Abstract Automating Proofs of Guaranteed Optimization

合集下载

基于红外与单目视觉的机器人自动回充系统

基于红外与单目视觉的机器人自动回充系统

传感器与微系统(Transducer and Microsystem Technologies )2019年第38卷第7期檸檸檸檸檸檸檸檸檸檸檸檸殠殠殠殠设计与制造DOI :10.13873/J.1000—9787(2019)07—0064—03基于红外与单目视觉的机器人自动回充系统魏银,李垚(中国科学技术大学信息科学技术学院,安徽合肥230026)摘要:自动充电作为家庭扫地机器人不可或缺的重要一环,保证了扫地机器人可以在电量不足时,自行寻找到充电座对接充电。

使用红外传感器与摄像头完成扫地机器人与充电座的对接过程中,摄像头弥补了红外精确度不高的问题,红外弥补了摄像头视野范围小的问题。

测试表明机器人与座对准精度优于ʃ5mm 。

关键词:红外信号;单目视觉;自动充电;对接中图分类号:TP 242文献标识码:A文章编号:1000—9787(2019)07—0064—03Robot auto-charge system based on infrared and monocular visionWEI Yin ,LI Yao(School of Information Science and Technology ,University of Science and Technology of China ,Hefei 230026,China )Abstract :As an essential part of family cleaning-robot ,automatic charging is an important function ,it ensures the robot to find the charge-dock and charge when the battery is low.Infrared sensors and cameras are used to complete process of cleaning-robot docking to the charge-dock ,camera covers the shortage of low precision of infrared sensor ,infrared sensor covers the shortage of small vision of camera.Tests show that the precision of docking is prior to ʃ5mm.Keywords :infrared-signal ;monocular vision ;auto-charge ;docking引言自动充电是家用移动机器人如扫地机必不可少的一个功能,这个过程中机器人与充电座的对接离不开各种传感器的使用[1],以往的扫地机器人在自动充电任务中基本单独采用红外传感器技术进行对接[2],通过能接收到的信号红外传感器的位置与数量来判断机器人与充电座之间的相对位置从而进行自动充电,这种方式需要使用较多的红外传感器;或者是采用较少的红外传感器,利用检测出信号的强度来判断机器人的方向[3,4],因此需要红外信号强度检测精度非常高的接收电路;也可以通过红外信号反射的原理,机器人在不同位置时发出红外信号通过充电座反射回来接收信号,判断出机器人与充电座的相对位置进行对接[5];第四种是使用激光器和摄像头的方案[6,7],激光方向性好,一旦检测到信号对接精度高,缺点无论激光还是摄像头探测范围小,一开始不能确定目标大致方位,则需要漫游,或者只能通过固定的角度进入充电座检测范围内;还有一种充电座外形具有凹凸不平区域,两种区域分别覆盖有光线吸收率高的材料和光线反射率高的材料,这样采用激光雷达传感器进行检测,为了使充电座容易被检测到,充电收稿日期:2018—05—27座体积较大,而且激光雷达的成本也相对较高。

