期刊文献+
共找到587篇文章
< 1 2 30 >
每页显示 20 50 100
PCT Reforms Its Patent Filing System
1
《中国专利与商标》 2004年第1期39-39,共1页
As of January 1,2004,the first critical steps in seekingpatent protection in multiple countries will be easier as aresult of reforms to the international patent filing system.Aseries of reforms to the World Intellectu... As of January 1,2004,the first critical steps in seekingpatent protection in multiple countries will be easier as aresult of reforms to the international patent filing system.Aseries of reforms to the World Intellectual PropertyOrganisation's(WIPO)Patent Cooperation Treaty(PCT),ranging from a new simplified system of designatingcountries in which patent protection is sought to an enhancedsearch and preliminary examination system,will simplify thecomplex procedure of obtaining patent protection in severa... 展开更多
关键词 PCT Reforms Its Patent filing system WORK THAN
下载PDF
RCache: A Read-Intensive Workload-Aware Page Cache for NVM Filesystem
2
作者 TU Yaofeng ZHU Bohong +2 位作者 YANG Hongzhang HAN Yinjun SHU Jiwu 《ZTE Communications》 2023年第1期89-94,共6页
Byte-addressable non-volatile memory(NVM),as a new participant in the storage hierarchy,gives extremely high performance in storage,which forces changes to be made on current filesystem designs.Page cache,once a signi... Byte-addressable non-volatile memory(NVM),as a new participant in the storage hierarchy,gives extremely high performance in storage,which forces changes to be made on current filesystem designs.Page cache,once a significant mechanism filling the performance gap between Dynamic Random Access Memory(DRAM)and block devices,is now a liability that heavily hinders the writing performance of NVM filesystems.Therefore state-of-the-art NVM filesystems leverage the direct access(DAX)technology to bypass the page cache entirely.However,the DRAM still provides higher bandwidth than NVM,which prevents skewed read workloads from benefiting from a higher bandwidth of the DRAM and leads to sub-optimal performance for the system.In this paper,we propose RCache,a readintensive workload-aware page cache for NVM filesystems.Different from traditional caching mechanisms where all reads go through DRAM,RCache uses a tiered page cache design,including assigning DRAM and NVM to hot and cold data separately,and reading data from both sides.To avoid copying data to DRAM in a critical path,RCache migrates data from NVM to DRAM in a background thread.Additionally,RCache manages data in DRAM in a lock-free manner for better latency and scalability.Evaluations on Intel Optane Data Center(DC)Persistent Memory Modules show that,compared with NOVA,RCache achieves 3 times higher bandwidth for read-intensive workloads and introduces little performance loss for write operations. 展开更多
关键词 storage system file system persistent memory
下载PDF
Distributed File System Based on a Relational Database
3
作者 Vladyslav Kutsman 《Open Journal of Applied Sciences》 CAS 2023年第5期643-658,共16页
Working with files and the safety of information has always been relevant, especially in financial institutions where the requirements for the safety of information and security are especially important. And in today... Working with files and the safety of information has always been relevant, especially in financial institutions where the requirements for the safety of information and security are especially important. And in today’s conditions, when an earthquake can destroy the floor of a city in an instant, or when a missile hits an office and all servers turn into scrap metal, the issue of data safety becomes especially important. Also, you can’t put the cost of the software and the convenience of working with files in last place. Especially if an office worker needs to find the necessary information on a client, a financial contract or a company’s financial product in a few seconds. Also, during the operation of computer equipment, failures are possible, and some of them can lead to partial or complete loss of information. In this paper, it is proposed to create another level of abstraction for working with the file system, which will be based on a relational database as a storage of objects and access rights to objects. Also considered are possible protocols for transferring data to other programs that work with files, these can be both small sites and the operating system itself. This article will be especially interesting for financial institutions or companies operating in the banking sector. The purpose of this article is an attempt to introduce another level of abstraction for working with files. A level that is completely abstracted from the storage medium. 展开更多
关键词 File system POSTGRESQL Golang AWS HDD LDAP Active Directory AES Encryption Fintech BANKING
