5 results on '"Li-yong Zhang"'
Search Results
2. Optimize design dexterity of tooth-arrangement three-fingered hands
- Author
-
Hai-ying Wang, Li-yong Zhang, and Yong-de Zhang
- Subjects
Optimal design ,Engineering ,Bionics ,business.industry ,Control engineering ,Robotics ,Optimal control ,Control theory ,Robot ,Artificial intelligence ,MATLAB ,business ,Engineering design process ,Rotation (mathematics) ,computer ,computer.programming_language - Abstract
Tooth-arrangement Three-fingered Hands is a brand-new oral cavity repairing robot. It has the functions of fine grasping and arranging artificial tooth, manufacturing complete denture, etc. A new optimization design method is proposed in this paper that solves the problems in optimization structure parameter confirming and optimal dexterous design. The bionic theorem behind duplicating the dexterity of the human finger is incorporated into the structure parameter optimization algorithm. Through analyzing the dexterity of the single finger, adopting the design criteria of dexterous degree with optimum index and combining the characteristic of grasping the smallest object, this design method can confirm the best dexterity area for single finger, relations between every rod length and rotation range of every joint. Using MATLAB optimization toolbox to optimize above-mentioned structure parameter, it gains the optimal dimension that meets characteristic of human fingers and can finish grasping. A quantitative method is also proposed in this paper to calculate the relative position between fingers. It is applied to the real design of Tooth-Arrangement Three-fingered Hands and obtained optimal flexible performance. Keywords : dexterity, three-fingered hands, structure parameter, optimize
- Published
- 2005
- Full Text
- View/download PDF
3. An embedded telecommunication cable auto-locating system of guard against theft and alarm
- Author
-
Li-yong Zhang, Jun Li, Yan Li, and Tian-Bo Jin
- Subjects
Category 5 cable ,Engineering ,Telephone network ,business.industry ,Electrical engineering ,law.invention ,Cable modem termination system ,Relay ,law ,Digital cable ,Cable Internet access ,business ,Telecommunications ,Alternating current ,Cable management - Abstract
This system adopted two-level structure that was composed of Cable Monitoring And Controlling Device (CMCD) and Cable Monitoring Center (CMC). CMC receives the alarm data via the MODEM and the telephone net. In this way, the functions of typing the fault point's map, alarming and the cable management can be picked up. CMCD takes the processor chip Atemega128 as the center of the system that adopted the alternating current and direct current on-line switching electricity-supply mode. Also, the system includes four groups of independent power, the relay and the optical isolation to separate the system from the monitoring cable and the telephone net. CMCD accomplishes the cable real-time monitoring, malfunctions auto-locating, telephone voice alarming, long-distance parameters modification, data up-loading, error verifying and the telecommunication room's environment monitoring and so on. The longest distance of monitoring cable is 20 km, and the precision is 1%.
- Published
- 2005
- Full Text
- View/download PDF
4. Key management approach of multicast
- Author
-
Xi-lian Wang, Zhen Jiang, Li-yong Zhang, and Hong-ke Zhang
- Subjects
Authentication ,Multicast ,business.industry ,Computer science ,Key distribution ,Computer security ,computer.software_genre ,Key generator ,Distributed algorithm ,Key (cryptography) ,Xcast ,Unicast ,business ,Key management ,computer ,Computer network - Abstract
A key management approach of multicast is provided in this paper. It is based on the approach of assignment key to every group member through key center. In view of some management schemes where members join, leave or are deleted, key service center must distribute new key through unicast another time. The bigger amount of members the greater expenses will be spent. In this paper with member varying their upper key service center still distribute the new keythrough multicast and an ID is assigned to every member to identify their transmission message so as to implement data origin authentication. The essential principle of this approach is distributing a key generator for each member. For example a random number generator depending on certain algorithm can be distributed. And every member needs store a seed table. In this project key can automatically be renewed as time goes by or immediately renewed. Replace unicast by multicast to renew key decrease the spending. It is not only suitable for the key centralized management scheme with fewer members but also for the key separated management scheme with large group members and member frequently changed.
- Published
- 2002
- Full Text
- View/download PDF
5. Research and implementation of IPSec inside operating system
- Author
-
Hong-ke Zhang, Li-yong Zhang, Zhen Jiang, and Xi-lian Wang
- Subjects
Router ,Network security ,business.industry ,Computer science ,computer.internet_protocol ,computer.software_genre ,Encapsulation (networking) ,Data flow diagram ,Software ,Embedded system ,IPsec ,Operating system ,System integration ,Key management ,business ,computer - Abstract
In this paper an implementation approach of IPSec inside host operating system is given, which is composed of three main modules: Kernel IPSec module, where AFT, ESP and theirs encapsulation in kernel are implemented, Key Management Process module, where IKE consultation and its connection with other parts are implemented, and Interface module. The whole implementation approach is introduced and each component part is detailed. The implementation diagram is shown. Several key points such as policy management and so on which should be considered in implementation are provided. Main software flow diagrams are illustrated. Some functions are mentioned. The integrated approach inside operation system presented in this paper is modularized to three parts, and every part is supported by its backstage procedure. So this approach is characterized by easily disposal and transplant. For example it also can be conveniently applied to router software to implement integration inside router.
- Published
- 2002
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.