期刊文献+
共找到1,667篇文章
< 1 2 84 >
每页显示 20 50 100
Multi-Strategy Dynamic Spectrum Access in Cognitive Radio Networks: Modeling, Analysis and Optimization 被引量:9
1
作者 Yi Yang Qinyu Zhang +3 位作者 Ye Wang Takahiro Emoto Masatake Akutagawa Shinsuke Konaka 《China Communications》 SCIE CSCD 2019年第3期103-121,共19页
Dynamic spectrum access(DSA) based on cognitive radios(CR) technique is an effective approach to address the "spectrum scarcity" issue. However, traditional CR-enabled DSA system employs only single DSA stra... Dynamic spectrum access(DSA) based on cognitive radios(CR) technique is an effective approach to address the "spectrum scarcity" issue. However, traditional CR-enabled DSA system employs only single DSA strategy, which might not be suited to the dynamic network environment. In this paper, we propose a multi-strategy DSA(MS-DSA) system, where the primary and the secondary system share spectrum resources with multiple DSA strategies simultaneously. To analyze the performance of the proposed MS-DSA system, we model it as a continuous-time Markov chain(CTMC) and derive the expressions to compute the corresponding performance metrics. Based on this, we define a utility function involving the concerns of effective throughput, interference quantity on primary users, and spectrum leasing cost. Two optimization schemes, named as spectrum allocation and false alarm probability selection, are proposed to maximize the utility function. Finally, numerical simulations are provided to validate our analysis and demonstrate that the performance can be significantly improved caused by virtues of the proposed MS-DSA system. 展开更多
关键词 COGNITIVE RADIO networks dynamic SPECTRUM access multi-strategy performance analysis optimization
下载PDF
A Review in the Core Technologies of 5G: Device-to-Device Communication, Multi-Access Edge Computing and Network Function Virtualization 被引量:2
2
作者 Ruixuan Tu Ruxun Xiang +1 位作者 Yang Xu Yihan Mei 《International Journal of Communications, Network and System Sciences》 2019年第9期125-150,共26页
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ... 5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances. 展开更多
关键词 5th Generation Network VIRTUALIZATION Device-To-Device COMMUNICATION Base STATION Direct COMMUNICATION INTERFERENCE multi-access EDGE COMPUTING Mobile EDGE COMPUTING
下载PDF
A distributed role-based access control model for multi-domain environments 被引量:1
3
作者 洪帆 朱贤 邢光林 《Journal of Shanghai University(English Edition)》 CAS 2006年第2期134-141,共8页
Access control in multi-domain environments is an important question in building coalition between domains. Based on the RBAC access control model and the concepts of secure domain, the role delegation and role mappin... Access control in multi-domain environments is an important question in building coalition between domains. Based on the RBAC access control model and the concepts of secure domain, the role delegation and role mapping are proposed, which support the third-party authorization. A distributed RBAC model is then presented. Finally implementation issues are discussed. 展开更多
关键词 role access control multi-DOMAIN DELEGATION mapping.
下载PDF
Accessing Multi-Source Geological Data through Network in MORPAS Software System 被引量:3
4
作者 MeiHongbo HuGuangdao +1 位作者 ChinJian~o LiZhenhua 《Journal of China University of Geosciences》 SCIE CSCD 2003年第3期265-268,共4页
MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical,... MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system. 展开更多
关键词 multi-source geological data SQL Server accessing data through network
下载PDF
A Random Multi-Access Method for Data Services in CDMA Cellular System
5
作者 李振 尤肖虎 《Journal of Southeast University(English Edition)》 EI CAS 1997年第2期8-12,共5页
ARandomMultiAccessMethodforDataServicesinCDMACelularSystemLiZhen(李振)YouXiaohu(尤肖虎)(NationalMobileCommunicat... ARandomMultiAccessMethodforDataServicesinCDMACelularSystemLiZhen(李振)YouXiaohu(尤肖虎)(NationalMobileCommunicationsResearchLabor... 展开更多
关键词 multiple access CODE DIVISION multi access mobile communication
下载PDF
New strategies for collision resolution of multi-access channel