下载PDF
Design and Implementation of Wuzhou Meteorological Statistical Yearbook System Based on Python
4
作者 Hui LIANG Tianwen SONG Yun XIAN 《Meteorological and Environmental Research》 2023年第6期23-28,共6页
Based on Python language, this system implements the Wuzhou Meteorological Statistical Yearbook system, which automatically calculates and generates Excel table. This system can accurately and quickly collect annual m... Based on Python language, this system implements the Wuzhou Meteorological Statistical Yearbook system, which automatically calculates and generates Excel table. This system can accurately and quickly collect annual meteorological data, form meteorological yearbook reports for government departments, and is of great significance for the development of meteorological data business by the Wuzhou Meteorological Bureau. 展开更多
关键词 Python language Y file Yearbook
下载PDF
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
5
作者 Syeda Wajiha Zahra Muhammad Nadeem +6 位作者 Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2024年第1期589-616,共28页
Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different resear... Various organizations store data online rather than on physical servers.As the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also increases.Different researchers worked on different algorithms to protect cloud data from replay attacks.None of the papers used a technique that simultaneously detects a full-message and partial-message replay attack.This study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay attacks.The program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original text.In the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the backend.This mechanism has the benefit of enhancing the detectability of replay attacks.Nevertheless,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy is.At the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms. 展开更多
关键词 Replay attack MALWARE message attack file encryption CRYPTOLOGY data security
下载PDF
Enhancing PDF Malware Detection through Logistic Model Trees
6
作者 Muhammad Binsawad 《Computers, Materials & Continua》 SCIE EI 2024年第3期3645-3663,共19页
Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity,and because of its complexity and evasiveness,it is challenging to identify using traditional signature-based detection a... Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity,and because of its complexity and evasiveness,it is challenging to identify using traditional signature-based detection approaches.The study article discusses the growing danger to cybersecurity that malware hidden in PDF files poses,highlighting the shortcomings of conventional detection techniques and the difficulties presented by adversarial methodologies.The article presents a new method that improves PDF virus detection by using document analysis and a Logistic Model Tree.Using a dataset from the Canadian Institute for Cybersecurity,a comparative analysis is carried out with well-known machine learning models,such as Credal Decision Tree,Naïve Bayes,Average One Dependency Estimator,Locally Weighted Learning,and Stochastic Gradient Descent.Beyond traditional structural and JavaScript-centric PDF analysis,the research makes a substantial contribution to the area by boosting precision and resilience in malware detection.The use of Logistic Model Tree,a thorough feature selection approach,and increased focus on PDF file attributes all contribute to the efficiency of PDF virus detection.The paper emphasizes Logistic Model Tree’s critical role in tackling increasing cybersecurity threats and proposes a viable answer to practical issues in the sector.The results reveal that the Logistic Model Tree is superior,with improved accuracy of 97.46%when compared to benchmark models,demonstrating its usefulness in addressing the ever-changing threat landscape. 展开更多
关键词 Malware detection PDF files logistic model tree feature selection CYBERSECURITY
下载PDF
Making waste profitable: Efficient recovery of metallic iron from jarosite residues
7
作者 Songshan Zhou Yunhui Han +11 位作者 Rong Huang Yin Huang Qingyuan Dong Haiyin Gang Jinchuan Qin Xi Yu Xiangfei Zeng Wenxing Cao Jiqin Wang Shaoqin Chen Rong Wang Mengjun Chen 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2024年第7期66-76,共11页