State-of-the-Art and Future Trends

State-of-the-Art and Future Trends

Logic-Based Program Synthesis: State-of-the-Art and Future TrendsSteve RoachDepartment of Computer ScienceUniversity of Texas at El PasoEl Paso, Texas 79968sroach@AbstractConstructing certifiably reliable software systems is difficult. Deductive program synthesis techniques (Flener1995, Manna and Waldinger 1980) can currently be used toconstruct small software systems or to organize small sets ofsoftware components in a reliable manner. In order for synthesis techniques to be applicable to real-world problemsoutside the experimental laboratory, they must be inexpensive relative to manual techniques. The difficultyand expense in constructing software synthesis systems currently precludes the use of these techniques in many instances.Amphion and Meta-AmphionAmphion (Stickel, et al. 1994) is a deductive synthesis system that has been used to construct programs in the domains of celestial mechanics and avionics. The experiences gained in the Amphion system mirror experiences in other synthesis systems. Amphion is a domain-independent system that is tailored to a domain in part through the creation of a declarative domain theory. Problem specifications are solved by programs constructed of sequences of calls to software components. Program construction is entirely automated. Programs have been generated that are currently in use by space scientists planning observations for the Cassini mission to Saturn (Roach and Van Baalen 1996, Roach, Lowry, and Pressburger 1995).An Amphion domain theory is written in first-order logic and relates abstract, specification-level functions and predicates to concrete, implementation-level components. Specifications for programs are also written in first-order logic and take the form Forall (inputs) Exists (outputs) ({properties}). A general-purpose resolution theorem prover finds ground instances of the existential variables for which the set of properties hold. These ground instances form functional terms that are translated into a target language compatible with the existing software components.While it is not particularly difficult to create a declarative domain theory for Amphion that captures the relationships between the abstract and the concrete, the performance of the general-purpose resolution theorem prover quickly degrades due to the exponential behavior of the required search. Thus, a naive domain theory can only be used to construct simple programs. In order to synthesize non-trivial programs, it is necessary to tune the domain theory. Tuning a domain theory consists of rewriting axioms to take advantage of knowledge of the implementation of the theorem prover or incorporating specialized inference mechanisms (such as decision procedures) that are tied directly to the theorem prover. Both of these methods require a high degree of expertise, a great deal of time, and are quite difficult. While the construction of decision procedures can be automated to some extent (Van Baalen and Roach 1998, Roach, Van Baalen, and Lowry 1997, Roach 97), the integration of these procedures with the general-purpose theorem prover used in Amphion has been difficult and un-maintainable.Difficulties in Program SynthesisIn the past thirty years, a great deal of progress has been made in the development of program synthesis systems based on theorem proving, transformations, and logic programming. However, in spite of this progress, these techniques are not in the mainstream of software development. Formal program synthesis techniques, at least with the current synthesis technologies, are not appropriate for all software development situations. The characteristics of inappropriate situations include having little potential for reuse (to amortize the cost of constructing the synthesis system) and having a domain or class of problems that are not well understood.In situations where it is necessary to prototype a system in order to answer fundamental questions about the capability of an approach or to explore domain knowledge, it is much more difficult to construct a synthesis system than to construct programs by hand. Many market-driven software systems fall into this category. Such systems are inherently difficult to formalize. While some argue that the lack of formalization is a deficiency on the part of program developers, it is frequently a necessity. It may be that the cost of formalizing a specification is too high relative to the cost of having a human interpret an informal specification. The translation between informal and formal (a task we assume to require human oversight) may befaster at lower levels of abstraction for some problems. This occurs when relatively simple ideas expressed informally become difficult to formalize.Additionally, many synthesis techniques scale badly. Deductive techniques have exponential behavior. Thus, while they may work reasonably well for small problems, they do not work for large problems. There are approaches to addressing this problem (Roach 1997, Srinivas and McDonald 1996, Smith 1991); however, it is still difficult to reuse the work done in one domain to solve problems in another domain.The future of program synthesisBy looking at the successes in program synthesis, it is reasonable to suggest characteristics of situations where synthesis is appropriate. In order to become a mainstream technique, synthesis must be advantageous either by making the software faster to produce, cheaper to produce and maintain, or of higher quality. The mechanisms for achieving this includea) producing code faster via synthesis than by handby automating tedious details of development;b) producing code of higher quality or of highercertification than hand-development;c) reducing the level of expertise required forpractitioners to construct software.The properties of systems amenable to economic application of synthesis fall into two categories: the simple and the complex. With simple systems, synthesis relieves programmers of tedious and repetitive programming tasks. Just as compilers relieved programmers of the task of allocating and managing storage, synthesis systems can alleviate the cumbersome tasks of managing tedious tasks. One of the advantages of Amphion’s synthesis system is that a simple algorithm is implemented in a syntactically correct form. One approach to using Amphion is to create a program that solves part of a problem, then hand-modify the resulting code to complete the system. The tedious work of variable declarations, type checking, and matching parameters and arguments when combining components is handled by Amphion. The less-easily specified parts of the system (such as “display the date and time in a readable font out of the way of interesting parts of the scene”) are coded by hand.Humans have difficulty formulating plans in complex systems where it is necessary to account for a large number of interactions (Dorner 1996). It may be theoretically possible to predict the effect of some action on a system, but the large number of competing issues prevents humans from choosing an appropriate action. In software development, these situations may arise from the interactions of components. If the interactions can be specified formally, it may be possible for synthesis systems to better manage the details of many interactions and constraints.While correctness is not ensured solely by the constructionof correctness proofs, such proofs can go a long way in convincing us that the software will behave as intended. Proving properties about arbitrary programs is difficult. It may be easier to prove properties are hold if we control the construction of the system rather than take arbitrary programs and attempt to prove properties (Fischer 2001).ConclusionIn order to reduce the cost of building synthesis systems, the following must be achieved.• We must be able to reuse knowledge and theories.• We must be able to reuse synthesis tools and techniques.• We must have a workforce familiar with techniques and their application.Although several systems under development have attempted to address the first two issues, it is still difficult to port a knowledge base from one application to another. Many interesting and useful techniques have been developed, but incorporation of one technique into a different system is very difficult. Just as component libraries have facilitated the construction of object-oriented systems, we must construct synthesis components that can be matched and tailored to developing systems.Finally, few computer science and software engineering professionals are trained to use formal techniques. The Software Engineering Body of Knowledge (SWEBOK 2001) composed by the IEEE does not have a chapter on formal methods. Most software engineering textbooks (see for example (Pfleeger 2001, Pressman 2000, Sommerville 1999)) make only passing mention of formal methods. Few software engineers are aware of the utility of synthesis techniques.ReferencesDorner, D., 1996. The Logic of Failure, Cambridge, Mass.: Perseus Press.Fischer, B., 2001. NASA Ames Research Center, personal communication.Flener, P., 1995, Logic Program Synthesis from Incomplete Information, Norwell, Mass.: Klewer Academic Publishers.Manna, Z., and Waldinger, R., 1980. A Deductive Approach to Program Synthesis, ACM Transactions on Programming Languages and Systems, 2(1), 90-121. Pfleeger, S., 2001. Software Engineering Theory and Practice, Upper Saddle River, N.J.: Prentice-Hall. Pressman, R., 2000. Software Engineering: A Practitioner’s Approach,4th Edition, Boston, Mass.: McGraw Hill.Roach, S., Lowry, M., and Pressburger, T., 1995. Animating Observation Geometries with Amphion. NASA Information Systems Newsletter, 3(35) 35-38.Roach, S., and Van Baalen, J., 1996. Automatic Program Synthesis in Amphion, a Simulation Package for Evaluating Space Probe Missions. In Proceedings of the Wyoming Space Grant Symposium, University of Wyoming.Roach, S., Van Baalen, J., and Lowry, M., 1997. Meta-Amphion: Scaling up High Assurance Deductive Program Synthesis. In Proceedings of the IEEE High Integrity Software Symposium, 81-93. Albuquerque, New Mexico. Roach, S., 1997. TOPS: Theory Operationalization for Program Synthesis, PhD diss., Dept. of Computer Science, University of Wyoming.Smith, D., 1991. KIDS: A Knowledge-Based Software Development System. In Automating Software Design, M. Lowry and R. McCartney (eds.), 483-514. MIT Press. Sommerville, I., Software Engineering, 5th Edition, Reading, Mass.: Addison-Wesley.Srinivas, Y., and McDonald, J., 1996. The Architecture of Specware, a Formal Software Development System, Technical Report, KES.U.96.7, Kestrel Institute, Palo Alto, Calif.Stickel, M., Waldinger, R., Lowry, M., Pressburger, T., and Underwood, I., 1994. Deductive Composition of Astronomical Software from Subroutine Libraries. In Proceedings of the 12th Conference on Automated Deduction. Nancy, France.SWEBOK 2001. The Software Engineering Body of Knowledge, Ironman Version.Van Baalen, J, and Roach, S., 1998. Using Decision Procedures to Build Domain-Specific Deductive Synthesis Systems. In Proceedings of LOPSTR'98 Eighth International Workshop on Logic Program Synthesis and Transformation. M anchester, UK.。

