简介:Aimingattheproblemssuchasmorerepeatedlydesignandlongerdesigncycle,inthispaper,thesimilaritytheorywasintroducedtothedesignprocessofthekeystructuresofflotationmachine.TheimpellerandU-shapedtankofflotationmachinesystemwereanalyzedassimilarityunit.Meanwhile,thelevelofsimilarityoftheunitsandthesimilarityofthesystemwerecalculated.BasedontheanalysisoftheimpellerandthesizeofU-shapedtank,thesimilaritycriteriawerederived.Thederivedconclusionsare:(1)Therelationshipbetweenthediameteroftheimpellerandthevolumeofthetankwaspowerfunctionandcalculatedasthesimilaritycriteriaoftheimpeller;(2)TherelationshipbetweentheratiobetweentheU-shapedtank’scross-sectionalareaandimpeller’sdiameterandthevolumeofthetankwaspowerfunctionandcalculatedasthesimilaritycriterionsoftheU-shapedtank.Usingthesimilaritycriterioncombinedwithcomputertechnologyanddatabasetechnologytorealizepartandsystemserializationdesign.Theresultsshowthattheresearchcanavoidrepeatedlydesign,shortendesigncycle,andraisethedesignefficiency.
简介:Opticalmotioncaptureisanincreasinglypopularanimationtechnique.Inthelastfewyears,plentyofmethodshavebeenproposedforkey-frameextractionofmotioncapturedata,anditisacommonmethodtoextractkey-frameusingquaternion.Here,onemaindifficultyisduetothefactthatpreviousalgorithmsoftenneedtomanuallysetvariousparameters.Inaddition,itisproblematictopredefinetheappropriatethresholdwithoutknowingthedatacontent.Inthispaper,wepresentanoveladaptivethreshold-basedextractionmethod.Key-framecanbefoundaccordingtoquaterniondistance.Weproposeasimpleandefficientalgorithmtoextractkey-framefromamotionsequencebasedonadaptivethreshold.Itisconvenientwithnoneedtopredefineparameterstomeetcertaincompressionratio.Experimentalresultsofmanymotioncaptureswithdifferenttraitsdemonstrategoodperformanceoftheproposedalgorithm.Ourexperimentsshowthatonecantypicallycutdowntheprocessofextractionfromseveralminutestoacoupleofseconds.
简介:Identity-basedhashproofsystemisabasicandimportantprimitive.Ittographicschemesandprotocolsthataresecureagainstkey-leakageattacks.Inthisupdatableidentity-basedhashproofsystem,inwhichtherelatedmastersecretkeyiswidelyutilizedtoconstructcryp-paper,weintroducetheconceptofandtheidentitysecretkeycanbeupdatedsecurely.Then,weinstantiatethisprimitivebasedonlatticesinthestandardmodel.Moreover,weintroduceanapplicationofthisnewprimitivebygivingagenericconstructionofleakage-resilientpublic-keyencryptionschemeswithanonymity.Thisconstructioncanbeconsideredastheintegrationofthebounded-retrievalmodelandthecontinualleakagemodel.Comparedwiththeexistingleakage-resilientschemes,ourconstructionnotonlyismoreefficientbutalsocanresistmuchmorekeyleakage.