To address the hazardous by-product of zinc smelting and resource utilization of jarosite residue,this study applies an electric field-assisted hot acid treatment to completely recycle iron(Fe).This innovative approac... To address the hazardous by-product of zinc smelting and resource utilization of jarosite residue,this study applies an electric field-assisted hot acid treatment to completely recycle iron(Fe).This innovative approach aims to enhance the leaching efficiency of Fe from jarosite residue.The introduction of an electric field changes the charge distribution on the surface of the particles to enhance ions and electrons exchange and promotes the collision between particles to strengthen reaction kinetics.Based on the above,the leaching efficiency of Fe in jarosite under sulfuric acid attack has improved observably.The result shows that Fe leaching efficiency reaches 98.83%,which is increased by 28%under the optimal experimental conditions:current density of 30 mA·cm^(-2),H_(2)SO_(4) concentration of 1.5 mol·L^(-1),solid-liquid ratio of 70 g·L^(-1),temperature of 80℃ and time of 12 h.Leaching kinetics calculations show that the apparent activation energy is 16.97 kJ·mol^(-1) and the leaching of jarosite residue is controlled by a mixture of chemical reaction and diffusion,as well as the temperature and concentration of the leaching solution have an influence on leaching.This work provides a feasible idea for the efficient leaching of Fe from jarosite residue. 展开更多
关键词 Jarosite residue Electric filed Leaching kinetics
下载PDF
更正
8
作者 《汽车电器》 2024年第3期11-11,共1页
尊敬的各位读者:因作者笔误,2024年第1期第73页《基于车载以太网的HIL实时仿真测试平台的研究及应用》前言第2行中的“FlexFile”应改成“FlexRay”。2024年第2期第33页《基于车载以太网DolP协议的研究及其在商用车中的应用》前言第3行... 尊敬的各位读者:因作者笔误,2024年第1期第73页《基于车载以太网的HIL实时仿真测试平台的研究及应用》前言第2行中的“FlexFile”应改成“FlexRay”。2024年第2期第33页《基于车载以太网DolP协议的研究及其在商用车中的应用》前言第3行中的“FlexFile”应改成“FlexRay”。 展开更多
关键词 车载以太网 商用车 仿真测试平台 FLEX 行中 FILE
下载PDF
Improvement Design for Distributed Real-Time Stream Processing Systems 被引量:4
9
作者 Wei Jiang Liu-Gen Xu +1 位作者 Hai-Bo Hu Yue Ma 《Journal of Electronic Science and Technology》 CAS CSCD 2019年第1期3-12,共10页
In the era of Big Data, typical architecture of distributed real-time stream processing systems is the combination of Flume, Kafka, and Storm. As a kind of distributed message system, Kafka has the characteristics of ... In the era of Big Data, typical architecture of distributed real-time stream processing systems is the combination of Flume, Kafka, and Storm. As a kind of distributed message system, Kafka has the characteristics of horizontal scalability and high throughput, which is manly deployed in many areas in order to address the problem of speed mismatch between message producers and consumers. When using Kafka, we need to quickly receive data sent by producers. In addition, we need to send data to consumers quickly. Therefore, the performance of Kafka is of critical importance to the performance of the whole stream processing system. In this paper, we propose the improved design of real-time stream processing systems, and focus on improving the Kafka's data loading process.We use Kafka cat to transfer data from the source to Kafka topic directly, which can reduce the network transmission. We also utilize the memory file system to accelerate the process of data loading, which can address the bottleneck and performance problems caused by disk I/O. Extensive experiments are conducted to evaluate the performance, which show the superiority of our improved design. 展开更多
关键词 Kafka Kafka CAT memory FILE system MESSAGE QUEUE real-time STREAM processing system
下载PDF
APPLICATION OF MAP AND FILE INFORMATIONVISUALIZATION SYSTEM TO COMPREHENSIVEDIVISION OF NATURAL DISASTERS- Takingthe ChangjiangValleg as an Example 被引量:4
10
作者 HU Bao-qing1,4, JIANG Mei-xin2, JUN Su-lan3, ZENG Qiao-song4 ( 1. Department of Geography, Guangxi Normal College, Narming 530001, P. R. China 2. Department of Resource and Environment Sciences, Jiangxi Normal University, Nanchang 3300 《Chinese Geographical Science》 SCIE CSCD 2001年第4期40-49,共10页
ABSTRACT: This paper generalizes the makeup and forming dynamic mechanism of natural disaster systems, principles and methods of comprehensive division of natural disasters, as well as structure, function and up-build... ABSTRACT: This paper generalizes the makeup and forming dynamic mechanism of natural disaster systems, principles and methods of comprehensive division of natural disasters, as well as structure, function and up-build routes of map and file information visualization system (MFIVS). Taking the Changjiang(Yangtze) Valley as an example, on the basis of revealing up the integrated mechanism on the formations of its natural disasters and its distributing law, thereafter, the paper relies on the MFIVS technique, adopts two top-down and bottom-up approaches to study a comprehensive division of natural disasters. It is relatively objective and precise that the required division results include three natural disaster sections and nine natural disaster sub-sections, which can not only provide a scientific basis for utilizing natural resources and controlling natural disaster and environmental degradation, but also be illuminated to a concise, practical and effective technique on comprehensive division. 展开更多
