of sleeve detach and reunion drive device of screw melt ex- truder equipment was optimized, based on the present installation of hygraulic drive device to achieve the mechanical opening and closing of the sleeve, the dynamic model of the sleeve detach and reunion drive was theoretically measured, and it was verified that the device is simple to operate and convenient to maintain, thus it has great social values.展开更多
Customer requirements analysis is the key step for product variety design of mass customiza-tion(MC). Quality function deployment (QFD) is a widely used management technique for understanding the voice of the customer...Customer requirements analysis is the key step for product variety design of mass customiza-tion(MC). Quality function deployment (QFD) is a widely used management technique for understanding the voice of the customer (VOC), however, QFD depends heavily on human subject judgment during extracting customer requirements and determination of the importance weights of customer requirements. QFD pro-cess and related problems are so complicated that it is not easily used. In this paper, based on a general data structure of product family, generic bill of material (GBOM), association rules analysis was introduced to construct the classification mechanism between customer requirements and product architecture. The new method can map customer requirements to the items of product family architecture respectively, accomplish the mapping process from customer domain to physical domain directly, and decrease mutual process between customer and designer, improve the product design quality, and thus furthest satisfy customer needs. Finally, an example of customer requirements mapping of the elevator cabin was used to illustrate the proposed method.展开更多
This paper addresses multi-resource fair allocation: a fundamental research topic in cloud computing. To improve resource utilization under well-studied fairness constraints, we propose a new allocation mechanism call...This paper addresses multi-resource fair allocation: a fundamental research topic in cloud computing. To improve resource utilization under well-studied fairness constraints, we propose a new allocation mechanism called Dominant Resource with Bottlenecked Fairness(DRBF), which generalizes Bottleneck-aware Allocation(BAA) to the settings of Dominant Resource Fairness(DRF). We classify users into different queues by their dominant resources. The goals are to ensure that users in the same queue receive allocations in proportion to their fair shares while users in different queues receive allocations that maximize resource utilization subject to well-studied fairness properties such as those in DRF. Under DRBF, no user 1) is worse off sharing resources than dividing resources equally among all users; 2) prefers the allocation of another user; 3) can improve their own allocation without reducing other users' allocations; and(4) can benefit by misreporting their resource demands. Experiments demonstrate that the proposed allocation policy performs better in terms of high resource utilization than does DRF.展开更多
Because of cloud computing's high degree of polymerization calculation mode, it can't give full play to the resources of the edge device such as computing, storage, etc. Fog computing can improve the resource ...Because of cloud computing's high degree of polymerization calculation mode, it can't give full play to the resources of the edge device such as computing, storage, etc. Fog computing can improve the resource utilization efficiency of the edge device, and solve the problem about service computing of the delay-sensitive applications. This paper researches on the framework of the fog computing, and adopts Cloud Atomization Technology to turn physical nodes in different levels into virtual machine nodes. On this basis, this paper uses the graph partitioning theory to build the fog computing's load balancing algorithm based on dynamic graph partitioning. The simulation results show that the framework of the fog computing after Cloud Atomization can build the system network flexibly, and dynamic load balancing mechanism can effectively configure system resources as well as reducing the consumption of node migration brought by system changes.展开更多
We study the attack vulnerability of network with duplication-divergence mechanism. Numerical results have shown that the duplication-divergence network with larger retention probability a is more robust against targe...We study the attack vulnerability of network with duplication-divergence mechanism. Numerical results have shown that the duplication-divergence network with larger retention probability a is more robust against target attack relatively. Furthermore, duplication-divergence network is broken down more quickly than its counterpart BA network under target attack. Such result is consistent with the fact of WWW and Internet networks under target attack. So duplication-divergence model is a more realistic one for us to investigate the characteristics of the world wide web in future. We also observe that the exponent γ of degree distribution and average degree are important parameters of networks, reflecting the performance of networks under target attack. Our results are helpful to the research on the security of network.展开更多
