首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
文章详细说明了利用AT89S52单片机及一些可编程芯片,实现具有语音功能、时钟功能的数字式温度计的设计.对系统各部分的设计和功能进行了详细的说明.  相似文献   

2.
软件系统非功能特性的分析设计一直是面向对象方法研究中的薄弱环节,缺乏系统化的建模手段。文章提出了一种基于反射的非功能特性分析设计方法,该方法利用反射思想分离功能特性和非功能特性。对于非功能特性,扩展UML并结合相关的非功能需求建模策略对其进行分析设计。  相似文献   

3.
熊晶  刘勇  徐建良 《计算机应用》2011,31(10):2804-2807
为弥补制造业中设计知识在共享和重用方面的缺陷,提出一种基于功能本体的设计知识共享策略。使用功能本体实现现有产品结构到其功能的映射,利用功能分解树表达产品的设计原理。首先,介绍了功能本体的基本框架;然后,分析了功能分解树在产品设计中的作用;最后,通过实现一个家电领域设计知识共享平台,验证所提出的共享策略的可行性。实验结果表明,该策略能有效实现制造业设计知识的信息检索、共享和重用,可以缩短产品的开发周期。  相似文献   

4.
基于空间探索的创造性设计方法的研究   总被引:5,自引:1,他引:4  
文中运用功能-行为-结构框架描述了基于状态空间扩展的探索性创造设计模型。在结构、行为或功能的相似基础上进行基于类比的设计,可以使新的结构、行为或功能从源设计引入至目标设计。  相似文献   

5.
应用SolidWorks软件的三维建模功能及参数化设计功能进行水果切削机的结构设计,主要包括水果切削机外壳的设计、主轴的设计、齿轮参数的计算与设计、摇柄组件的设计、切削刀片的设计建模、电池盒和底座旋转支座的设计建模,并利用其装配功能将上述组件进行完整的装配。在整个设计过程中,运用参数化设计方法,可使用户迅速、准确地理解设计师的意图,为产品的更新换代提供了简单修改应用的方便,为企业的持续发展提供了可靠的保障。  相似文献   

6.
随着芯片设计的飞速发展.功能验证已经成为整个设计过程中的主要瓶颈.介绍一种高效高质量的功能验证方法--受限随机矢量生成的功能验证方法.研究该方法在设计模块功能验证中的具体应用,并以WCDMA基带下行HSDPA协处理器的功能验证为例,给出基于E语言的具体验证环境和验证步骤.验证结果表明,该方法极大地提高了验证的效率和质量.  相似文献   

7.
蔡剑卿 《福建电脑》2006,(10):128-129
本文论述了利用VFP技术中的数据库设计、表单设计、报表设计及SQL语言等功能完成整个企业业务系统的设计,使该系统具有业务信息的数据输入、多条件查询、多条件统计和打印等功能。  相似文献   

8.
Autocad设计软件作为目前设计行业的主要软件之一,以其强大的设计功能以及简便的操作方式被广泛应用于各个行业领域的设计工作之中。但是随着设计工作呈现出复杂化、涉及专业面越来越广的发展趋势,cad设计软件的分布协同功能也日益受到人们的关注,尤其是在互联网技术发达的今天,如何有效将cad设计系统实现协同设计功能并具备web service特点,成了设计行业所需要研究的课题。  相似文献   

9.
基于设计目录的计算机辅助概念设计系统   总被引:1,自引:0,他引:1  
概念设计是设计中最重要的阶段之一,在概念设计阶段将完成从功能到功能原理解的映射过程,包含了设计中的大部分重要决策问题。在把用户需求转化为总功能后,要对总功能进行分解,直到不能分解为止,然后利用设计目录对子功能求解,获得相应的功能原理解,最后进行综合获得概念设计原理方案。本文在这个过程模型的基础上研究了面向计算机的概念设计模型、设计目录方法和概念设计过程模型,为计算机辅助概念设计提供了一套切实可行的方法。  相似文献   

10.
多媒体技术与软件技术的结合可以为教学软件的设计提供必要的支持和帮助,成语教学软件在设计的过程中首先应明确目标、明确结构、明确功能,在此基础上完成时系统结构、功能等的实现,并利用功能软件将多媒体和相应操作平台连接起来,完成软件的设计.  相似文献   

