Suggested Topics within your search.
Suggested Topics within your search.
- Application software 4
- Civil war 2
- Computer-assisted instruction 2
- Development 2
- Economic aspects 2
- Economic development 2
- Education, Elementary 2
- Educational technology 2
- Information technology 2
- Internet in education 2
- Internet in public administration 2
- Nursing 2
- Nursing Assessment 2
- Nursing Care 2
- Perioperative Nursing 2
- Political aspects 2
- Public administration 2
- Surgical nursing 2
- computer 2
- Academic writing 1
- Access control 1
- Automobiles 1
- CAD System Software 1
- Censorship 1
- Computer software 1
- Digital techniques 1
- Digital watermarking 1
- Digitale Photographie 1
- Dissertations, Academic 1
- Engineering 1
-
1721
Scheme Design and Kinematics Analysis of Single Leg Mechanism of Multi-legged Robot
Published 2021-11-01“…The mechanism scheme is theoretically modeled,and then the motion analysis of the mechanism is carried out by using the method of the joint simulation of 3D modeling software SolidWorks and motion analysis software Adams. …”
Get full text
Article -
1722
Open access on a zero budget: a case study of Postcolonial Text
Published 2007-01-01“…</b> The use of online and open source software, as well as a global team of volunteers is presented as the basis of sustaining an open access approach to publishing. …”
Get full text
Article -
1723
THE INERTIA FORCE EQUILIBRIUM ANALYSIS OF CRANK-GROUP DRIVING MECHANISM
Published 2017-01-01“…Finally,use 3D modeling software Pro / E and dynamics analytic software ADAMS to verify the balance applicability for Crank-group Driving Mechanism.…”
Get full text
Article -
1724
RESEARCH ON PARAMETRIC ANALYSIS AND MULTI-OBJECTIVE OPTIMIZATION OF CYLINDRICAL PRESSURE STRUCTURE
Published 2021-01-01“…In order to improve the design efficiency and performance of the cylindrical pressure structure,strength and stability analysis methods were determined,the initial scheme was analyzed. the second development of Abaqus software was carried out by using Python language,Abaqus was integrated with i Sight software,the parametric analysis flow of pressure structure was designed,could realize automatic modeling and analysis of cylindrical pressure structure. the most Latin hypercube method was used to selectting the sample points,the sensitivity analysis of the design variables were carried out,The comparison of the fitting accuracy shown that the response surface model had the highest accuracy,the approximate model of the cylindrical pressure structure based on the fourth-order response surface was obtained. the multi-objective optimization model was established,The second generation of non dominated sorting genetic algorithm was used to solving the multi-objective optimization problem,the results shown that the weight of the optimization scheme was reduced,while the ultimate strength was greatly improved,improved the performance of the cylindrical pressure structure.…”
Get full text
Article -
1725
RESPONSE ANALYSIS OF SHEARER BEVELING FEEDING PROCESS POWER
Published 2018-01-01“…Accurately understand the oblique cutting and feeding roller load changes,to avoid the proportion of the existing calculation method and power calculation method of defects and errors,for shearer initiative designed to provide theoretical basis.Using numerical simulation software MATLAB draw before and after coal mining machine oblique cutting and feeding roller force,and uses Adams multi-body dynamics simulation software response simulation of shearer beveling feeding coal mining process mobility. …”
Get full text
Article -
1726
Study on Fatigue Performance of Nylon Worm Gear Under Multiple Working Condition based on RecurDyn
Published 2020-08-01“…The main failure mode in automobile steering system is the bending fatigue failure of the tooth root of nylon worm gear, based on Hertz contact theory and incremental finite element method based on corotational coordinate method, the worm and worm gear nonlinear transient dynamics model is built in multibody dynamics software RecurDyn, and according to the test requirements of loading conditions, the stress analysis and fatigue life analysis is carried out in the software, the nylon worm gear tooth root in each loading condition of transient stress value can be accurately got, then the nylon worm gear fatigue life in the corresponding time process is studied. …”
Get full text
Article -
1727
Verification of an artificial intelligence vision chip design for edge computing based on hardware simulation system
Published 2022-03-01“…The rise of visual deep learning algorithms based on convolutional neural network (CNN) has promoted the rapid development of the artificial intelligence (AI) vision chip design research.The step of chip verification is a bottleneck in the development of AI vision chips.A software and hardware verification method for AI vision chip design based on hardware simulation system was introduced.Taking AI vision chip design for edge computing as an example, the chip was run on the hardware simulation system (ZeBu) and the simulation verification work of typical deep learning network MobileNet was completed.The results show that the network model implemented on the hardware chip architecture keeps accuracy while the detection time of a single frame is only 18.51 ms under a 200 MHz clock frequency.The spread of the hardware simulation is 7 times faster than than of the software simulation.…”
Get full text
Article -
1728
Extensible hierarchical codec semantic communication system
Published 2023-08-01“…Aiming at the problem that most current researches on text semantic communication mainly rely on simulation system for theoretical verification, an extensible hierarchical semantic communication system was proposed by taking advantage of the separation of hierarchical encoding and decoding architecture in semantic level and grammatical level.The system was compatible with the reliable communication technology under the framework of Shannon information through the mode of semantic and syntactic separation, and realized the nested combination of semantic communication and traditional communication.Furthermore, a universal and extensible verification system was built based on the software radio platform to verify the proposed semantic communication system architecture.The verification system took semantic communication software platform as the driving core of hardware drive and algorithm call, integrated the whole process of signal generation, information transmission, data acquisition, decoding and evaluation at the receiving end, and could be further extended for semantic and syntactic level.Finally, the text semantic communication was tested based on this verification system, which verified that it had higher validity and reliability than the traditional communication mode.…”
