期刊文献+
共找到128篇文章
< 1 2 7 >
每页显示 20 50 100
A Study on Control System of Robot Working Unit for Automatically Welding Nipples onto Header of Boiler
1
作者 陶谦 于树锋 +1 位作者 姜山 曹佩军 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1996年第2期64-68,共5页
The difficult problem of automatically welding nipples onto the header is first analyzed in this paper, and then the overall structure and operating principle of the robot working unit are introduced. The robot and th... The difficult problem of automatically welding nipples onto the header is first analyzed in this paper, and then the overall structure and operating principle of the robot working unit are introduced. The robot and the measuring device are located by employing the traveling lorry, and this unit enables the robot to adjust the tracks according to the errors received from the measuring device, and then the nipples are welded properly. This paper emphases on the development of the master-slave control system, in which the prograrmmable Logic Controller (PLC) is used as the master computer. 展开更多
关键词 ss:header nipple PLC ROBOT CONTROL WELDING working UNIT master-slave CONTROL
在线阅读 下载PDF
天轮及悬绳对提升系统纵向振动的影响特性
2
作者 王彦栋 寇子明 《振动.测试与诊断》 北大核心 2025年第2期376-382,417,共8页
针对含悬绳与天轮的矿井提升系统纵向振动问题,首先,采用多体动力学理论与连续体建模相结合的方式,将提升绳的悬绳与垂直段作为整体建模,构建了矿井提升系统纵向振动模型;其次,推导了系统纵向振动方程,得到了系统纵向固有频率随绳长的... 针对含悬绳与天轮的矿井提升系统纵向振动问题,首先,采用多体动力学理论与连续体建模相结合的方式,将提升绳的悬绳与垂直段作为整体建模,构建了矿井提升系统纵向振动模型;其次,推导了系统纵向振动方程,得到了系统纵向固有频率随绳长的变化规律以及系统的纵向振动响应特性,数值结果与现场试验结果吻合良好。结果表明:提出的模型准确显示了系统的共振区间,天轮对系统2阶以上的纵向固有频率有较大影响,悬绳对系统每一阶固有频率均有影响;当提升系统在纵向方向发生共振时,天轮处的共振相比提升容器处更剧烈,该振动会造成天轮井架的抖动,甚至会造成提升绳与天轮间发生相对滑动,对天轮衬垫及钢丝绳造成磨损,给系统带来安全隐患。 展开更多
关键词 矿井提升系统 纵向振动 天轮 悬绳 数值模拟
在线阅读 下载PDF
基于UVM的异构协议转换参考模型的设计与实现
3
作者 樊争光 沈剑良 +1 位作者 李智超 刘冬培 《电讯技术》 北大核心 2025年第6期960-972,共13页
面对异构协议转换系统中庞大的报文输出量,传统的验证方法难以确保输出报文的正确性。为此,提出了一种以目的协议为处理单元的参考模型。该参考模型通过对不同协议通道的数据包进行独立处理,实现不同协议间的包头映射,确保输出报文符合... 面对异构协议转换系统中庞大的报文输出量,传统的验证方法难以确保输出报文的正确性。为此,提出了一种以目的协议为处理单元的参考模型。该参考模型通过对不同协议通道的数据包进行独立处理,实现不同协议间的包头映射,确保输出报文符合预期。此外,通过优化算法,将协议转换算法精简至4种,有效避免了代码冗余对报文精度的影响。采用SystemVerilog和UVM(Universal Verification Methodology)设计参考模型,并通过TLM(Transaction Level Modeling)机制与其他组件协同工作,增强了参考模型的可扩展性和可重用性。实验结果表明,该参考模型能够有效输出预期报文,助力验证平台完成对异构协议转换系统的功能验证,且代码覆盖率和功能覆盖率均达到了100%。 展开更多
关键词 异构协议转换系统 参考模型 包头映射 通用验证方法(UVM)
在线阅读 下载PDF
Effect of Header Configuration on Refrigerant Distribution in Parallel Flow Microchannel Evaporators 被引量:3
4
作者 YU Dengjia LIU Jinwei +3 位作者 Lü Hongbin SHI Junye YOU Dian CHEN Jiangping 《Journal of Shanghai Jiaotong university(Science)》 EI 2019年第3期273-280,共8页
The refrigerant flow distribution in the parallel flow microchannel evaporators is experimentally investigated to study the effect of header configuration.Six different configurations are tested in the same evaporator... The refrigerant flow distribution in the parallel flow microchannel evaporators is experimentally investigated to study the effect of header configuration.Six different configurations are tested in the same evaporator by installing insertion device and partition plate in the header to ensure the consistency of the other structure parameters.The results show that the uniformity of refrigerant flow distribution and the heat transfer rate are greatly improved by reducing the sectional area of header.The heat transfer rate can increase by 67.93%by reducing the sectional area of both inlet and outlet headers.The uniformity of refrigerant flow distribution and the heat transfer rate become worse after installing the partition plate in the insertion devices and changing the inner structure of the header further. 展开更多
关键词 refrigerant distribution header microchannel evaporator two-phase flow
原文传递
Mechanical Stress Analysis of a 600MW Supercritical Boiler Superheater Outlet Header 被引量:2
5
作者 Dongyi Li Zhongguang Fu +1 位作者 Qiang Zhang Ting He 《Engineering(科研)》 2013年第1期66-68,共3页