6
作者 凌永发 孟德宇 张继洁 《Journal of Pharmaceutical Analysis》 SCIE CAS 2007年第1期56-59,共4页
The truncated binary exponential back-off algorithm is one of the most effective methods applied in collision resolution process of random multi-access channel.In this study,two new strategies are presented to improve... The truncated binary exponential back-off algorithm is one of the most effective methods applied in collision resolution process of random multi-access channel.In this study,two new strategies are presented to improve the capability of the truncated binary exponential back-off algorithm.In the new strategies,the sizes of the initial window size or the operating window sizes are adjusted dynamically,which always bring a significant improvement for the self-adaptability of the original algorithm.A series of experiments are simulated and the results verify that the new strategies can make the implementation more stable and effective than the original algorithm. 展开更多
关键词 back-off algorithm collision resolution multi-access channel
下载PDF
Centralized Role-Based Access Control for Federated Multi-Domain Environments
7
作者 YU Guangcan LU Zhengding +1 位作者 LI Ruixuan MUDAR Sarem 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1688-1692,共5页
The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Bas... The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Based Access Control (RBAC) model. We propose a model called CRBAC that easily establishes a global policy for roles mapping among multiple security domains. Our model is based on an extension of the RBAC model. Also, multiple security domains were composed to one abstract security domain. Also roles in the multiple domains are translated to permissions of roles in the abstract security domain. These permissions keep theirs hierarchies. The roles in the abstract security domain implement roles mapping among the multiple security domains. Then, authorized users of any security domain can transparently access resources in the multiple domains. 展开更多
关键词 RBAC(role based access control) federated multi-DOMAIN
下载PDF
Access化学发光仪测定尿液β-人绒毛膜促性腺激素的实验评价 被引量:3
8
作者 薛武进 王伟 +1 位作者 王晓露 黄红娟 《上海医学检验杂志》 北大核心 2003年第2期105-106,共2页
目的 探讨Access化学发光仪测定尿液 β 人绒毛膜促性腺激素 ( β HCG)的可行性。 方法 对测定尿液 β HCG的精密度、线性作实验观察 ,并与血清 β HCG测定作比较。对同一浓度 β HCG在不同尿中所测结果的准确性及影响因素作初步探讨... 目的 探讨Access化学发光仪测定尿液 β 人绒毛膜促性腺激素 ( β HCG)的可行性。 方法 对测定尿液 β HCG的精密度、线性作实验观察 ,并与血清 β HCG测定作比较。对同一浓度 β HCG在不同尿中所测结果的准确性及影响因素作初步探讨。结果 混合尿液 β HCG测定的批内重复性 <3 .5 0 % ,批间 <6.0 0 % ,线性范围 0 .8~ 912IU/L ,与血清同水平HCG标本的相关性Y =0 .87X + 1.0 8,r =0 .993 7。结论 Access化学发光仪可用于测定尿液 β HCG ,但准确度比血清标本稍差。 展开更多
关键词 access化学发光仪 测定 尿液 Β-人绒毛膜促性腺激素 实验评价
下载PDF
基于主体-主导的Access程序设计教学策略研究 被引量:2
9
作者 盛仲飙 《科技信息》 2013年第2期21-21,共1页
本文首先分析了以"教"和以"学"为中心的教学模式的学习理论和教学设计理论,在对它的可行性及必要性等进行研究的基础上,结合高校Access程序设计教学的具体情况,提出在高校Access程序设计教学中运用"双主"... 本文首先分析了以"教"和以"学"为中心的教学模式的学习理论和教学设计理论,在对它的可行性及必要性等进行研究的基础上,结合高校Access程序设计教学的具体情况,提出在高校Access程序设计教学中运用"双主"教学的主要策略,并在实践中进行运用,获得了较好的教学效果。 展开更多
关键词 教学理论 主体-主导 access教学
下载PDF
一种通用的Beyond 3G Multi-Radio接入架构 被引量:3
10
作者 李军 宋梅 宋俊德 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2005年第S2期95-98,共4页
下一代移动通信网(Beyond 3G)是多种无线接入(Multi-Radio)共存的融合网络.如何有效集成异构无线网络,优化使用全部的无线资源是B3G研究领域内关键课题之一.在分析目前多种异构无线网络整合方案的基础上,借鉴欧洲IST 6th框架中Multi-Ra... 下一代移动通信网(Beyond 3G)是多种无线接入(Multi-Radio)共存的融合网络.如何有效集成异构无线网络,优化使用全部的无线资源是B3G研究领域内关键课题之一.在分析目前多种异构无线网络整合方案的基础上,借鉴欧洲IST 6th框架中Multi-Radio接入架构的基本思想,考虑在链路层实现异构无线网络之间的整合,从而提出一种通用B3G Multi-Radio接入架构模型,该模型可以无缝融合多种无线接入技术、有效利用全网无线资源. 展开更多
关键词 BEYOND3G 异构网络 multi-radio接入 联合无线资源管理
下载PDF
Multi-features Based Approach for Moving Shadow Detection 被引量:4
11
作者 周宁 周曼丽 +1 位作者 许毅平 方宝红 《Journal of Donghua University(English Edition)》 EI CAS 2004年第6期76-80,共5页
In the video-based surveillance application, moving shadows can affect the correct localization and detection of moving objects. This paper aims to present a method for shadow detection and suppression used for moving... In the video-based surveillance application, moving shadows can affect the correct localization and detection of moving objects. This paper aims to present a method for shadow detection and suppression used for moving visual object detection. The major novelty of the shadow suppression is the integration of several features including photometric invariant color feature, motion edge feature, and spatial feature etc. By modifying process for false shadow detected, the averaging detection rate of moving object reaches above 90% in the test of Hall-Monitor sequence. 展开更多