关键词 KEYWORDS: MAP and FILE information visualization system (MFIVS) natural DISASTER systems damage evaluation comprehensive division the CHANGJIANG VALLEY
下载PDF
Reliable transmission of consultative committee for space data systems file delivery protocol in deep space communication 被引量:7
11
作者 Hui Li Hao Luo Faxin Yu Zheming Lu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第3期349-354,共6页
In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative ac... In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification. 展开更多
关键词 deep space communication consultative committee for space data systems (CCSDS) CCSDS file delivery protocol (CFDP) RELIABLE delay.
下载PDF
Building Hot Snapshot Copy Based on Windows File System 被引量:4
12
作者 WANG Lina GUO Chi WANG Dejun ZHU Qin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1503-1506,共4页
This paper describes a method for building hot snapshot copy based on windows-file system (HSCF). The architecture and running mechanism of HSCF are discussed after giving a comparison with other on-line backup tecb... This paper describes a method for building hot snapshot copy based on windows-file system (HSCF). The architecture and running mechanism of HSCF are discussed after giving a comparison with other on-line backup tecbnology. HSCF, based on a file system filter driver, protects computer data and ensures their integrity and consistency with following three steps: access to open files, synchronization and copy on-write. Its strategies for improving system performance are analyzed including priority setting, incremental snapshot and load balance. HSCF is a new kind of snapshot technology to solve the data integrity and consistency problem in online backup, which is different from other storage-level snapshot and Open File Solution. 展开更多
关键词 SNAPSHOT backup and recovery windows file system filter driver data integrity and consistency
下载PDF
Design and Implementation of File Access and Control System Based on Dynamic Web 被引量:3
13
作者 GAO Fuxiang YAO Lan BAO Shengfei YU Ge 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1233-1237,共5页
A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is c... A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is chosen for developing the file access and control system. Finally, the paper gives the detailed process of the design and implementation of the system, which includes some key problems such as solutions of document management and system security. Additionally, the limitations of the system as well as the suggestions of further improvement are also explained. 展开更多
关键词 file access and control ACTIVEX role based access control (RBAC) VERSION
下载PDF
File Wallet:A File Management System Based on IPFS and Hyperledger Fabric 被引量:1
14
作者 Jienan Chen Chuang Zhang +1 位作者 Yu Yan Yuan Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第2期949-966,共18页
Online file management systems enable cooperatively editing and sharing.However,due to the cost of communication and storage infrastructures,traditional online file management services,e.g.,Google Drive and OneDrive,u... Online file management systems enable cooperatively editing and sharing.However,due to the cost of communication and storage infrastructures,traditional online file management services,e.g.,Google Drive and OneDrive,usually provide limited storage space and relatively low download speed for free users.To achieve better performance,ordinary users have to purchase their expensive services.Moreover,these file management systems are based on centralized architecture and bear the privacy leakage risk,because users’personal files are stored and controlled by their servers.To address the above problems,we propose a peer-to-peer(P2P)file management system based on IPFS and Hyperledger Fabric,named as FileWallet,which can serve as a personal wallet for individual users or organizations to store and share their files in a secure manner.In FileWallet,the users form a P2P network and a Fabric network,where P2P network builds the connections and distributed storage network and the Fabric network sustains consistent blockchain ledgers to record file operation related transactions.In our FileWallet,the storage and communication costs are mitigated in the decentralized design,and the file owner can fully control the access permission of the file to preserve the file privacy.The design of the system architecture,main functionalities,and system implementations are presented in this paper.The performance of the system is evaluated through experiments,and the experimental results show its wide applicability and scalability. 展开更多
