Showing 1,721 - 1,740 results of 10,931 for search '"software"', query time: 0.08s Refine Results
  1. 1721

    Scheme Design and Kinematics Analysis of Single Leg Mechanism of Multi-legged Robot by Jiman Luo, Zeming Liu, Hui Yin, Shiheng Liu, Li'na Cong

    Published 2021-11-01
    “…The mechanism scheme is theoretically modeled,and then the motion analysis of the mechanism is carried out by using the method of the joint simulation of 3D modeling software SolidWorks and motion analysis software Adams. …”
    Get full text
    Article
  2. 1722

    Open access on a zero budget: a case study of Postcolonial Text by John Willinsky, Ranjini Mendis

    Published 2007-01-01
    “…</b> The use of online and open source software, as well as a global team of volunteers is presented as the basis of sustaining an open access approach to publishing. …”
    Get full text
    Article
  3. 1723

    THE INERTIA FORCE EQUILIBRIUM ANALYSIS OF CRANK-GROUP DRIVING MECHANISM by WU Yao, CAO JuJiang, YAN WeiLiang, XI WenJun

    Published 2017-01-01
    “…Finally,use 3D modeling software Pro / E and dynamics analytic software ADAMS to verify the balance applicability for Crank-group Driving Mechanism.…”
    Get full text
    Article
  4. 1724

    RESEARCH ON PARAMETRIC ANALYSIS AND MULTI-OBJECTIVE OPTIMIZATION OF CYLINDRICAL PRESSURE STRUCTURE by LIU Feng, TU ChaoHua, ZHAO YanKai

    Published 2021-01-01
    “…In order to improve the design efficiency and performance of the cylindrical pressure structure,strength and stability analysis methods were determined,the initial scheme was analyzed. the second development of Abaqus software was carried out by using Python language,Abaqus was integrated with i Sight software,the parametric analysis flow of pressure structure was designed,could realize automatic modeling and analysis of cylindrical pressure structure. the most Latin hypercube method was used to selectting the sample points,the sensitivity analysis of the design variables were carried out,The comparison of the fitting accuracy shown that the response surface model had the highest accuracy,the approximate model of the cylindrical pressure structure based on the fourth-order response surface was obtained. the multi-objective optimization model was established,The second generation of non dominated sorting genetic algorithm was used to solving the multi-objective optimization problem,the results shown that the weight of the optimization scheme was reduced,while the ultimate strength was greatly improved,improved the performance of the cylindrical pressure structure.…”
    Get full text
    Article
  5. 1725

    RESPONSE ANALYSIS OF SHEARER BEVELING FEEDING PROCESS POWER by MAO Jun, XIE ChunXue, XIE Miao, LIU ZhiXiang

    Published 2018-01-01
    “…Accurately understand the oblique cutting and feeding roller load changes,to avoid the proportion of the existing calculation method and power calculation method of defects and errors,for shearer initiative designed to provide theoretical basis.Using numerical simulation software MATLAB draw before and after coal mining machine oblique cutting and feeding roller force,and uses Adams multi-body dynamics simulation software response simulation of shearer beveling feeding coal mining process mobility. …”
    Get full text
    Article
  6. 1726

    Study on Fatigue Performance of Nylon Worm Gear Under Multiple Working Condition based on RecurDyn by Jianfei Chen, Fan Yang, Shulin Wang

    Published 2020-08-01
    “…The main failure mode in automobile steering system is the bending fatigue failure of the tooth root of nylon worm gear, based on Hertz contact theory and incremental finite element method based on corotational coordinate method, the worm and worm gear nonlinear transient dynamics model is built in multibody dynamics software RecurDyn, and according to the test requirements of loading conditions, the stress analysis and fatigue life analysis is carried out in the software, the nylon worm gear tooth root in each loading condition of transient stress value can be accurately got, then the nylon worm gear fatigue life in the corresponding time process is studied. …”
    Get full text
    Article
  7. 1727

    Verification of an artificial intelligence vision chip design for edge computing based on hardware simulation system by Xuanzhe XU, Ke NING, Xuemin ZHENG, Mingxin ZHAO, Mengmeng XU, Nanjian WU, Liyuan LIU