具有界面热阻的接触传热耦合问题的数值模拟_张洪武

具有界面热阻的接触传热耦合问题的数值模拟_张洪武

具有界面热阻的接触传热耦合问题的数值模拟NUMERICAL SIMULATION FOR HEAT TRANSFER AND CONTACTPR OBLEMS WITH A THERMAL -RES ISTANT CONSTITUTIVE MODEL张洪武 廖爱华 张 昭 陈金涛(大连理工大学工业装备结构分析国家重点实验室、工程力学系,大连116024)ZHANG HongWu LIAO AiHua ZHANG Zhao CH EN JinTao (State Key Laboratory for Structural A nalysis of Industrial Equipment ,De partment of Enginee ring M echanics ,Dalian University of Technology ,Dalian 116024,China )摘要 发展了基于界面热阻本构模型的热接触耦合问题有限元分析的新算法。

对接触边界的热交换分析采用压力相关的传热本构模型,为考虑力学—传热之间的耦合特性,建立两类变分方程,一类是热力学变分泛函,其考虑接触区域对结构热传导的影响。

另一类是热弹性接触分析的参数变分原理,可以方便地对接触问题进行求解。

文中给出有限元分析的离散公式,并进一步给出进行两类问题耦合分析的迭代算法,其中接触分析的惩罚因子是可以消除的。

数值结果在验证文中算法的同时证实了耦合分析的重要性。

关键词 传热 接触分析 热阻 有限元法中图分类号 O344.3 O242.2 O343.3A bstract A new algorithm for the heat transfer analysis of the contact problem is developed in terms of a thermal resistant consti -tutive model ,which was established and generally called contact pressure dependent law in the analysis of thermomechanical contact problems .Two kinds of variational principles for the two different problems ,i .e .heat trans fer and contact analysis ,are respectively put forward for s olving of the coupled problems .Based on the proposed variational principles ,the finite element discretized formulations ,where the penalty factor in contact equations can be cancelled ,are derived ,and an iteration algorith m is then establis hed for the numeri -cal solution of the problems .Numerical examples are computed and the results demonstrate the validity of model and algorithm presented as well as the importance of the thermal -resistant contact anal y s is in engineering .Key words Heat transfer ;Co ntact analysis ;Therm al contact resistance ;Finite element metho dCorr es ponding autho r :ZHA NG H ongWu ,E -mail :zhanghw @dlut .edu .cn ,Tel :+86-411-4706249,Fax :+86-411-4708769The project supported by the National Natural Sciences Foundation of China (No .10225212,10302007and No .50178016),and the National Project on “973”Basic Research and Develop ment of China (No .1999032805).Manuscript received 20030930,in revised form 20031208.1 引言热接触问题在众多的高新技术当中存在,如电子器件的冷却与加热和高效绝热结构的安置等。

国际工程因所在国法律改变引起的索赔案例分析--以巴布亚新几内亚高地Mend..