关键词 Blockchain file sharing IPFS
下载PDF
DESIGN OF A SYSTEM SOFTWARE BASED ON A JAVA SOC PROCESSOR 被引量:1
15
作者 Chen Zhirui Lin Chunyou Tan Hongzhou 《Journal of Electronics(China)》 2010年第6期853-859,共7页
Java technology is spreading rapidly all over the world in recent years. It is a popular application development language for its well-encapsulation, platform-independent and high security. There are great amounts of ... Java technology is spreading rapidly all over the world in recent years. It is a popular application development language for its well-encapsulation, platform-independent and high security. There are great amounts of Java games and other gadgets on mobile platforms, as well as on set-up-box systems. As Java applications become more sophisticated, the Java Virtual Machine (JVM) mid-dle-wares in embedded systems are not satisfying, Java-specific chips extend in the market. All existing Java-based system software or Operating System (OS) are used on JVM, they cannot be used on Java processors. It is important to develop a pure Java system software or OS so that embedded systems using Java processors will have great performance in Java applications. This paper presents a set of system software designed for a Java-specified processor VP6K, which is also a System-on-Chip (SoC). This system software includes real-time multitask dispatching, file management, device management, hardware drivers, and infrastructural Application Programming Interface (APIs). According to ex-perimental results, the system software provides interfaces for Java programs to fully handle CPU resource, so that all applications can be executed properly and efficiently. VP6K embedded platform shows its good performance for Java applications when the system software is implemented. 展开更多
关键词 Java processor Operating system (OS) Task scheduling File management Device management
下载PDF
Scalable Distributed File Sharing System: A Robust Strategy for a Reliable Networked Environment in Tertiary Institutions 被引量:1
16
作者 Emmanuel N. Ekwonwune Bright U. Ezeoha 《International Journal of Communications, Network and System Sciences》 2019年第4期49-58,共10页
The bane of achieving a scalable distributed file sharing system is the centralized data system and single server oriented file [sharing] system. In this paper, the solution to the problems in a distributed environmen... The bane of achieving a scalable distributed file sharing system is the centralized data system and single server oriented file [sharing] system. In this paper, the solution to the problems in a distributed environment is presented. Thus, inability to upload sizeable files, slow transportation of files, weak security and lack of fault tolerance are the major problems in the existing system. Hence, the utmost need is to build a client-server network that runs on two or more server systems in order to implement scalability, such that when one server is down, the other(s) would still hold up the activities within the network. And to achieve this reliable network environment, LINUX network operating system is recommended among others as a preferred platform for the synchronization of the server systems, such that every user activity like sending of internal memos/mails, publication of academic articles, is replicated;thereby, achieving the proposed result. Hence, Scalable Distributed File Sharing System provides the robustness required to having a reliable intranet. 展开更多
关键词 DISTRIBUTED system Architecture FILES Sharing DISTRIBUTED File system Replication Reliability TRANSPARENCY Data Access Interfaces FAULT Detection FAULT Tolerance Cache Consistency SCALABILITY
下载PDF
Efficient Search in P2P File Sharing System 被引量:1
17
作者 肖波 靳桅 侯孟书 《Journal of Southwest Jiaotong University(English Edition)》 2006年第1期29-33,共5页
A new routing algorithm of peer-to-peer file sharing system with routing indices was proposed, in which a node forwards a query to neighbors that are more likely to have answers based on its statistics. The proposed a... A new routing algorithm of peer-to-peer file sharing system with routing indices was proposed, in which a node forwards a query to neighbors that are more likely to have answers based on its statistics. The proposed algorithm was tested by creating a P2P simulator and varying the input parameters, and was compared to the search algorithms using flooding (FLD) and random walk (RW). The result shows that with the proposed design, the queries are muted effectively, the network flows are reduced remarkably, and the peer-to-peer file sharing system gains a good expansibility. 展开更多
关键词 Peer-to-peer network Routing indices FLOODING Random walk File sharing system QUERY
下载PDF