    Published 2022-03-01
    “…The rise of visual deep learning algorithms based on convolutional neural network (CNN) has promoted the rapid development of the artificial intelligence (AI) vision chip design research.The step of chip verification is a bottleneck in the development of AI vision chips.A software and hardware verification method for AI vision chip design based on hardware simulation system was introduced.Taking AI vision chip design for edge computing as an example, the chip was run on the hardware simulation system (ZeBu) and the simulation verification work of typical deep learning network MobileNet was completed.The results show that the network model implemented on the hardware chip architecture keeps accuracy while the detection time of a single frame is only 18.51 ms under a 200 MHz clock frequency.The spread of the hardware simulation is 7 times faster than than of the software simulation.…”
    Get full text
    Article
  8. 1728

    Extensible hierarchical codec semantic communication system by Yuyuan ZHANG, Haitao ZHAO, Jibo WEI, Kuo CAO, Yichi ZHANG, Peng LUO, Yueling LIU, Kai MEI

    Published 2023-08-01
    “…Aiming at the problem that most current researches on text semantic communication mainly rely on simulation system for theoretical verification, an extensible hierarchical semantic communication system was proposed by taking advantage of the separation of hierarchical encoding and decoding architecture in semantic level and grammatical level.The system was compatible with the reliable communication technology under the framework of Shannon information through the mode of semantic and syntactic separation, and realized the nested combination of semantic communication and traditional communication.Furthermore, a universal and extensible verification system was built based on the software radio platform to verify the proposed semantic communication system architecture.The verification system took semantic communication software platform as the driving core of hardware drive and algorithm call, integrated the whole process of signal generation, information transmission, data acquisition, decoding and evaluation at the receiving end, and could be further extended for semantic and syntactic level.Finally, the text semantic communication was tested based on this verification system, which verified that it had higher validity and reliability than the traditional communication mode.…”
    Get full text
    Article
  9. 1729

    ANALYSIS OF VIBRATION FREQUENCY RESPONCE CHARACTERISTIC METHOD STUDY by ZONG BangFei, CHU ChaoMei, HUANG YongHui, TAN Hui

    Published 2019-01-01
    “…In a front transverse gearbox as the research object,using Hyperworks software to establish the finite element model of shaft hole in the key points of the incentive target the input method of transfer function,the vibration characteristics,vibration frequency analysis of vibration response of transmission after strong shell,obtained after the transmission housing mounting point acceleration frequency response curve and the frequency response curve of dynamic stiffness. …”
    Get full text
    Article
  10. 1730

    Ultra-wideband array antenna in 5G and its miniaturization technology by Shenke ZHANG, Fengxu YANG, Yingzeng YIN

    Published 2019-07-01
    “…Combinations of commercial simulation software ADS and Ansoft HFSS, two design examples of tightly coupled array antennas were presented, with the characteristic of wideband and low profiles. …”
    Get full text
    Article
  11. 1731

    Improving bandwidth utilization by compressing small-payload traffic for vehicular networks by Jianan Sun, Ping Dong, Yajuan Qin, Tao Zheng, Xiaoyun Yan, Yuyang Zhang

    Published 2019-04-01
    “…Some solutions are proposed to forward packets by context identifier, instead of IP address, based on header compression and software-defined networking technology. However, these solutions cannot be deployed in vehicular networks successfully, due to the limitations on processing capacity and routing scalability. …”
    Get full text
    Article
  12. 1732

    SIMULATION ANALYSIS AND STRUCTURE OPTIMIZATION OF STAMPING ROBOT ACTUATOR BASED ON ABAQUS by FU Min, WANG JinXin, SU HaiLong, WANG Kai

    Published 2020-01-01
    “…Therefore,the impact simulation analysis and structural optimization design of the actuator are carried out.The 3 D solid model of the actuator was established by UG NX8. 5 software,and imported into ABAQUS software for fem simulative analysis to obtain the clamping force,acceleration and tilt angle and other parameters of the workpiece. …”
    Get full text
    Article
  13. 1733