11.
Background: An increasing number of industrial robots are being programmed using CAR (Computer Aided Robotics). Sensor guidance offers a means of coping with frequent product changes in manufacturing systems. However, sensors increase the uncertainty and to preserve system robustness, a tool is needed that makes it possible to understand a sensor guided robot system before and during its actual operation in real life.Scope: A virtual sensor is developed and integrated in a CAR hosted environment. The real sensor is of a type commonly used in the arc-welding industry and uses a triangulation method for depth measurements. The sensor is validated both statically and dynamically by matching it with a real sensor through measurements in setups and by comparing a welding application performed in a real and a virtual work-cell created with a CAR application. The experimental results successfully validates its performance. In this context, a virtual sensor is a software model of a physical sensor with similar characteristics, using geometrical and/or process specific data from a computerized model of a real work-cell.  相似文献   

12.
A direction finder is a military weapon that is used to find locations of targets that emit radio frequencies. Multiple direction finders are used in a direction finder system for finding locations of targets in an area of interest. We present a two-stage heuristic algorithm for disposing direction finders in a direction finder system for the objective of maximizing the accuracy of estimation of the location of a target that is assumed to be located in the area of interest. In the suggested heuristic algorithm, a simulation-based method is used for estimating the probability of coverage, the probability that a target is in a given region (of a given size) surrounding the estimated location of the target, and another simulation-based method and a local search method are used to determine locations of direction finders that result in the maximum probability of coverage. Performance of the suggested algorithm is evaluated through computational experiments and results show that the algorithm gives a good disposition plan in a reasonable amount of computation time.  相似文献   

13.
This paper presents a formal specification and a proof of correctness for the widely-used Force-Directed List Scheduling (FDLS) algorithm for resource-constrained scheduling of data flow graphs in high-level synthesis systems. The proof effort is conducted using a higher-order logic theorem prover. During the proof effort many interesting properties of the FDLS algorithm are discovered. These properties are formally stated and proved in a higher-order logic theorem proving environment. These properties constitute a detailed set of formal assertions and invariants that should hold at various steps in the FDLS algorithm. They are then inserted as programming assertions in the implementation of the FDLS algorithm in a production-strength high-level synthesis system. When turned on, the programming assertions (1) certify whether a specific run of the FDLS algorithm produced correct schedules and, (2) in the event of failure, help discover and isolate programming errors in the FDLS implementation.We present a detailed example and several experiments to demonstrate the effectiveness of these assertions in discovering and isolating errors. Based on this experience, we discuss the role of the formal theorem proving exercise in developing a useful set of assertions for embedding in the scheduler code and argue that in the absence of such a formal proof checking effort, discovering such a useful set of assertions would have been an arduous if not impossible task.  相似文献   

14.
This article proposes a hierarchically structured and constraint-based data model for intuitive and precise solid modeling in a virtual reality (VR) environment. The data model integrates a high level constraint-based model for intuitive and precise manipulation, a middle level solid model for complete and precise representation and a low-level polygon mesh model for real-time interactions and visualization in a VR environment. The solid model is based on a hybrid B-rep/CSG data structure. Constraints are embedded in the solid model and are organized at hierarchical levels as feature constraints among internal feature elements, part constraints among internal features and assembly constraints between individual parts. In addition to providing a complete and precise model representation and the support for real-time visualization, the proposed data model permits intuitive and precise interaction through constraint-based manipulations for solid modeling in a VR environment. This is a critical issue for product design in a VR environment due to the limited resolutions of today's VR input and output devices.  相似文献   

15.
关于一种网格运行时结构的若干注记   总被引:4,自引:4,他引:4  
进程是传统计算机系统的一个核心概念,自1960年出现以来一直沿用至今,进程的一个主要目的是为主体提供一种运行时结构,在操作系统和处理器硬件支持下,代表主体访问和使用各种资源,与传统的单机和并行机计算平台相比,网格计算机中进程所对应的概念面临新的挑战,包括网格资源繁杂、自主控制的条件下的单一系统映像和资源的共享与协同、与特定操作系统的松耦合、时间和空间的流动性、更高级的交互性,提出一种称为网程(grip)的运行时结构,试图解决上述问题,网程运行在网格操作系统之上,代表网格主体,访问和使用网格资源。  相似文献   