关键词 MOVING SHADOW detection multi - features MOVING OBJECT DETECTION
下载PDF
An Overview of Non.Orthogonal Multiple Access 被引量:3
12
作者 Anass Benjebbour 《ZTE Communications》 2017年第B06期21-30,共10页
In recent years, non-orthogonal multiple access(NOMA) has attracted a lot of attention as a novel and promising power-domain us-er multiplexing scheme for Long-Term Evolution(LTE) enhancement and 5G. NOMA is able to c... In recent years, non-orthogonal multiple access(NOMA) has attracted a lot of attention as a novel and promising power-domain us-er multiplexing scheme for Long-Term Evolution(LTE) enhancement and 5G. NOMA is able to contribute to the improvement ofthe tradeoff between system capacity and user fairness(i.e., cell-edge user experience). This improvement becomes in particularemphasized in a cellular system where the channel conditions vary significantly among users due to the near-far effect. In this arti-cle, we provide an overview of the concept, design and performance of NOMA. In addition, we review the potential benefits and is-sues of NOMA over orthogonal multiple access(OMA) such as orthogonal frequency division multiple access(OFDMA) adoptedby LTE, and the status of 3GPP standardization related to NOMA. 展开更多
关键词 multiple access non⁃orthogonal multiple access(NOMA) power⁃domain multi⁃user detection MUST
下载PDF
The Large Sky Area Multi-Object Fiber Spectroscopic Telescope (LAMOST) 被引量:43
13
作者 Xiang-Qun Cui Yong-Heng Zhao +52 位作者 Yao-Quan Chu Guo-Ping Li Qi Li Li-Ping Zhang Hong-Jun Su Zheng-Qiu Yao Ya-Nan Wang Xiao-Zheng Xing Xin-Nan Li Yong-Tian Zhu Gang Wang Bo-Zhong Gu A-Li Luo Xin-Qi Xu Zhen-Chao Zhang Gen-Rong Liu Hao-Tong Zhang De-Hua Yang Shu-Yun Cao Hai-Yuan Chen Jian-Jun Chen Kun-Xin Chen Ying Chen Jia-Ru Chu Lei Feng Xue-Fei Gong Yong-Hui Hou Hong-Zhuan Hu Ning-Sheng Hu Zhong-Wen Hu Lei Jia Fang-Hua Jiang Xiang Jiang Zi-Bo Jiang Ge Jin Ai-Hua Li Yan Li Ye-Ping Li Guan-QunLiu Zhi-Gang Liu Huo-Ming Shi Zheng-Hong Tang Qing-Sheng Tao Xiang-Yan Yuan Chao Zhai Jing Zhang Yan-Xia Zhang Yong Zhang Ming Zhao Fang Zhou Guo-Hua Zhou Jie Zhu Si-Cheng Zou 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2012年第9期1197-1242,共46页
The Large Sky Area Multi-Object Fiber Spectroscopic Telescope (LAMOST, also called the Guo Shou Jing Telescope) is a special reflecting Schmidt telescope. LAMOST’s special design allows both a large aperture (effecti... The Large Sky Area Multi-Object Fiber Spectroscopic Telescope (LAMOST, also called the Guo Shou Jing Telescope) is a special reflecting Schmidt telescope. LAMOST’s special design allows both a large aperture (effective aperture of 3.6 m–4.9 m) and a wide field of view (FOV) (5°). It has an innovative active reflecting Schmidt configuration which continuously changes the mirror’s surface that adjusts during the observation process and combines thin deformable mirror active optics with segmented active optics. Its primary mirror (6.67m×6.05 m) and active Schmidt mirror (5.74m×4.40 m) are both segmented, and composed of 37 and 24 hexagonal sub-mirrors respectively. By using a parallel controllable fiber positioning technique, the focal surface of 1.75 m in diameter can accommodate 4000 optical fibers. Also, LAMOST has 16 spectrographs with 32 CCD cameras. LAMOST will be the telescope with the highest rate of spectral acquisition. As a national large scientific project, the LAMOST project was formally proposed in 1996, and approved by the Chinese government in 1997. The construction started in 2001, was completed in 2008 and passed the official acceptance in June 2009. The LAMOST pilot survey was started in October 2011 and the spectroscopic survey will launch in September 2012. Up to now, LAMOST has released more than 480 000 spectra of objects. LAMOST will make an important contribution to the study of the large-scale structure of the Universe, structure and evolution of the Galaxy, and cross-identification of multiwaveband properties in celestial objects. 展开更多