    Mathematical and Finite Element Modeling of Micro-Modification for Marine Gear by Xiongxi Wu, Qifeng Gao, Zesong Li

    Published 2015-01-01
    “…Based on the computer simulation technique, this paper used the professional gear design software MASTA and finite element software ANSYS combined with the method of gear micro-modification to redesign the gear profile and eventually realized the optimization design of gear micro-modification. …”
    Get full text
    Article
  14. 1734

    ANALYSIS OF VIBRATION CHARACTERISTICS OF THE PROJECTILE-BARREL COUPLING SYSTEM CONSIDERING THE INITIAL DEFLECTION OF THE BARREL by DI ChangChun, QIN JunQi, FANG Yu, YANG YuLiang

    Published 2019-01-01
    “…Using the finite element software ABAQUS and the dynamic analysis software ADAMS, the rigid flexible coupling dynamic model considering the initial deflection is established, and the numerical results are verified. …”
    Get full text
    Article
  15. 1735

    Design and Optimization Analysis of a Through Shaft Inner Rotor Electric Bicycle Reducer Device by Xiong Junkai, Huang Xingyuan

    Published 2024-04-01
    “…Based on the optimization design theory, the minimum total volume of the reduction device is taken as the objective function to optimize. Creo software is used to draw the optimized 3D model of the reducer, and finite element analysis is carried out by Ansys Workbench software to check the strength and stiffness of the structure. …”
    Get full text
    Article
  16. 1736

    Test Purpose Oriented I/O Conformance Test Selection with Colored Petri Nets by Jing Liu, Xinming Ye, Jiantao Zhou

    Published 2014-01-01
    “…Based on conformance testing oriented CPN models for specifying software functional behaviors and specific test purposes, respectively, feasible test cases are generated, guided by the CPN based IOCO relation, using synchronized model simulation with the proof of the soundness of test generation and the coverage towards test purposes. …”
    Get full text
    Article
  17. 1737

    Detecting ROM changes using KINOVEA after muscle decontracture technique by Popa Vlad, Sandor Iosif, Ciocoi-Pop Dumitru Rareș

    Published 2024-06-01
    “…The tool utilised by us to detect changes in ROM were Kinovea, an open-source and free software. After assessing the mobility of the cervical region in a longitudinal axistwice,we used paired T tests to check in every instance what the statistical significance would be.We can conclude that Kinovea was in fact a software that could easily detect ROM alteration. …”
    Get full text
    Article
  18. 1738
  19. 1739

    Application of artificial intelligence technology in the field of security vulnerability by Hongyu SUN, Yuan HE, Jice WANG, Ying DONG, Lipeng ZHU, He WANG, Yuqing ZHANG

    Published 2018-08-01
    “…The large number of software and the enhancement of complexity have brought severe challenges to the research of software security vulnerabilities.The efficiency of manual research on security vulnerabilities is low and cannot meet the needs of cyberspace security.Therefore,how to apply artificial intelligence techniques such as machine learning and natural language processing to the study of security vulnerabilities has become a new hot spot.Artificial intelligence technology can intelligently process vulnerability information,which can assist in the research of security vulnerabilities and improve the efficiency of research on security vulnerabilities such as vulnerability mining.Firstly,the key technologies of automatic mining,automatic assessment,automatic exploitation and automatic repair of security vulnerabilities were analyzed,which pointed out that the automation of security vulnerability mining was the key of the application of artificial intelligence in the field of security vulnerability.Then,the latest research results of applying artificial intelligence technology to the research on security vulnerabilities was analyzed and summarized in recent years,which pointed out some problems in the application and gave corresponding solutions.Finally,the development trend of intelligent research on security vulnerabilities was prospected.…”
    Get full text
    Article
  20. 1740

    Three-dimensional reconstruction of the spinal cord of thoroughbred by Durmuş Bolat

    “…All drawn lines of segments were matched to each other using mentioned software. Finally, three-dimensional reconstruction of segments was obtained using 3D reconstruction module. …”
    Get full text
    Article