Load-Balance Policy in Two Level-Cluster File System
18
作者 LIU Yuling SONG Weiwei MA Xiaoxue 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1935-1938,共4页
In this paper, we explored a load-balancing algorithm in a cluster file system contains two levels of metadata-server, primary-level server quickly distributestasks to second-level servers depending on the closest loa... In this paper, we explored a load-balancing algorithm in a cluster file system contains two levels of metadata-server, primary-level server quickly distributestasks to second-level servers depending on the closest load-balancing information. At the same time, we explored a method which accurately reflect I/O traffic and storage of storage-node: computing the heat-value of file, according to which we realized a more logical storage allocation. According to the experiment result, we conclude that this new algorithm shortens the executing time of tasks and improves the system performance compared with other load algorithm. 展开更多
关键词 cluster file system metadata-server LOAD-BALANCING value of heat
下载PDF
File Assignment Policy in Network Storage System
19
作者 Cao Qiang, Xie Chang-sheng College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, Hubei, China 《Wuhan University Journal of Natural Sciences》 CAS 2003年第04A期1075-1080,共6页
Network storage increase capacity and scalability of storage system, data availability and enables the sharing of data among clients. When the developing network technology reduce performance gap between disk and netw... Network storage increase capacity and scalability of storage system, data availability and enables the sharing of data among clients. When the developing network technology reduce performance gap between disk and network, however, mismatched policies and access pattern can significantly reduce network storage performance. So the strategy of data placement in system is an important factor that impacts the performance of overall system. In this paper, the two algorithms of file assignment are presented. One is Greed partition that aims at the load balance across all NADs (Network Attached Disk). The other is Sort partition that tries to minimize variance of service time in each NAD. Moreover, we also compare the performance of our two algorithms in practical environment. Our experimental results show that when the size distribution (load characters) of all assigning files is closer and larger, Sort partition provides consistently better response times than Greedy algorithm. However, when the range of all assigning files is wider, there are more small files and access rate is higher, the Greedy algorithm has superior performance in compared with the Sort partition in off-line. 展开更多
关键词 file assignment network storage network attached disk
下载PDF
Development of 2D casting process CAD system based on PDF/image files
20
作者 Tang Hongtao Zhou Jianxin +2 位作者 Wang Lin Liao Dunming Tao Qing 《China Foundry》 SCIE CAS 2014年第5期440-446,共7页
A casting process CAD is put forward to design and draw casting process. The 2D casting process CAD, most of the current systems are developed based on one certain version of the AutoCAD system. However the applicatio... A casting process CAD is put forward to design and draw casting process. The 2D casting process CAD, most of the current systems are developed based on one certain version of the AutoCAD system. However the application of these 2D casting process CAD systems in foundry enterprises are restricted because they have several deficiencies, such as being overly dependent on the AutoCAD system, and some part files based on PDF format can not be opened directly. To overcome these deficiencies, for the first time an innovative 2D casting process CAD system based on PDF and image format file has been proposed, which breaks through the traditional research and application notion of the 2D casting process CAD system based on AutoCAD. Several key technologies of this system such as coordinate transformation, CAD interactive drawing, file storage, PDF and image format files display, and image recognition technologies were described in detail. A practical 2D CAD casting process system named HZCAD2D(PDF) was developed, which is capable of designing and drawing the casting process on the part drawing based on the PDF format directly, without spending time on drawing the part produced by AutoCAD system. Finally, taking two actual castings as examples, the casting processes were drawn using this system, demonstrating that this system can significantly shorten the cycle of casting process designing. 展开更多
关键词 2D casting process CAD casting process PDF format development of 2D CAD storage of file
下载PDF
上一页 1 2 30 下一页 到第
使用帮助 返回顶部