http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Jinshuai Xu,Zhaohui Qi,Yingpeng Zhuo,Tianjiao Zhao,Rumin Teng,Lingchong Gao 대한기계학회 2023 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.37 No.10
Double cable system (DCS) with a movable guide pulley (MGP) is a common component in many mechanical equipment. It is difficult to calculate the unstressed length of cable under a preload, and the form-finding analysis after obtaining the unstressed length. To solve this problem, a method of establishing double-layer nonlinear equations for calculating the unstressed length of cable under a given preload is proposed. For the inner single cable, a new cable element is presented based on Hermite interpolation. Later, initial cable form is obtained by approximating catenary as a three-point parabola, and the initial values for the nonlinear equations are derived. For the outer double cable, unstressed length is a descriptive variable of the DCS. In view of the constraints on a single cable posed by the guide pulleys, corresponding constraint equations are obtained by introducing the angle of rotation of the MGP, which is a process variable. Under a given preload at an end of single cable, equations for the DCS with a MGP are constructed. Moreover, the tangent stiffness matrixes are derived for quick solution, and unstressed length for the DCS is obtained. On this basis, by changing the partial constraint equations of the DCS, the form-finding analysis of the cable can be achieved. A few numerical examples and comparisons demonstrate the reliability of the proposed new approach for geometrically nonlinear analysis of cables.
Research on Cyberterrorism Countermeasures in the Context of Big Data
Liu Aijiao,Qu Jinshuai,Xu Qiudi 아시아사회과학학회 2021 Jornal of Asia Social Science Vol.4 No.1
While the development of information and network technology has brought huge convenience to our daily life, it also unfortunately provides an enormous hotbed for cyberterrorism. The features of cyber space, including randomness, borderless, covertness, complexity, real-time and etc., have made it difficult to counterstrike and prevent cyberterrorism. In the context of big data, this essay has elaborated on development of cyberterrorism and how to establish a sophisticated system based on big data to response to cyberterrorism.