国际工程因所在国法律改变引起的索赔案例分析--以巴布亚新几内亚高地Mend..

Sichuan Building MaterialsVol.41,No.2April ,2015第41卷第2期2015年4月国际工程因所在国法律改变引起的索赔案例分析以巴布亚新几内亚高地Mendi 公路为例刘长有,刘㊀平(中国海外工程有限责任公司,北京㊀100048)作者简介:刘长有(1982-),男,河北承德人,硕士,工程师,研究方向:公路施工与管理;刘平(1981-),女,河北沧州人,硕士,工程师,研究方向:公路施工技术㊂㊀㊀摘㊀要:本文以巴布亚新几内亚高地Mendi 公路为研究对象,运用FIDIC 对变更与调整条款,探讨解决因法律改变引起的索赔的方法,以期维护承包商的合法权益,进而对国际工程施工企业有所帮助㊂㊀㊀关键词:FIDIC ;法律改变;国际工程㊀㊀中图分类号:F284/TU723.3文献标志码:A文章编号:1672-4011(2015)02-0273-02DOI :10.3969/j.issn.1672-4011.2015.02.132Case Analysis of Overseas Engineering ClaimCaused by the State Legal Alterations Mendi Highway Project in Southern Highlands Province ,Papua New GuineaLIU Changyou ,LIU Ping(China Overseas Engineering Group Co.,Ltd ,Beijing 100048,China )Abstract :this article takes Mendi Highway Project in Southern Highlands Province,Papua New Guinea as the study object,researches on the ways of solving claims caused by legal alterations through Variations and Adjustments clause of FIDIC,to safeguard the lawful rights and interests of contrac-tors,and benefit the construction enterprises of overseas engi-neering.Key words :fidic;legal alterations;overseas engineering0㊀前㊀言国际工程承包实施过程中,由于项目工程周期一般较长,极易存在由于项目所在国法律变化给项目成本和工期带来的风险㊂这些新的㊁修正的法律㊁法令和新出台的政策,承包商在合同签订前是无法预见到[1]㊂那么如何应对由于法律㊁法令变化所带来的风险,也是专家㊁学者和施工企业关注的焦点㊂1㊀项目背景Mendi 公路项目是某海外公司在巴布亚新几内亚承揽的最大公路项目,项目合同工期30个月,全长49.6km,沿线道路曲折,线路两侧植被茂密㊂项目位于巴新南高地省,雨季和旱季已不明显,全年多雨且雨量较大,历史最大日降雨量在300mm 左右㊂全线软基点多,业主又不想有过多变更,在现有的预算内施工,由于线路较长,施工难度较大,因此全线施工过程中,项目组科学制定了施工组织程序,增加了工作面,增加了人员投入,人员成本压力较大㊂2014年,巴新国家政府对现行工资法律进行调整,加剧了项目组的成本压力,项目组经过分析,采用FIDIC 中变更与调整条款同监理和业主进行了协商,得到了监理和业主的初步认可㊂2㊀因法律改变的调整承包商编制投标报价的依据之一就是工程所在国的各项法律[2],如果这些法律发生变动,其工程费用当然会受到影响㊂FIDIC 中13.7款中明确写到 于基准日期后工程所在国法律有所改变或对此类法律的司法或政府解释有改变,影响承包商履行合同义务的,合同价格应考虑上述改变导致的任何费用增减进行调整 [3-4]㊂施工合同签定于2011年9月,但值得注意的是,FIDIC 这个条款并没有给出具体的计算方式,给合同索赔过程中监理和承包商之间留下了争议隐患㊂本文仅以法律变化中国家最低工资标准为例,来探讨对承包商的影响,并提出索赔的模式㊂3㊀巴新法律对当地最低工资进行了调整2014年,巴新政府通过决议,将全国最低工资标准从原来的2.29基纳调整到3.2基纳,增幅达39.7%㊂这个决定,对全体国民无疑是福音,但却给企业带来了成本压力,特别是施工企业㊂以该项目为例,目前该项目每个月人员工资总共200万人民币,由于标准调整,调整后每个月额外增加支付工人的工资㊂4㊀最低工资标准变化引起承包商索赔模式由于所在国法律变化给承包商费用造成影响,根据这些影响程度对价格甚至工期做出调整是公平合理的,FIDIC 中虽然明确指出由于所在国法律变更,导致承包商费用增加,业主方要承担责任,但是,并没有给出具体的计算方法㊂本文依据FIDIC13.7条款,结合巴新国家和项目组,探讨出一个较为公平合理的计算方法和计算模式,具体如下:N:假定合同总额为NM:平均每个月合同额㊀N /30=MA:调整前一个双周所有工人工资总和=A B:调整后一个双周所有工人工资总和=B C:调整前后月份工资平均值(A +B)/2=C D:平均增加工资额度C -A =DE:平均每个月工资增加比率E =D /M也就是说,由于最低工资标准变化引起承包商索赔额为:每个月计量总额ˑE,即为索赔金额㊂表1最低工资标准变化引起承包商索赔模式案例分析1合同总额N2平均每个月合同额M 3调整前一个双周所有工人工资总A 4调整后一个双周所有工人工资总和B 5调整前后月份工资平均值C 6平均增加工资额度D7平均每个月工资增加比率E 8最低工资标准变化引起承包商索赔每个月计量总额ˑE㊃372㊃Sichuan Building MaterialsVol.41,No.2April ,2015第41卷第2期2015年4月通过计算该项目平均每个月工资增加比率=1.14%,以当月产值1200万人民币计算,当月索赔金额1200ˑ1.14%=16.8万人民币㊂承包商充分搜集工资发放证据,并积极同业主监理沟通,得到了他们的初步理解,有望尽快解决㊂5㊀结㊀论本文以巴布亚新几内亚高地Mendi 公路为研究对象,运用FIDIC 对变更与调整条款,探讨解决因法律改变引起的索赔的方法,以期维护承包商的合法权益,进而在巴布亚新几内亚的中资施工企业有所帮助,主要有以下几个方面的结论:1)承包商,特别是国际工程承包商必需深入了解所在国国情,对国家法律㊁合同条款要深入了解;2)充分搜集证据,用数据说话,严格按照合同索赔程序做事;3)充分同业主㊁监理沟通,建立良好的互信关系,争取对方的理解和支持㊂[ID:001778]参考文献:[1]㊀夏志宏.