The mechanical stress distribution and the stress concentrations of the superheater outlet header of a 600MW supercritical boiler were analyzed by the finite element method. The results showed that the stress concentr... The mechanical stress distribution and the stress concentrations of the superheater outlet header of a 600MW supercritical boiler were analyzed by the finite element method. The results showed that the stress concentrated at the inside conjunction area between the pipe and the header cylinder , and the value of the maximum mechanical stress concentration factor is 2.51. 展开更多
关键词 SUPERHEATER OUTLET header FINITE ELEMENT Method Stress CONCENTRATION
在线阅读 下载PDF
An Automatic Test System in Robot Welding Station
6
作者 李瑞峰 陶谦 +1 位作者 蔡鹤皋 候琳祺 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1996年第4期26-29,共4页
AnAutomaticTestSysteminRobotWeldingStationLIRuifeng;TAOQian;CAIHegao;HOULinqi(李瑞峰)(陶谦)(蔡鹤皋)(候琳祺)(RobotResear... AnAutomaticTestSysteminRobotWeldingStationLIRuifeng;TAOQian;CAIHegao;HOULinqi(李瑞峰)(陶谦)(蔡鹤皋)(候琳祺)(RobotResearchInstitute,Harbi... 展开更多
关键词 ss: ROBOT WELDING header TEST
在线阅读 下载PDF
Hopping-Aware Cluster Header Capability for Sensor Relocation in Mobile IoT Networks
7
作者 Moonseong Kim Jaeyoung Park +1 位作者 Young-Joon Kim Woochan Lee 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1613-1625,共13页
Mobile sensor nodes such as hopping sensors are of critical importance in data collection.However,the occurrence of sensing holes is unavoidable due to the energy limitation of the nodes.Thus,it is evident that the re... Mobile sensor nodes such as hopping sensors are of critical importance in data collection.However,the occurrence of sensing holes is unavoidable due to the energy limitation of the nodes.Thus,it is evident that the relocation of mobile sensors is the most desirable method to recover the sensing holes.The previous research conducted by the authors so far demonstrated the most realistic hopping sensor relocation scheme,which is suitable for the distributed environment.In previous studies,the cluster header plays an essential role in detecting the sensing hole and requesting the neighboring cluster to recover the sensing hole that occurred in the sensor node.However,the limitations of the cluster header in the previously proposed relocation protocol are not fully considered.Because the cluster header jumps more frequently than non-header nodes,its energy con-sumption is relatively high compared to other nodes.Therefore,it is most likely to lead to header node failure and can lead to data loss on the network.In this paper,the jumping ability and energy consumption of the cluster header are seriously considered.Additional ability to replace cluster headers in case of failure is also implemented.Simulation results show that the data collection time can be further increased,which demonstrates the validity of the proposed algorithms. 展开更多
关键词 Hopping sensor mobileinternetofthings relocationprotocol header node numericalsimulation
在线阅读 下载PDF
Impact of Portable Executable Header Features on Malware Detection Accuracy
8
作者 Hasan H.Al-Khshali Muhammad Ilyas 《Computers, Materials & Continua》 SCIE EI 2023年第1期153-178,共26页
One aspect of cybersecurity,incorporates the study of Portable Executables(PE)files maleficence.Artificial Intelligence(AI)can be employed in such studies,since AI has the ability to discriminate benign from malicious... One aspect of cybersecurity,incorporates the study of Portable Executables(PE)files maleficence.Artificial Intelligence(AI)can be employed in such studies,since AI has the ability to discriminate benign from malicious files.In this study,an exclusive set of 29 features was collected from trusted implementations,this set was used as a baseline to analyze the presented work in this research.A Decision Tree(DT)and Neural Network Multi-Layer Perceptron(NN-MLPC)algorithms were utilized during this work.Both algorithms were chosen after testing a few diverse procedures.This work implements a method of subgrouping features to answer questions such as,which feature has a positive impact on accuracy when added?Is it possible to determine a reliable feature set to distinguish a malicious PE file from a benign one?when combining features,would it have any effect on malware detection accuracy in a PE file?Results obtained using the proposed method were improved and carried few observations.Generally,the obtained results had practical and numerical parts,for the practical part,the number of features and which features included are the main factors impacting the calculated accuracy,also,the combination of features is as crucial in these calculations.Numerical results included,finding accuracies with enhanced values,for example,NN_MLPC attained 0.979 and 0.98;for DT an accuracy of 0.9825 and 0.986 was attained. 