This paper aims to provide a design about a kind of low-cost "sub-mother" UAV small formation by using the low-cost micro-UAV as the platform. Combined with the current international situation in the UAV formation r...This paper aims to provide a design about a kind of low-cost "sub-mother" UAV small formation by using the low-cost micro-UAV as the platform. Combined with the current international situation in the UAV formation research, the modeling is based on the distributed control method and the behavior-based strategy. In this paper, some research to a few key issues has been carried out.展开更多
Separation issue is one of the most important problems about cloud computing security. Tenants should be separated from each other based on cloud infrastructure and different users from one tenant should be separated ...Separation issue is one of the most important problems about cloud computing security. Tenants should be separated from each other based on cloud infrastructure and different users from one tenant should be separated from each other with the constraint of security policies. Learning from the notion of trusted cloud computing and trustworthiness in cloud, in this paper, a multi-level authorization separation model is formally described, and a series of rules are proposed to summarize the separation property of this model. The correctness of the rules is proved. Furthermore, based on this model, a tenant separation mechanism is deployed in a real world mixed-critical information system. Performance benchmarks have shown the availability and efficiency of this mechanism.展开更多
To monitor, control and manage the work process of computer numerical control machine tools in a flexible manufacturing system (FMS) effectively, the distributed numerical coutrol (distributed-NC) software should be i...To monitor, control and manage the work process of computer numerical control machine tools in a flexible manufacturing system (FMS) effectively, the distributed numerical coutrol (distributed-NC) software should be innovated with the characteristics of modularization and reconfiguration. In this paper, firstly, distributed-NC functions in the FMS environment are described. Then, we present a design and development method of the real time distributed-NC that is on the basis of the re-coufigurable software and hardware platform and with an object-oriented model concept. Finally, to verify the proposed method, the distributed-NC software has been implemented in VC++ 6.0 and has been tested in connection with the different physical flexible manufacturing shops.展开更多
According to a lot of practical data in Liujialiang Mine and reliability theory and result of computer simulation, operation regularity of fully mechanized sublevel caving mining production system in the condition of ...According to a lot of practical data in Liujialiang Mine and reliability theory and result of computer simulation, operation regularity of fully mechanized sublevel caving mining production system in the condition of gently inclined complicated geological structure and production shortcomings are found out and reliability of system and output of the working face are predicted finally.展开更多
In actual implementation of spectrum sharing systems, due to the selfishness of primary users, primary users often refuse the access of secondary users to their licensed spectrum bands even if the access of secondary ...In actual implementation of spectrum sharing systems, due to the selfishness of primary users, primary users often refuse the access of secondary users to their licensed spectrum bands even if the access of secondary users doesn't affect their transmission. Aimed at the selfishness problem of primary users, a seller's market trading mechanism is introduced which can not only stimulate primary users to tolerate larger interference power but also give the primary users an appropriate compensation at the same time, and which has very important practical significance. Based on the mechanism, the achievable maximal gross profit of secondary users and their optimal power allocation scheme in the Rayleigh fading environment are derived, and the interference price of primary users and the average revenue of secondary users' impact on them are also studied. Numerical calculation results are conducted to verify our theoretical results.展开更多
To analyze the epidemiological conditions and characteristics of inpatients with traffic trauma in order to provide objective data for basic research and clinical application of traffic trauma. Methods: The data of ...To analyze the epidemiological conditions and characteristics of inpatients with traffic trauma in order to provide objective data for basic research and clinical application of traffic trauma. Methods: The data of 2213 inpatients with traffic trauma admitted to Lihuili Hospital, Ningbo Medical Centre, Ningbo, China, from January 2003 to September 2005 were studied retrospectively. According to the transportation ways, the patients were divided into four groups: pedestrians, bicyclists, motorcyclists, and automobilists. And the data of injured regions, combined injuries and causes of death were analyzed statistically. Results: Among the 2213 patients, there were 550 pedestrians ( 23. 5 %), 521 bicyclists (24. 