Get full text
Article -
1729
ANALYSIS OF VIBRATION FREQUENCY RESPONCE CHARACTERISTIC METHOD STUDY
Published 2019-01-01“…In a front transverse gearbox as the research object,using Hyperworks software to establish the finite element model of shaft hole in the key points of the incentive target the input method of transfer function,the vibration characteristics,vibration frequency analysis of vibration response of transmission after strong shell,obtained after the transmission housing mounting point acceleration frequency response curve and the frequency response curve of dynamic stiffness. …”
Get full text
Article -
1730
Ultra-wideband array antenna in 5G and its miniaturization technology
Published 2019-07-01“…Combinations of commercial simulation software ADS and Ansoft HFSS, two design examples of tightly coupled array antennas were presented, with the characteristic of wideband and low profiles. …”
Get full text
Article -
1731
Improving bandwidth utilization by compressing small-payload traffic for vehicular networks
Published 2019-04-01“…Some solutions are proposed to forward packets by context identifier, instead of IP address, based on header compression and software-defined networking technology. However, these solutions cannot be deployed in vehicular networks successfully, due to the limitations on processing capacity and routing scalability. …”
Get full text
Article -
1732
SIMULATION ANALYSIS AND STRUCTURE OPTIMIZATION OF STAMPING ROBOT ACTUATOR BASED ON ABAQUS
Published 2020-01-01“…Therefore,the impact simulation analysis and structural optimization design of the actuator are carried out.The 3 D solid model of the actuator was established by UG NX8. 5 software,and imported into ABAQUS software for fem simulative analysis to obtain the clamping force,acceleration and tilt angle and other parameters of the workpiece. …”
Get full text
Article -
1733
Mathematical and Finite Element Modeling of Micro-Modification for Marine Gear
Published 2015-01-01“…Based on the computer simulation technique, this paper used the professional gear design software MASTA and finite element software ANSYS combined with the method of gear micro-modification to redesign the gear profile and eventually realized the optimization design of gear micro-modification. …”
Get full text
Article -
1734
ANALYSIS OF VIBRATION CHARACTERISTICS OF THE PROJECTILE-BARREL COUPLING SYSTEM CONSIDERING THE INITIAL DEFLECTION OF THE BARREL
Published 2019-01-01“…Using the finite element software ABAQUS and the dynamic analysis software ADAMS, the rigid flexible coupling dynamic model considering the initial deflection is established, and the numerical results are verified. …”
Get full text
Article -
1735
Design and Optimization Analysis of a Through Shaft Inner Rotor Electric Bicycle Reducer Device
Published 2024-04-01“…Based on the optimization design theory, the minimum total volume of the reduction device is taken as the objective function to optimize. Creo software is used to draw the optimized 3D model of the reducer, and finite element analysis is carried out by Ansys Workbench software to check the strength and stiffness of the structure. …”
Get full text
Article -
1736
Test Purpose Oriented I/O Conformance Test Selection with Colored Petri Nets
Published 2014-01-01“…Based on conformance testing oriented CPN models for specifying software functional behaviors and specific test purposes, respectively, feasible test cases are generated, guided by the CPN based IOCO relation, using synchronized model simulation with the proof of the soundness of test generation and the coverage towards test purposes. …”
Get full text
Article -
1737
Detecting ROM changes using KINOVEA after muscle decontracture technique
Published 2024-06-01“…The tool utilised by us to detect changes in ROM were Kinovea, an open-source and free software. After assessing the mobility of the cervical region in a longitudinal axistwice,we used paired T tests to check in every instance what the statistical significance would be.We can conclude that Kinovea was in fact a software that could easily detect ROM alteration. …”
Get full text
Article -
1738
Imbalanced Data Sets Classification Based on SVM for Sand-Dust Storm Warning
Published 2015-01-01Get full text
Article -
1739
Application of artificial intelligence technology in the field of security vulnerability
Published 2018-08-01“…The large number of software and the enhancement of complexity have brought severe challenges to the research of software security vulnerabilities.The efficiency of manual research on security vulnerabilities is low and cannot meet the needs of cyberspace security.Therefore,how to apply artificial intelligence techniques such as machine learning and natural language processing to the study of security vulnerabilities has become a new hot spot.Artificial intelligence technology can intelligently process vulnerability information,which can assist in the research of security vulnerabilities and improve the efficiency of research on security vulnerabilities such as vulnerability mining.Firstly,the key technologies of automatic mining,automatic assessment,automatic exploitation and automatic repair of security vulnerabilities were analyzed,which pointed out that the automation of security vulnerability mining was the key of the application of artificial intelligence in the field of security vulnerability.Then,the latest research results of applying artificial intelligence technology to the research on security vulnerabilities was analyzed and summarized in recent years,which pointed out some problems in the application and gave corresponding solutions.Finally,the development trend of intelligent research on security vulnerabilities was prospected.…”
Get full text
Article -
1740
Three-dimensional reconstruction of the spinal cord of thoroughbred
Get full text
Article