展开更多
关键词 AI driven cybersecurity artificial intelligence CYBERSECURITY Decision Tree Neural Network Multi-Layer Perceptron Classifier portable executable(PE)file header features
在线阅读 下载PDF
The trend of mechanizing road header for coal mine entry
9
作者 HUI Xing-tian 《Journal of Coal Science & Engineering(China)》 2010年第1期99-103,共5页
In discussing coal mine entry construction with rock bolt technology, examinedthe craft and machinery problems as well as the conditions in which to use each kind ofmachine and tool.It exposed the intrinsic flaws of t... In discussing coal mine entry construction with rock bolt technology, examinedthe craft and machinery problems as well as the conditions in which to use each kind ofmachine and tool.It exposed the intrinsic flaws of the widely used road header.The problemis that it was designed according to early timbering support state but is not suitable forrock bolt technology.The way to improve the function of existing road headers is notthrough parallel operations but using the SUDM (Shield Union Driving Machine), which isa new machine that improves construction.This article proposed a few solutions in designto solve this problem. 展开更多
关键词 coalmine gateway mine entry construction road header mechanization suggestion
在线阅读 下载PDF
An Analysis of the Influence of Protective Films on the Inner Surfaces of CCPP Headers and Steam Pipelines on Their Thermal Stress State
10
作者 Yury A. Radin Tatiana S. Kontorovich 《American Journal of Analytical Chemistry》 2017年第1期116-124,共9页
At present, the main attention of researchers is paid to the deterioration of heat transfer when heating the outer surface of the pipe with the liquid or steam, flowing inside it, in the presence of films or deposits ... At present, the main attention of researchers is paid to the deterioration of heat transfer when heating the outer surface of the pipe with the liquid or steam, flowing inside it, in the presence of films or deposits on its inner surface. However, when pipe is heating by heat carrier medium, flowing inside it, film on the inner pipe surface serve a dual protective function, protecting the pipe from corrosion and reducing its thermal stress. The article represents the results of the computational analysis of protective films influence on the thermal stressed state of headers and steam pipelines of combined-cycle power plants (CCPP) heat-recovery steam generators at different transient operating conditions particularly at startups from different initial temperature states and thermal shock. It is shown that protective films have a significant influence on the stresses magnitude and damage accumulation mainly for great temperature disturbances (for thermal shock). Calculations were carried out at various thicknesses of films and assuming that their thermal conductivity less than thermal conductivity of the steam pipelines metal. 展开更多
关键词 Heat-Recovery STEAM GENERATOR header STEAM Pipeline Protective Film Stress THERMAL Shock STARTUP EQUIVALENT Operating Hours
暂未订购
The status and prospects of in situ grain harvesting technology and its machine system
11
作者 Jiang Yiyuan Xu Jiamei Du Chenghai 《Journal of Northeast Agricultural University(English Edition)》 CAS 1994年第1期68-75,共8页
Two main types of in situ grain harvesttng machine are introduced. The comparison of their working principles and advantages are given. The limitations and prospects for stripper header are discussed.