9%), 738 motorcyclists (33.3%), and 404 automobilists (18.3%), Male patients were more than female ones, with the ratio of male to female of 2.8:1. Single region injury was found in 1663 patients (75.15%) and multiple injuries in 550 patients (24.85 % ). In total, 2849 regions were injured. Fracture of extremities (53.3%) occurred most often, craniocerebral tranma (19. 4% ) next, then followed in turn by fracture visceral injury (6.56%), spine (5.37 % ), fracture of ribs (4.88 % ), and pelvic fracture (4.18%). The percentage of multiple injuries (33.2%) was highest and the percentage of thoracoabdominal injury (18.0%) was higher in motorcyclists. The percentages of craniocerebral trauma in pedestrians and bicyclists were 27.8 % and 28.2 %, respectively. The incidence of fracture of extremities in motorcyclists reached 73.8%, but with the lowest case-fatality ratio of 1.4%. The incidence of traffic accidents caused by motorcyclists themselves (32.8%) was highest. A total of 56 patients died, with the case-fatality ratio of 2.53%. Among the deaths, 47 died from craniocerebral injury, 6 from multiple fractures combined with hemorrhagic shock, 2 from combined injury in the thoraco-abdominal region, and 1 from cervical cord injury. Concinsions: Nowadays, the patients with traffic trauma are mainly pedestrians, bicyclists and motorcyclists, and they suffer generally from fracture of extremities and craniocerebral injury. The main cause of death is craniocerebral injury. Another characteristic of traffic trauma is that the ratio of multiple injuries is higher.展开更多
Objective: To investigate the biomechanical effect of different volume, distribution and leakage to adjacent disc of bone cement on the adjacent vertebral body by threedimensional osteoporosis finite element model of...Objective: To investigate the biomechanical effect of different volume, distribution and leakage to adjacent disc of bone cement on the adjacent vertebral body by threedimensional osteoporosis finite element model of lumbar. Methods : L4-L5 motion segment data of the cadaver of an old man who had no abnormal findings on roentgenogrmns were obtained from computed tomography (CT) scans. Three-dimensional model of L4-L5 established with Mimics software, and finite element model of L4-L5 functional spinal unit (FSU) was established by Ansys 7. 0 software. The effect of different loading conditions and distribution of bone cement after vertebroplasty on the adjacent vertebral body was investigated. Results: This study presented a validated finite element model of L4-L5 FSU with a simulated vertebroplasty augmentation to predict stresses and strains of adjacent untreated vertebral bodies. The findings from this FSU study suggested the endplate and disc stress of the adjacent vertebral body was not influenced by filling volume of bone cement but unipedicle injection and leakage to the disc of bone cement could concentrate the stress of adjacent endplate. Conclusions: Asymmetric distributions and leakage of cement into intervertebral disc can improve the stress of endplate in adjacent vertebral body. These results suggest that optimal biomechaulcal configuration should have symmetric placement and avoid leakage of cement in operation.展开更多
In the present study,we aimed to assess the chemical composition changes of Semen Euphorbiae(SE)and Semen Euphorbiae Pulveratum(SEP)by UPLC-Q-TOF/MS and multivariate statistical methods.The UPLC-Q-TOF/MS method and SI...In the present study,we aimed to assess the chemical composition changes of Semen Euphorbiae(SE)and Semen Euphorbiae Pulveratum(SEP)by UPLC-Q-TOF/MS and multivariate statistical methods.The UPLC-Q-TOF/MS method and SIMCA-P software were used to analyze the changes of chemical components of SE and SEP based on PCA and PLS-DA multivariate statistical methods.A"component-target-disease"network model was constructed by Intelligent Platform for Life Sciences of traditional Chinese medicine(TCM)to predict potential related diseases.The differences of chemical composition were significant between SE and SEP.Under positive ion mode,the amounts of Euphorbia factor L2,L3,L7a,L8,L9 and lathyrol were obviously decreased after processing.Under negative ion mode,the amounts of aesculetin,bisaesculetin,ingenol and cetylic acid were increased obviously,while Euphorbia factor L1,L4 and L5 were decreased obviously after processing,and the components of euphobiasteroid,aesculetin,lathyrol and linoleic acid among the 14 differentiated compounds were closely related to the SE-related diseases through the"component-target-disease"network model.UPLC-Q-TOF/MS technology in combination with multivariate statistical methods had certain advantages in studying the complex changes of chemical composition before and after manufacturing pulveratum of SE.It provided a basis for clarifying the toxicity-attenuated mechanisms of SE manufacturing pulveratum,and laid the foundation for its further development and utilization.展开更多
文摘The design of sleeve detach and reunion drive device of screw melt ex- truder equipment was optimized, based on the present installation of hygraulic drive device to achieve the mechanical opening and closing of the sleeve, the dynamic model of the sleeve detach and reunion drive was theoretically measured, and it was verified that the device is simple to operate and convenient to maintain, thus it has great social values.