关键词 techniques: wide field telescope - active optics - multi fiber - spectroscopy survey - data reduction
下载PDF
Recovery of single event upset in advanced complementary metal-oxide semiconductor static random access memory cells 被引量:4
14
作者 Qin Jun-Rui Chen Shu-Ming +1 位作者 Liang Bin Liu Bi-Wei 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第2期624-628,共5页
Using computer-aided design three-dimensional (3D) simulation technology, the recovery mechanism of single event upset and the effects of spacing and hit angle on the recovery are studied. It is found that the multi... Using computer-aided design three-dimensional (3D) simulation technology, the recovery mechanism of single event upset and the effects of spacing and hit angle on the recovery are studied. It is found that the multi-node charge collection plays a key role in recovery and shielding the charge sharing by adding guard rings. It cannot exhibit the recovery effect. It is also indicated that the upset linear energy transfer (LET) threshold is kept constant while the recovery LET threshold increases as the spacing increases. Additionally, the effect of incident angle on recovery is analysed and it is shown that a larger angle can bring about a stronger charge sharing effect, thus strengthening the recovery ability. 展开更多
关键词 single event upset multi-node charge collection static random access memory angulardependence
下载PDF
基于Mi-Fi的多终端Access VPN接入研究与实现 被引量:1
15
作者 李在浩 《科技广场》 2012年第10期75-78,共4页
为了解决多个Wi-Fi终端同时接入Access VPN的问题,采用运营商提供的专用APN技术,利用Mi-Fi和专用APN相结合设计了一种新型实现方案。通过双向NAT转换技术,不改变原网络结构和数据配置。实验结果表明,网络组建快捷,系统运行稳定,通过Mi-F... 为了解决多个Wi-Fi终端同时接入Access VPN的问题,采用运营商提供的专用APN技术,利用Mi-Fi和专用APN相结合设计了一种新型实现方案。通过双向NAT转换技术,不改变原网络结构和数据配置。实验结果表明,网络组建快捷,系统运行稳定,通过Mi-Fi实现的多终端接入与单机APN接入效果完全一致。 展开更多
关键词 多终端 accessVPN APN NAT
下载PDF
A Comparative Study of Acute Hemodynamic Effects of Multi -site Cardiac Pacing in patients with cardiac function NYHA class ⅠtoⅡ without bundle branch block 被引量:2
16
作者 朱参战 崔长琮 +5 位作者 张全发 薛小临 刘维维 刘引会 《South China Journal of Cardiology》 CAS 2001年第2期101-105,共5页
Objective To compare the acute hemodynamic effects of five different pacing modes in patients with cardiac function NYHA class Ⅰ to Ⅱ without bundle branch block (BBB). Methods This study included 12 patients (SSS ... Objective To compare the acute hemodynamic effects of five different pacing modes in patients with cardiac function NYHA class Ⅰ to Ⅱ without bundle branch block (BBB). Methods This study included 12 patients (SSS 7, Ⅲ°AVB 5) undergoing pacemaker implantation. Right ventricular apex (RVA), right ventricular outflow tract (RVOT), right ventricular bifocal (RV-Bi), left ventricular base (LVB) and bi -ventricular (Bi-Ⅴ) pacing at 60 -80 ppm were done in VVI mode prior to implantation of DDD pacemaker. The cardiac index (CI), mean pulmonary artery pressure (mPAP) and pulmonary capillary wedge pressure (PCWP) were measured with Swan - Ganz thermodilution catheter after 5 minutes of each pacing mode. Results (1) Comparing to pacing at RVA (CI: 2. 41± 0. 38 L/min per m2, PCWP: 16. 7 ±3.3 mmHg), the CI increased and the PCWP decreased significantly in pacing at RVOT(CI: 2. 63 ± 0.46, PCWP: 13. 8±2. 3), LVB(CI: 2. 78±0.52, PCWP: 14. 4±3.1), RV-Bi(CI: 2. 83±0.57, PCWP: 12. 8± 2. 5) and Bi -Ⅴ pacing (CI: 2. 94± 0.60, PCWP: 12. 7±2. 5), P < 0. 01, respectively. (2) The CI of RV-Bi and Bi-Ⅴ pacing was higher than that of RVOT and LVB pacing, the PCWP was lower, P < 0. 05, respectively. (3) There was no significant difference between RV - Bi pacing and Bi-Ⅴ pacing in CI and PCWP. Conclusion There is no significant difference between RV - Bi pacing and Bi -V pacing in the acute hemodynamic effects; however,dual - site pacing is much better than single site pacing in that aspect for patients with cardiac function NYHA class Ⅰ to Ⅱ without BBB. Among single site pacing, the RVOT and LVB pacing is better than RVA pacing in cardiac function. 展开更多