关键词 in situ harvesting technology stripper header threshing prior to cutting
在线阅读 下载PDF
STUDY ON THE METHODS OF STRUCTURALDYNAMIC MODIFICATION OPTIMIZATION OF ROAD HEADERS
12
作者 吴淼 黄民 +1 位作者 王建军 魏任之 《Journal of China University of Mining and Technology》 1996年第2期62-68,共7页
In this paper, taking AM-50 Road Heaer as an example, the metheds of structural dynamic modification optimization for road headers are studied using experimental modal analysis and physical parameters analysis. The ma... In this paper, taking AM-50 Road Heaer as an example, the metheds of structural dynamic modification optimization for road headers are studied using experimental modal analysis and physical parameters analysis. The machine’s modal model and lumped mass model are established and the vibration response simulation is calculated for the two models with the load spectral measured. On the above basis, the dynamic parameters of the models are optimised and some useful results have been obtained.The research methods in this paper can be used for the reference to the other lager type mining machines. 展开更多
关键词 tunneling machine road headers structural dynamic medification
在线阅读 下载PDF
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques
13
作者 Maduhu Mshangi Mlyatu Camilius Sanga 《Journal of Information Security》 2023年第1期1-15,共15页
This paper investigates whether security headers are enforced to mitigate cyber-attacks in web-based systems in cyberspace. The security headers examined include X-Content-Type-Options, X-Frame-Options, Strict-Transpo... This paper investigates whether security headers are enforced to mitigate cyber-attacks in web-based systems in cyberspace. The security headers examined include X-Content-Type-Options, X-Frame-Options, Strict-Transport-Security, Referrer-Policy, Content-Security-Policy, and Permissions-Policy. The study employed a controlled experiment using a security header analysis tool. The web-based applications (websites) were analyzed to determine whether security headers have been correctly implemented. The experiment was iterated for 100 universities in Africa which are ranked high. The purposive sampling technique was employed to understand the status quo of the security headers implementations. The results revealed that 70% of the web-based applications in Africa have not enforced security headers in web-based applications. The study proposes a secure system architecture design for addressing web-based applications’ misconfiguration and insecure design. It presents security techniques for securing web-based applications through hardening security headers using automated threat modelling techniques. Furthermore, it recommends adopting the security headers in web-based applications using the proposed secure system architecture design. 展开更多
关键词 Secure Web Applications Security headers systems Security Secure Web Architecture Design
在线阅读 下载PDF
Refrigerant Distribution Characteristics in Vertical Header of Flat-Tube Heat Exchanger without Internal Protrusion
14
作者 Kazuhiro Endoh 《Journal of Energy and Power Engineering》 2017年第10期655-664,共10页
A heat exchanger that arranges flat tubes horizontally has a vertical header that distributes the refrigerant to each tube. When the heat exchanger works as an evaporator, differences in flow conditions at each branch... A heat exchanger that arranges flat tubes horizontally has a vertical header that distributes the refrigerant to each tube. When the heat exchanger works as an evaporator, differences in flow conditions at each branch, such as the ratio and distribution of vapor and liquid, due to the differences in densities and momentums of vapor and liquid in the two-phase flow make equal distribution difficult. This paper describes the distribution characteristics of a four-branch header that has a rectangular cross-section without the internal protrusion of flat tubes in the case of the inflow of the refrigerant R32 from the bottom of the header by using an equipment that can estimate the distribution ratio of the liquid and vapor phase to each branch. This paper also discusses the distribution characteristics on the basis of the flow visualization in the header. The flow visualization shows that a liquid level that contains vapor phase exists in the header and affects the distribution greatly. 展开更多
关键词 Refrigerant distribution vapor-liquid two-phase flow header flat tube heat exchanger.