基金the National Natural Science Founda-tion of China (No. 70471022)the NSFC / Hong KongResearch Grant Council (No. 70418013)
文摘Customer requirements analysis is the key step for product variety design of mass customiza-tion(MC). Quality function deployment (QFD) is a widely used management technique for understanding the voice of the customer (VOC), however, QFD depends heavily on human subject judgment during extracting customer requirements and determination of the importance weights of customer requirements. QFD pro-cess and related problems are so complicated that it is not easily used. In this paper, based on a general data structure of product family, generic bill of material (GBOM), association rules analysis was introduced to construct the classification mechanism between customer requirements and product architecture. The new method can map customer requirements to the items of product family architecture respectively, accomplish the mapping process from customer domain to physical domain directly, and decrease mutual process between customer and designer, improve the product design quality, and thus furthest satisfy customer needs. Finally, an example of customer requirements mapping of the elevator cabin was used to illustrate the proposed method.
基金financial support of the Oversea Study Program of the Guangzhou Elite Project(GEP)supported by the National Natural Science Foundation of China under Grant 61471173Guangdong Science Technology Project(no:2017A010101027)
文摘This paper addresses multi-resource fair allocation: a fundamental research topic in cloud computing. To improve resource utilization under well-studied fairness constraints, we propose a new allocation mechanism called Dominant Resource with Bottlenecked Fairness(DRBF), which generalizes Bottleneck-aware Allocation(BAA) to the settings of Dominant Resource Fairness(DRF). We classify users into different queues by their dominant resources. The goals are to ensure that users in the same queue receive allocations in proportion to their fair shares while users in different queues receive allocations that maximize resource utilization subject to well-studied fairness properties such as those in DRF. Under DRBF, no user 1) is worse off sharing resources than dividing resources equally among all users; 2) prefers the allocation of another user; 3) can improve their own allocation without reducing other users' allocations; and(4) can benefit by misreporting their resource demands. Experiments demonstrate that the proposed allocation policy performs better in terms of high resource utilization than does DRF.
基金supported in part by the National Science and technology support program of P.R.China(No.2014BAH29F05)
文摘Because of cloud computing's high degree of polymerization calculation mode, it can't give full play to the resources of the edge device such as computing, storage, etc. Fog computing can improve the resource utilization efficiency of the edge device, and solve the problem about service computing of the delay-sensitive applications. This paper researches on the framework of the fog computing, and adopts Cloud Atomization Technology to turn physical nodes in different levels into virtual machine nodes. On this basis, this paper uses the graph partitioning theory to build the fog computing's load balancing algorithm based on dynamic graph partitioning. The simulation results show that the framework of the fog computing after Cloud Atomization can build the system network flexibly, and dynamic load balancing mechanism can effectively configure system resources as well as reducing the consumption of node migration brought by system changes.
基金The project supported by National Natural Science Foundation of China under Grant No. 10375022Acknowledgment We thank Prof. Tang Yi for helpful discussions.
文摘We study the attack vulnerability of network with duplication-divergence mechanism. Numerical results have shown that the duplication-divergence network with larger retention probability a is more robust against target attack relatively. Furthermore, duplication-divergence network is broken down more quickly than its counterpart BA network under target attack. Such result is consistent with the fact of WWW and Internet networks under target attack. So duplication-divergence model is a more realistic one for us to investigate the characteristics of the world wide web in future. We also observe that the exponent γ of degree distribution and average degree are important parameters of networks, reflecting the performance of networks under target attack. Our results are helpful to the research on the security of network.