国际工程承包风险与规避[M].北京:中国建筑工业出版社,2004.[2]㊀张水波.FIDIC 新版合同条件导读与解析[M].北京:中国建筑工业出版社,2003.[3]㊀Conditons of contract for Consturction[Z].FIDIC,1999.[4]㊀中国工程咨询协会.FIDIC 施工合同条件[M].北京:机械工业出版社,2002.ʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏʏ(上接第268页)为了避免目前这种状况,根据江苏省城乡规划设计研究院刘一雷对结构设计中常用图表的补充意见,结合笔者在株洲市炎帝广场商业文化街等工程建设中的体会,现就如何合理使用ϕ6.5规格的Ⅰ级钢筋,作以下三点建议:1)钢筋混凝土结构的一些梁㊁板㊁柱配筋图例中的各类附加钢筋,凡标注ϕ6@200或ȡϕ6@200(不小于ϕ6@200)的钢筋,均可用ϕ6.5@225或ȡϕ6.5@225(不小于ϕ6.5@225)代换㊂2)GB50011-2010‘工业与民用建筑抗震设计规范“条文中 沿墙高每50cm 配置2ϕ6钢筋连接 ,可进行如下代换: 沿墙高每60cm 配置2ϕ6.5钢筋连接㊂3)每米板宽各种间距下的钢筋截面积(cm 2)参考表如下(可供钢筋代用时选择)㊂表1每米板宽各种间距下的钢筋截面积(cm 2)参考表mm 直径d 钢筋间距707580859010012012514015016018020022022525028030032064.043.773.543.333.142.832.362.262.021.891.771.571.411.291.261.131.010.940.886.54.744.424.153.913.693.322.772.652.372.222.081.841.651.511.481.331.191.101.036/85.615.244.914.624.373.933.273.142.812.622.462.181.961.791.751.571.41.311.236.5/85.975.575.224.924.644.183.483.342.982.792.612.322.081.901.861.711.511.391.305㊀推广新技术,大力采用中强度冷轧带肋钢筋5.1㊀对钢筋冷加工处理提高屈服强度,节约钢材将钢材在常温下进行冷拉㊁冷拔或冷轧,使之产生塑性变形,从而提高屈服强度,这个过程称为 冷加工强化处理 [5]㊂工地或预制构件厂常利用这一原理对钢筋或低碳钢盘条按一定规范进行冷拉或冷拔加工,以提高屈服强度㊁节约钢材㊂5.2㊀合理采用中强度冷轧带肋钢筋冷轧带肋钢筋属冶金部 八五 期间发展的120个钢材品种之一,已通过国家标准审查,它具有与混凝土粘结锚固能力强㊁施工工序简单㊁节省钢材等优点[4]㊂据四川省建筑科学研究院的研究结果表明:①若预应力C25混凝土构件采用冷轧带肋钢筋,其钢筋强度比冷拔丝高15%~23%,同时可节约钢材15%左右,节约水泥40~50kg /m 3;②在非预应力构件㊁现浇楼面㊁路面㊁机场跑道等施工中,冷轧带肋钢筋代替Ⅰ级钢筋使用可节约钢材30%~40%㊂5.3㊀中强度冷轧带肋钢筋在工程中的实际应用在非预应力构件㊁现浇楼面㊁路面等钢筋混凝土结构中,冷轧带肋钢筋的代换原则为:将直径规格为5㊁6㊁8㊁10mm 的冷轧带肋钢筋以等同延长米方式,分别代替规格为ϕ6.5㊁ϕ8㊁ϕ10㊁ϕ12的Ⅰ级钢筋(钢筋间距两者保持不变),且省略两端弯钩的制作㊂株洲市汽贸大厦工程共9层,底下2层为框架结构,上面7层为砖混结构㊂经建设单位㊁监理单位㊁施工单位和设计单位有关专家共同进行技术核定,将原设计中楼面板的Ⅰ级钢筋用冷轧带肋钢筋代换;另外,新疆生产建设兵团农四师七十六团农用飞机场的跑道施工也是通过技术核定单的形式,按上述方法代换使用;总建筑面积25万多m 2的新疆叶城县金果小区商住楼工程的楼面板钢筋也是按此方法设计施工的㊂通过若干以上类似工程实践证明:合理采用中强度冷轧带肋钢筋,不仅结构安全可靠,而且经济效益和社会效益十分可观㊂笔者曾先后参与了上述工程的施工管理工作,并随同施工代表就代换后的工程质量和使用功能进行多次回访调查,据业主方反映,多年无任何质量问题,满足正常使用功能㊂6㊀结㊀语总之,钢材是建筑工程的三大主材之一,在工程中一定要强化管理,合理利用钢材,注意点滴节约,积少成多,为施工企业创造良好的施工效益,从而更好地支援其他工程建设㊂[ID:001844]参考文献:[1]㊀上官子昌.钢筋工程施工技术与禁忌[M].北京:机械工业出版社,2013.[2]㊀肖玉峰.钢筋下料计算与施工[M].北京:机械工业出版社,2013.[3]㊀吴成材.钢筋连接技术手册[M].北京:中国建筑工业出版社,2014.[4]㊀俞宾辉.建筑钢筋工程施工手册(新规范)[M].济南:山东科学技术出版社,2004.[5]㊀吴志红.建筑施工技术[M].南京:东南大学出版社,2010.㊃472㊃国际工程因所在国法律改变引起的索赔案例分析--以巴布亚新几内亚高地Mendi公路为例作者:刘长有, 刘平, LIU Changyou, LIU Ping作者单位:中国海外工程有限责任公司,北京,100048刊名:四川建材英文刊名:Sichuan Building Materials年,卷(期):2015(2)引用本文格式:刘长有.刘平.LIU Changyou.LIU Ping国际工程因所在国法律改变引起的索赔案例分析--以巴布亚新几内亚高地Mendi公路为例[期刊论文]-四川建材 2015(2)。