关键词 multi - site cardiac pacingHemodynamics
下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
17
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 CLOUD Computing CLOUD DATA STORAGE CLOUD Service PROVIDER Formula-Based CLOUD DATA access Control multi-Agent System and Secure Java Agent Development Framework
下载PDF
MODELING MULTI-TRAFFIC ADMISSION CONTROL IN OFDMA SYSTEM USING COLORED PETRI NET 被引量:1
18
作者 Yao Yuanyuan Lu Yanhui Yang Shouyi 《Journal of Electronics(China)》 2012年第6期509-514,共6页
Call Admission Control (CAC) is one of the key traffic management mechanisms that must be deployed in order to meet the strict requirements for dependability imposed on the services provided by modern wireless network... Call Admission Control (CAC) is one of the key traffic management mechanisms that must be deployed in order to meet the strict requirements for dependability imposed on the services provided by modern wireless networks. In this paper, we develop an executable top-down hierarchical Colored Petri Net (CPN) model for multi-traffic CAC in Orthogonal Frequency Division Multiple Access (OFDMA) system. By theoretic analysis and CPN simulation, it is demonstrated that the CPN model is isomorphic to Markov Chain (MC) assuming that each data stream follows Poisson distribution and the corresponding arrival time interval is an exponential random variable, and it breaks through MC's explicit limitation, which includes MC's memoryless property and proneness to state space explosion in evaluating CAC process. Moreover, we present four CAC schemes based on CPN model taking into account call-level and packet-level Quality of Service (QoS). The simulation results show that CPN offers significant advantages over MC in modeling CAC strategies and evaluating their performance with less computational complexity in addition to its flexibility and adaptability to different scenarios. 展开更多
关键词 Orthogonal Frequency Division multiple access (OFDMA) Call admission control Colored Petri Net (CPN) multi-traffic Markov Chain (MC)
下载PDF
Research on A Master - slave Multi - microcomputers Control System for Hollow Spindle Fancy Yarn Spinning Machine
19
作者 李志蜂 陈子展 阵瑞琪 《Journal of China Textile University(English Edition)》 EI CAS 1999年第1期49-52,共4页
In this paper, a successfully studied and developed master - slave muld - microcomputers control system based on PC - BUS for hollow spindle fancy yarn spinning machine, mainly Its overall scheme, software and hardwar... In this paper, a successfully studied and developed master - slave muld - microcomputers control system based on PC - BUS for hollow spindle fancy yarn spinning machine, mainly Its overall scheme, software and hardware construction, is introduced. Spinning experiments show that the system achieves satisfactory result. This system can solve the diftkultles of mechatronical fusion between domestic hollow splndk fancy yarn spuming muchine and its microcomputer control technology. 展开更多
关键词 hollow SPINDLE FANCY YAM spinning machine mechatrvnical fusion MASTER - SLAVE multi - microcomputers control system PC - BUS.
下载PDF
On the Representation of Multi-layer Woven Structure
20
作者 易洪雷 丁辛 《Journal of China Textile University(English Edition)》 EI CAS 1999年第3期14-16,共3页
A quantitative method is developed to identify the structures of multi-layer woven fabric in this study. Six structural parameters are selected to represent the fabric structure. With some design criteria for the rein... A quantitative method is developed to identify the structures of multi-layer woven fabric in this study. Six structural parameters are selected to represent the fabric structure. With some design criteria for the reinforcement of textile composites, the relationships among the structural parameters are derived for different binding patterns of the fabric structure. The conditions, which meet the requirements of structural cell stability,are also discussed. 展开更多
关键词 multi - layer woven FABRIC structural parame-ter BINDING PATTERN TEXTILE composite .
下载PDF
上一页 1 2 84 下一页 到第
使用帮助 返回顶部