文摘This paper aims to provide a design about a kind of low-cost "sub-mother" UAV small formation by using the low-cost micro-UAV as the platform. Combined with the current international situation in the UAV formation research, the modeling is based on the distributed control method and the behavior-based strategy. In this paper, some research to a few key issues has been carried out.
基金supported by the Fundamental Research funds for the central Universities of China (No. K15JB00190)the Ph.D. Programs Foundation of Ministry of Education of China (No. 20120009120010)the Program for Innovative Research Team in University of Ministry of Education of China (IRT201206)
文摘Separation issue is one of the most important problems about cloud computing security. Tenants should be separated from each other based on cloud infrastructure and different users from one tenant should be separated from each other with the constraint of security policies. Learning from the notion of trusted cloud computing and trustworthiness in cloud, in this paper, a multi-level authorization separation model is formally described, and a series of rules are proposed to summarize the separation property of this model. The correctness of the rules is proved. Furthermore, based on this model, a tenant separation mechanism is deployed in a real world mixed-critical information system. Performance benchmarks have shown the availability and efficiency of this mechanism.
基金Project supported by the National High-Tech. R&D Program for CIMS, China (Grant No. 2003AA414120) Shanghai Science & Technology development Project, China (Grant No. 02FK04)
文摘To monitor, control and manage the work process of computer numerical control machine tools in a flexible manufacturing system (FMS) effectively, the distributed numerical coutrol (distributed-NC) software should be innovated with the characteristics of modularization and reconfiguration. In this paper, firstly, distributed-NC functions in the FMS environment are described. Then, we present a design and development method of the real time distributed-NC that is on the basis of the re-coufigurable software and hardware platform and with an object-oriented model concept. Finally, to verify the proposed method, the distributed-NC software has been implemented in VC++ 6.0 and has been tested in connection with the different physical flexible manufacturing shops.
文摘According to a lot of practical data in Liujialiang Mine and reliability theory and result of computer simulation, operation regularity of fully mechanized sublevel caving mining production system in the condition of gently inclined complicated geological structure and production shortcomings are found out and reliability of system and output of the working face are predicted finally.
基金Supported by the National Basic Research Program of China (2007CB307104), the National Natural Science Foundation of China (60973160), and the Intematiortal Scientific and Technological Cooperation Program (No. $2010GR0902).
文摘In actual implementation of spectrum sharing systems, due to the selfishness of primary users, primary users often refuse the access of secondary users to their licensed spectrum bands even if the access of secondary users doesn't affect their transmission. Aimed at the selfishness problem of primary users, a seller's market trading mechanism is introduced which can not only stimulate primary users to tolerate larger interference power but also give the primary users an appropriate compensation at the same time, and which has very important practical significance. Based on the mechanism, the achievable maximal gross profit of secondary users and their optimal power allocation scheme in the Rayleigh fading environment are derived, and the interference price of primary users and the average revenue of secondary users' impact on them are also studied. Numerical calculation results are conducted to verify our theoretical results.