基于RFID技术的货物追溯系统构建

基于RFID技术的货物追溯系统构建

2019年18期技术创新科技创新与应用Technology Innovation and Application基于RFID 技术的货物追溯系统构建*喻雪春,杜其光,穆王云,杨丽红(天津农学院经济管理学院,天津300384)1概述近年来,RFID (Radio Frequency Identification )技术取得了巨大的进步,逐渐融入到人类社会当中,应用的领域也越来越广泛,例如:二代身份证、食堂卡、智能停车场、高速公路ETC 等。

RFID 是一种无线通信技术,无需识别系统与特定目标之间建立机械或者光学接触就可以通过无线电讯号识别特定目标并读写相关数据,故RFID 的读取设备可以同时识别多个RFID 标签,实现快速扫描。

又因为RFID 标签具有数据记忆容量大、抗污能力强、可以重复使用、安全性高的特征,所以该技术适合应用于物流活动当中,优化整个物流供应链,提高物流效率。

RFID 技术应用于物流活动中,其独特的穿透性和无屏障阅读使得RFID 技术相比于传统的条形码可视扫描技术来说,效率更高,不仅在单位时间内识别的数量多,而且准确率更高,实现物流成本的节约;同时,RFID 标签抗污、耐久能力强的特点,可以保证标签使用后可以实现多次回收利用,不仅降低了物流成本,还能够减少对环境的破坏;RFID 标签的样式多样,能够适应物流环节中不同货物的需要;RFID 技术在现代物流过程中应用最大的优势是其安全性,RFID 所承载的是电子式信息,其数据内容是由密码保护,不能轻易的被修改,从而能够有效保护客户的隐私,防止顾客信息的泄漏。

“双十一”、“双十二”、“双旦节”等购物狂欢节的出现,对物流服务提出了更高的要求,不仅需要物流运送速度更快捷、安全,还要保证顾客能够对所购买的货物进行追溯,提高顾客在物流环节中的参与度,此外,需要能够便捷处理与客户出现的纷争,及时的进行退货和换货服务。

本研究将基于RFID 技术来搭建货物追溯系统,旨在降低企业的运营成本,提高顾客的满意度。

一种安装于框架上实现盖体开关的装置及汽车行李箱盖[发明专利]