16.
Service Science, Engineering and Management (SSME) is emerging as a new discipline and several universities have been evolving or creating courses/programs to educate for the needs of the service fields of the economy. The University of Porto started in 2007 a master program in Service Engineering and Management, and Masaryk University started in 2008 a program in Service Science, Management, and Engineering. Both programs concentrate on services that are supported by technology, in particular information and communication technologies. This paper presents a summary of both programs and a proposal for a joint 2 year master program involving the two universities that is expected to start in 2010. Students in this program will take courses in the two universities, and lecturers will be involved in joint research projects. Individual students will have a semester research or applied project in a European service organization, being supervised by a lecturer or a researcher from each universities. It is expected that graduates will understand technological, organizational and cultural aspects of the diverse businesses in a wide European context and will be ready for service requirements of this century.  相似文献   

17.
A work on user-oriented Bengali orthography has been carried out while teaching Bengali as a Third language. Learning Bengali is difficult because of the presence of innumerable conjunct letters and the absence of a vowel-sign for the first vowel in Bengali orthography. It is extra difficult for foreigners because the working memory in learning a foreign language is quite limited. It is easy to make a computer-key-board with a thousand letters and signs, but it is difficult to use in practice. It is shown in this work that the Bengali conjunct letters not used as initial letters in word-making were redundant in its orthography and could be dissected to their components, if a missing-letter sign for the unborn first Bengali vowel-sign was raised in accordance with Bengali orthographic rule. Only 30 conjunct letters used in Bengali as initial letters in word-making which could be kept intact. Thus only 108 signs on a key-board, including 10 digits and 20 punctuation and other signs were sufficient in case of a user-oriented Bengali orthography. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   

18.
A work on user-oriented Bengali orthography has been carried out while teaching Bengali as a Third language. Learning Bengali is difficult because of the presence of innumerable conjunct letters and the absence of a vowel-sign for the first vowel in Bengali orthography. It is extra difficult for foreigners because the working memory in learning a foreign language is quite limited. It is easy to make a computer-key-board with a thousand letters and signs, but it is difficult to use in practice. It is shown in this work that the Bengali conjunct letters not used as initial letters in word-making were redundant in its orthography and could be dissected to their components, if a missing-letter sign for the unborn first Bengali vowel-sign was raised in accordance with Bengali orthographic rule. Only 30 conjunct letters used in Bengali as initial letters in word-making which could be kept intact. Thus only 108 signs on a key-board, including 10 digits and 20 punctuation and other signs were sufficient in case of a user-oriented Bengali orthography. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   

19.
This paper presents a 3D noncontacting sensor system designed to measure the position and orientation of a robot end effector. This measurement system includes two parts: a tridimensional object including four spheres placed along the axes of a tetrahedron and a set of three orthogonally pointed cameras. The purpose is to design a measurement system characterized by easy relationships in order to satisfy real-time constraints. The system has been used in two experiments: first, to calibrate a parallel robot and validate the geometrical control performance, then as an exteroceptive sensor in an assembly task. The system computes position and orientation of the tetrahedron in 100 ms time. The position and orientation accuracy are, respectively, 0.6 mm and 0.2 deg in a workspace, being a cube with 0.3 m sides.  相似文献   

20.
The blockchain is a radical innovation that has a considerable effect on payments, stock exchanges, cybersecurity, and computational law. However, its limitations in terms of the uncertainty involved in transaction confirmation are significant. In this paper, we describe the design of a decentralized voting protocol for the election of a block generator in a consortium blockchain and propose a new system framework that allows fast and exact confirmation of all transactions. In addition, to replace a transaction’s owner signature, a new interactive incontestable signature between the dealer and owner is used to confirm a transaction. By means of this signature, the dealer can assure the owner that a transaction will be permanently included in the blockchain in a non-repudiation manner. Moreover, the signatures of all transactions in a block share only one witness that provides membership proof between the block and these transactions. Finally, a security and performance analysis shows that the proposed schemes are provably secure and highly efficient.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号