文摘To analyze the epidemiological conditions and characteristics of inpatients with traffic trauma in order to provide objective data for basic research and clinical application of traffic trauma. Methods: The data of 2213 inpatients with traffic trauma admitted to Lihuili Hospital, Ningbo Medical Centre, Ningbo, China, from January 2003 to September 2005 were studied retrospectively. According to the transportation ways, the patients were divided into four groups: pedestrians, bicyclists, motorcyclists, and automobilists. And the data of injured regions, combined injuries and causes of death were analyzed statistically. Results: Among the 2213 patients, there were 550 pedestrians ( 23. 5 %), 521 bicyclists (24. 9%), 738 motorcyclists (33.3%), and 404 automobilists (18.3%), Male patients were more than female ones, with the ratio of male to female of 2.8:1. Single region injury was found in 1663 patients (75.15%) and multiple injuries in 550 patients (24.85 % ). In total, 2849 regions were injured. Fracture of extremities (53.3%) occurred most often, craniocerebral tranma (19. 4% ) next, then followed in turn by fracture visceral injury (6.56%), spine (5.37 % ), fracture of ribs (4.88 % ), and pelvic fracture (4.18%). The percentage of multiple injuries (33.2%) was highest and the percentage of thoracoabdominal injury (18.0%) was higher in motorcyclists. The percentages of craniocerebral trauma in pedestrians and bicyclists were 27.8 % and 28.2 %, respectively. The incidence of fracture of extremities in motorcyclists reached 73.8%, but with the lowest case-fatality ratio of 1.4%. The incidence of traffic accidents caused by motorcyclists themselves (32.8%) was highest. A total of 56 patients died, with the case-fatality ratio of 2.53%. Among the deaths, 47 died from craniocerebral injury, 6 from multiple fractures combined with hemorrhagic shock, 2 from combined injury in the thoraco-abdominal region, and 1 from cervical cord injury. Concinsions: Nowadays, the patients with traffic trauma are mainly pedestrians, bicyclists and motorcyclists, and they suffer generally from fracture of extremities and craniocerebral injury. The main cause of death is craniocerebral injury. Another characteristic of traffic trauma is that the ratio of multiple injuries is higher.
文摘Objective: To investigate the biomechanical effect of different volume, distribution and leakage to adjacent disc of bone cement on the adjacent vertebral body by threedimensional osteoporosis finite element model of lumbar. Methods : L4-L5 motion segment data of the cadaver of an old man who had no abnormal findings on roentgenogrmns were obtained from computed tomography (CT) scans. Three-dimensional model of L4-L5 established with Mimics software, and finite element model of L4-L5 functional spinal unit (FSU) was established by Ansys 7. 0 software. The effect of different loading conditions and distribution of bone cement after vertebroplasty on the adjacent vertebral body was investigated. Results: This study presented a validated finite element model of L4-L5 FSU with a simulated vertebroplasty augmentation to predict stresses and strains of adjacent untreated vertebral bodies. The findings from this FSU study suggested the endplate and disc stress of the adjacent vertebral body was not influenced by filling volume of bone cement but unipedicle injection and leakage to the disc of bone cement could concentrate the stress of adjacent endplate. Conclusions: Asymmetric distributions and leakage of cement into intervertebral disc can improve the stress of endplate in adjacent vertebral body. These results suggest that optimal biomechaulcal configuration should have symmetric placement and avoid leakage of cement in operation.
基金Beijing Natural Science Foundation(Grant No.7182097)National Natural Science foundation of China(Grant No.81673597)National Key Research and Development Program of China(Grant No.2018YFE0197900)。
文摘In the present study,we aimed to assess the chemical composition changes of Semen Euphorbiae(SE)and Semen Euphorbiae Pulveratum(SEP)by UPLC-Q-TOF/MS and multivariate statistical methods.The UPLC-Q-TOF/MS method and SIMCA-P software were used to analyze the changes of chemical components of SE and SEP based on PCA and PLS-DA multivariate statistical methods.A"component-target-disease"network model was constructed by Intelligent Platform for Life Sciences of traditional Chinese medicine(TCM)to predict potential related diseases.The differences of chemical composition were significant between SE and SEP.Under positive ion mode,the amounts of Euphorbia factor L2,L3,L7a,L8,L9 and lathyrol were obviously decreased after processing.Under negative ion mode,the amounts of aesculetin,bisaesculetin,ingenol and cetylic acid were increased obviously,while Euphorbia factor L1,L4 and L5 were decreased obviously after processing,and the components of euphobiasteroid,aesculetin,lathyrol and linoleic acid among the 14 differentiated compounds were closely related to the SE-related diseases through the"component-target-disease"network model.UPLC-Q-TOF/MS technology in combination with multivariate statistical methods had certain advantages in studying the complex changes of chemical composition before and after manufacturing pulveratum of SE.It provided a basis for clarifying the toxicity-attenuated mechanisms of SE manufacturing pulveratum,and laid the foundation for its further development and utilization.