一种安装于框架上实现盖体开关的装置及汽车行李箱盖[发明专利]

专利名称:一种安装于框架上实现盖体开关的装置及汽车行李箱盖
专利类型:发明专利
发明人:米哈尔·瓦拉什谢克,扬·扎维尔,扬·维赫,扬·拜里刚,特蕾西亚·卡什巴尔科娃,帕沃·斯坦因帕维尔,托马什·博
尔达
申请号:CN201480016441.9
申请日:20140108
公开号:CN105143721A
公开日:
20151209
专利内容由知识产权出版社提供
摘要:本发明涉及一种安装于框架上实现盖体开关的装置,特别是汽车行李箱盖的装置,包括一根处于盖和框架之间的支柱,具有附接至该盖的一个第一连接部分和附接至该框架的一个第二连接部分,这两个连接部分都可以通过机械和/或气动和/或液压制动器受约束地相对移动来实现支柱长度变化,其中该支柱装有一个分离装置,用于使得该支柱的相对移动连接部分的第一连接部分和第二连接部分的受约束的相对运动不再受限。

申请人:布拉格捷克理工大学,布拉诺股份公司
地址:捷克共和国布拉格
国籍:CZ
代理机构:北京东正专利代理事务所(普通合伙)
代理人:刘瑜冬
更多信息请下载全文后查看。

SYSTEMS AND METHOD FOR BOOSTING OUTPUT OF AN ALTE

专利名称:SYSTEMS AND METHOD FOR BOOSTING OUTPUT OF AN ALTERNATOR发明人:O'GORMAN, Patrick A.,,STEPHENS, Dennis L.申请号:US2005029627申请日:20050818公开号:WO06/023772P1公开日:20060302专利内容由知识产权出版社提供摘要:Disclosed herein are two techniques, neutral point switching and field voltage boost, that will increase the output of today's 12 volt automotive electrical systems in vehicle idle conditions solely by the addition of circuitry. Neutral point switching enables the flow of a third harmonic current, which does not normally flow at low speeds, but only at high speed. Boosting the field voltages can be obtained by integrating a field voltage boost circuit and voltage regulator to increase the field voltage, and consequently the field current, above the level obtained from the battery. Furthermore, the transient response of the alternator to a change in load is improved by temporarily increasing the field voltage above the level needed to sustain the load. These two techniques are compatible, and thus may be implemented together, or may be implemented independently. No changes to a standard alternator are required to accommodate the proposed additional circuitry.申请人:O'GORMAN, Patrick A.,,STEPHENS, Dennis L.地址:US,US,US国籍:US,US,US代理机构:HUGHES, Terri, S.更多信息请下载全文后查看。

METHOD FOR PRODUCING A STEEL COMPONENT PROVIDED WI

二年级伊索寓言读书心得(精选5篇)二年级伊索寓言读书心得(篇1)今天上语文课时,老师给我们讲了《伊索寓言》,《伊索寓言》有三个小寓言故事。

第一个小故事的名字叫《狐狸和葡萄》。

它主要讲的是:狐狸想吃葡萄架上的葡萄,可它费了好大劲都无法够到葡萄。

所以,狐狸就说:“这些葡萄肯地是酸的,不好吃!”说完,转身就走了。

《狐狸和葡萄》告诉我们:有些人无能为力,做不成事,却偏偏说时机还没有成熟。

狐狸根本没尝到葡萄的味道,就说是酸的,这分明就是在为自己找借口。

第二个小故事是我们大家非常熟悉的《牧童和狼》。

它主要写的是:有一个牧童在村边放羊,他好几次都大叫:“狼来了! 狼来了!”欺骗村民们。

当狼真的来吃羊时,牧童再次大叫,没有人来帮助他,没有人相信他了。

《牧童和狼》说明:一贯说谎的人即使说了真话,也没有人会相信。

善良、诚实是中华民族的传统美德村民们的善良和纯朴,被牧童的谎言所欺骗。

第三个故事叫《蝉和狐狸》。

它主要描写的是:狐狸想吃树上鸣叫的蝉,便假装赞美蝉的声音美妙,但聪明的蝉看穿了狐狸的诡计,没有上当。

《蝉和狐狸》教给我们:一个聪明的人,总能从别人的灾难中吸取教训。

我们要做一个聪明的人,不要像《狐狸和乌鸦》中的乌鸦那样不经夸。

寓言,就是带有讽刺或劝诫性的故事。

二年级伊索寓言读书心得(篇2)童年,是梦中的真,是真中的梦,是回忆里那含泪的微笑。

而完整的人生或童年,总是少不了好书的相伴。

银河系中有很多星星,他们在天空中,闪烁着耀眼的光芒。

而那颗拥有着美丽光环而无比闪亮的那颗繁星,就是在寓言界中有高级待遇的伊索为我们呕心沥血,走遍大千世界,经历了这世上所有邪恶、善良的事,编写出了世界文学名著——《伊索寓言》。

