期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
The Principle of Square Hole Machining and It's Tooling Structure Design
1
作者 Jinxia NIU 《International Journal of Technology Management》 2015年第2期7-8,共2页
In order to meet the rapid needs of processing square hole in mechanical equipment, the paper expounds the square hole processing method: planetary wheel method, and analyze the principle of tooling structure and pro... In order to meet the rapid needs of processing square hole in mechanical equipment, the paper expounds the square hole processing method: planetary wheel method, and analyze the principle of tooling structure and process with computer graphics parameters design. The results that, as long as the appropriate parameters, using the above method not only can punch the square hole, can also be processed triangle, the five angle and hexagonal regular polygon holes. The square hole processing method can provide theoretical basis and engineering reliable reference for related engineering and technical personnel. 展开更多
关键词 Abstract: In order to meet the rapid needs of processing square hole in mechanical equipment the paper expounds the square hole processing method: planetary wheel method and analyze the principle of tooling structure and process with computer graphics parameters design. The results that as long as the appropriate parameters using the above method not only can punch the square hole can also be processed triangle the five angle and hexagonal regular polygon holes. The square hole processing method can provide theoretical basis and engineering reliable reference for related engineering and technical personnel. Keywords: Square hole processing Planet wheel Lelo triangle Square hole drilling
下载PDF
A Less Resource-Consumed Security Architecture on Cloud Platform 被引量:1
2
作者 CUI Jingsong LIAO Kun +2 位作者 TIAN Changyou PENG Rong WU Xun 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第5期407-414,共8页
Traditional security framework in cloud platform usually brings self-vulnerability and considerable additional resource consumption. To solve these problems, we propose an external processes monitoring architecture fo... Traditional security framework in cloud platform usually brings self-vulnerability and considerable additional resource consumption. To solve these problems, we propose an external processes monitoring architecture for current popular cloud platform Open Stack with kernel-based virtual machine(KVM). With this architecture, we can monitor all active processes in online virtual machine(VMs) and scan them for their potential maliciousness in OpenS tack with no agent, and can also detect hidden processes in offline VMs’ memory snapshots and notice the user to decide whether to kill them when VMs become active. Analysis and experimental results show that our architecture is able to reduce consumption of CPU, memory and bandwidth in cloud platform and can detect viruses and hidden processes effectively in VMs. 展开更多
关键词 cloud security process monitoring process analyze hidden process detection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部