在线阅读 下载PDF
基于PID调控的割台仿形高度控制系统的设计 被引量:4
15
作者 王志超 杨然兵 +2 位作者 陈栋泉 王婕 李晓波 《农机化研究》 北大核心 2024年第2期97-102,共6页
为降低谷物联合收获机收获作业时因割台高度不当造成的粮食损失,减少割茬高度过高对后续播种环节的影响,利用传感器监测地面起伏变化,设计了一种基于PID调控的割台高度自适应控制系统;设计了基于角度传感器的地面仿形监测机构与割台高... 为降低谷物联合收获机收获作业时因割台高度不当造成的粮食损失,减少割茬高度过高对后续播种环节的影响,利用传感器监测地面起伏变化,设计了一种基于PID调控的割台高度自适应控制系统;设计了基于角度传感器的地面仿形监测机构与割台高度反馈机构,标定并拟合出割台高度与传感器电压信号的线性关系;加装集成式电磁比例阀替换原有割台控制电控换向阀,并进行PWM控制试验。同时,分析了整套自适应控制系统的结构与电液控制原理,并进行了多组田间对照试验,结果表明:设计的基于地面仿形的割台高度自适应控制系统具有稳定的响应速度和理想的控制效果,在平原地区作业时相较于传统人工控制割台的方式有明显的优势,能适应平原地形环境下5~11km/h收获作业速度的要求。研究结果为后续无人驾驶谷物联合收获机的研发设计提供了割台装置控制策略的理论依据。 展开更多
关键词 谷物收获机 割台 PID控制 液压系统
在线阅读 下载PDF
燃气-蒸汽联合循环发电机组蒸汽旁路压力控制的研究 被引量:1
16
作者 朱成叶 《上海节能》 2024年第3期452-461,共10页
蒸汽旁路压力控制策略研究的目的是在机组启动、停止、锅炉并退汽过程中及机组甩负荷或跳闸时实现蒸汽旁路系统全自动控制和蒸汽压力保护。依托于国外某燃气-蒸汽联合循环发电厂两台机组的蒸汽旁路系统的调试和优化,对机组启、停及运行... 蒸汽旁路压力控制策略研究的目的是在机组启动、停止、锅炉并退汽过程中及机组甩负荷或跳闸时实现蒸汽旁路系统全自动控制和蒸汽压力保护。依托于国外某燃气-蒸汽联合循环发电厂两台机组的蒸汽旁路系统的调试和优化,对机组启、停及运行过程中蒸汽旁路的几种压力控制方式及控制问题分析进行描述。旨在为同类型或相似类型发电机组的旁路控制系统组态或系统优化提供帮助,并为带中间再热、蒸汽母管制的汽轮机发电机组的旁路控制策略设计提供参考。 展开更多
关键词 燃气-蒸汽联合循环发电机组 蒸汽母管制 中间再热 汽轮机 余热锅炉 旁路控制模式
在线阅读 下载PDF
玉米收获机的控制系统优化设计 被引量:5
17
作者 吕英杰 《农机化研究》 北大核心 2024年第5期113-116,共4页
针对4YZL-9型玉米收获机,设计了一款控制系统,并以PLC控制器为核心,分别设计了驱动行走子系统、割台液压子系统及脱粒清选液压子系统。主要的控制过程为:利用湿度传感器采集玉米籽粒含水量,利用压力传感器采集检测玉米喂入量,利用霍尔... 针对4YZL-9型玉米收获机,设计了一款控制系统,并以PLC控制器为核心,分别设计了驱动行走子系统、割台液压子系统及脱粒清选液压子系统。主要的控制过程为:利用湿度传感器采集玉米籽粒含水量,利用压力传感器采集检测玉米喂入量,利用霍尔传感器检测收获机各种速度信息,利用位移传感器检测玉米的距离,并将这些数据发送给PLC控制器,经过计算,输出驱动命令,通过电磁换向阀和电磁比例阀调节控制收获机的割台高度、行走速度、脱粒滚动转速、风机转速及清选筛箱转速等,使得玉米收获机高效的完成行走、收割、脱粒、清选等一系列的收获作业。试验结果表明:加装了控制系统的4YZL-9型玉米收获机正确采摘率为96.7%,玉米粒损失率≤2.4%,籽粒破损率≤3.6%,收获机故障率≤5%,含杂率≤2.8%,能够准确高效地完成玉米的收获作业。 展开更多
关键词 玉米收获机 总控制系统 驱动行走子系统 割台液压子系统 脱粒清选液压子系统
在线阅读 下载PDF
国内玉米联合收获机技术进展
18
作者 崔岳山 《农业工程》 2024年第5期22-26,共5页
在研究国内玉米联合收获机割台系统、轴流脱粒系统、智能清选系统、谷物流量传感系统和在线监测系统等关键部件技术研究概况的基础上,介绍了几款玉米籽粒收获机、青饲料收获机和鲜食玉米收获机的主要技术特点,为今后研究技术和性能先进... 在研究国内玉米联合收获机割台系统、轴流脱粒系统、智能清选系统、谷物流量传感系统和在线监测系统等关键部件技术研究概况的基础上,介绍了几款玉米籽粒收获机、青饲料收获机和鲜食玉米收获机的主要技术特点,为今后研究技术和性能先进的玉米联合收获机提供参考。 展开更多
关键词 玉米 联合收获机 技术进展 青饲料收获机 割台 脱粒系统
在线阅读 下载PDF
悬臂式掘进机智能截割控制系统
19
作者 原超 《机械制造》 2024年第10期22-24,30,共4页
针对现有悬臂式掘进机截割控制精度差、响应速度慢、故障率高的问题,设计了一种具有高度适应性的悬臂式掘进机智能截割控制系统。介绍了悬臂式掘进机的架构,分析了智能截割控制系统中的监测子系统和定位子系统,并给出了智能截割控制流... 针对现有悬臂式掘进机截割控制精度差、响应速度慢、故障率高的问题,设计了一种具有高度适应性的悬臂式掘进机智能截割控制系统。介绍了悬臂式掘进机的架构,分析了智能截割控制系统中的监测子系统和定位子系统,并给出了智能截割控制流程。对设计的悬臂式掘进机智能截割控制系统进行试验和应用,确认能够提高悬臂式掘进机的自动截割精度和运行稳定性,响应时间短于0.2 s,截割控制精度高于0.1 m,运行故障率低于1.2%。 展开更多
