In order to meet the rapid needs of processing square hole in mechanical equipment, the paper expounds the square hole processing method: planetary wheel method, and analyze the principle of tooling structure and pro...In order to meet the rapid needs of processing square hole in mechanical equipment, the paper expounds the square hole processing method: planetary wheel method, and analyze the principle of tooling structure and process with computer graphics parameters design. The results that, as long as the appropriate parameters, using the above method not only can punch the square hole, can also be processed triangle, the five angle and hexagonal regular polygon holes. The square hole processing method can provide theoretical basis and engineering reliable reference for related engineering and technical personnel.展开更多
Traditional security framework in cloud platform usually brings self-vulnerability and considerable additional resource consumption. To solve these problems, we propose an external processes monitoring architecture fo...Traditional security framework in cloud platform usually brings self-vulnerability and considerable additional resource consumption. To solve these problems, we propose an external processes monitoring architecture for current popular cloud platform Open Stack with kernel-based virtual machine(KVM). With this architecture, we can monitor all active processes in online virtual machine(VMs) and scan them for their potential maliciousness in OpenS tack with no agent, and can also detect hidden processes in offline VMs’ memory snapshots and notice the user to decide whether to kill them when VMs become active. Analysis and experimental results show that our architecture is able to reduce consumption of CPU, memory and bandwidth in cloud platform and can detect viruses and hidden processes effectively in VMs.展开更多
文摘In order to meet the rapid needs of processing square hole in mechanical equipment, the paper expounds the square hole processing method: planetary wheel method, and analyze the principle of tooling structure and process with computer graphics parameters design. The results that, as long as the appropriate parameters, using the above method not only can punch the square hole, can also be processed triangle, the five angle and hexagonal regular polygon holes. The square hole processing method can provide theoretical basis and engineering reliable reference for related engineering and technical personnel.
基金Supported by the National Natural Science Foundation of China(61170026)
文摘Traditional security framework in cloud platform usually brings self-vulnerability and considerable additional resource consumption. To solve these problems, we propose an external processes monitoring architecture for current popular cloud platform Open Stack with kernel-based virtual machine(KVM). With this architecture, we can monitor all active processes in online virtual machine(VMs) and scan them for their potential maliciousness in OpenS tack with no agent, and can also detect hidden processes in offline VMs’ memory snapshots and notice the user to decide whether to kill them when VMs become active. Analysis and experimental results show that our architecture is able to reduce consumption of CPU, memory and bandwidth in cloud platform and can detect viruses and hidden processes effectively in VMs.