关键词 掘进机 截割 控制系统 设计
在线阅读 下载PDF
Sentence Level Analysis Model for Phishing Detection Using KNN
20
作者 Lindah Sawe Joyce Gikandi +1 位作者 John Kamau David Njuguna 《Journal of Cyber Security》 2024年第1期25-39,共15页
Phishing emails have experienced a rapid surge in cyber threats globally,especially following the emergence of the COVID-19 pandemic.This form of attack has led to substantial financial losses for numerous organizatio... Phishing emails have experienced a rapid surge in cyber threats globally,especially following the emergence of the COVID-19 pandemic.This form of attack has led to substantial financial losses for numerous organizations.Although variousmodels have been constructed to differentiate legitimate emails fromphishing attempts,attackers continuously employ novel strategies to manipulate their targets into falling victim to their schemes.This form of attack has led to substantial financial losses for numerous organizations.While efforts are ongoing to create phishing detection models,their current level of accuracy and speed in identifying phishing emails is less than satisfactory.Additionally,there has been a concerning rise in the frequency of phished emails recently.Consequently,there is a pressing need for more efficient and high-performing phishing detection models to mitigate the adverse impact of such fraudulent messages.In the context of this research,a comprehensive analysis is conducted on both components of an email message—namely,the email header and body.Sentence-level characteristics are extracted and leveraged in the construction of a new phishing detection model.This model utilizes K Nearest Neighbor(KNN)introducing the novel dimension of sentence-level analysis.Established datasets fromKagglewere employed to train and validate the model.The evaluation of this model’s effectiveness relies on key performance metrics including accuracy of 0.97,precision,recall,and F1-measure. 展开更多
关键词 Sentence level analysis email header email body phishing detection KNN
在线阅读 下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部