读完后,使我受益匪浅,终身难忘。

《伊索寓言》的作者是古希腊的伊索,他是传说中的人物,他写的都是对生活中某种现象的批判、启示和教训。

这本书是由很多寓言故事组成的,巧妙运用借物喻人的修辞手法,在*的最后总是能阐述出一个简单却发人深省的道理。

水文地质勘查技术在岩土工程中的应用探讨

1岩土工程水文地质勘查概述水文地质勘查是通过一系列的实地调查和试验,对地下水文地质条件进行全面、系统的研究和评价的过程,涵盖地下水位、地层结构、水文地质剖面、岩土体特性等多个方面的内容,通过水文地质勘查,工程师可以获取关键的地质和水文数据,为岩土工程提供科学依据。

水文地质勘查的目的是全面了解工程区域的地下水文地质条件,包括地下水位、水质、地层结构、岩土体特性等因素,为岩土工程提供基础数据;通过对地下水文地质条件的调查,能够预测和识别潜在的地质灾害风险,如滑坡、泥石流等,从而采取相应的防治措施;了解地下水文地质条件,可以为基础工程设计提供重要信息,水文地质数据有助于确定基础结构类型、尺寸和位置,从而优化设计,提高工程的稳定性和经济性。

地下水文测定通过井孔、钻孔等手段,获取地下水文数据,包括水位、水质等信息,是水文地质勘查的基础步骤,为后续研究提供基础数据;采用地质调查、岩芯取样等手段,详细研究地下土层的结构、层序、岩性等特征,地质勘查能够确定地下岩土体的力学性质和工程特性;通过岩土特性测试包括抗压强度测试、渗透性测试等,获取岩土体的力学性质和水文特性,测试数据是基础工程设计和施工的关键参数[1]。

2水文地质勘查技术类型分析2.1钻探技术旋挖钻探是一种常见的水文地质勘查技术,其主要特点是通过旋转钻头进行地层穿透,获取地下岩土样品以及水文地质数据,该技术适用于岩性地层和一些坚硬地层的勘查,能够深入了解地下水文地质情况。

钻芯钻探是通过使用取心钻头,在地下连续取得岩芯样品,样品对于岩层的物理性质和水文地质特征有着重要的指示作用,钻芯钻探常用于对岩性地层和含水层的深入研究,为水资源的勘查和开发提供详细数据。

2.2地球物理勘查技术电法勘查是一种利用地下电阻率差异来推断地下岩土层结构和水文地质条件的技术,通过测量地下电阻率分布,可以识别含水层和非含水层的位置,为水文地质勘查提供定性和定量的信息。

雷达技术在水文地质勘查中的应用越来越广泛。

a legal case regarding business-method patents -回复

a legal case regarding business-methodpatents -回复近年来,关于商业方法专利方面的法律案例引起了广泛关注。

商业方法专利是指一种特定的商业模式、商业程序或商业想法,可以享有独立的专利保护。

在国际上,商业方法专利的审查具有一定的争议性,因为不同国家对商业方法专利的立法和判例法规定存在较大的差异。

本文将探讨一起关于商业方法专利的法律案例,以更好地理解商业方法专利的现状和影响。

这个法律案例发生在美国,当事人是一家小型企业和一家市场领导者的大型公司。

小型企业拥有一项商业方法专利,它们声称该专利被大型公司的业务模式和程序所侵犯。

这起案件在法庭上引起了高度关注,因为它涉及商业方法专利的有效性和侵权问题。

在审理过程中,法庭首先要评估商业方法专利的有效性。

商业方法专利要求当事人提供充分的证据证明其创造性和实用性。

专利持有人需要证明其商业方法的独特性,即该方法在同行业中没有类似的抄袭或使用。

此外,专利的审查还必须考虑到所申请的专利是否属于不可被专利保护的商业抽象思想。

在本案中,小型企业对商业方法专利的有效性提出了强有力的证据。

他们提供了详细的商业方法描述和与其生产环境相关的技术背景。

此外,小型企业还聘请了专业领域的证人,来证明该商业方法的独特性和实用性。

这些证人陈述说明该商业方法与其他程序的差异,并且能够有效地解决行业中的特定问题。

然而,大型公司对商业方法专利的有效性提出了异议。

他们声称该商业方法专利是一种商业抽象思想,无法被专利保护。

大型公司的辩护律师提交了一个详细的陈述,解释了商业方法专利与其他商业模式之间的相似性。

他们还引用了一些相关案例,这些案例根据专利局和法院的先前判例,否认了类似的商业方法专利的有效性。

在评估商业方法专利的有效性后,法庭进一步审查了大型公司是否侵犯了商业方法专利。

为了被认定侵权,小型企业需要证明大型公司在其业务中实际使用了商业方法的主要要素。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
∗ ∗
(1)
where p, p are programs, → means ‘rewrites to,’ and O is the optimizer. We target de-optimizing rewrites that capture common patterns of software engineering abstraction, for example introducing proxies and temporary objects, so as to construct compilers that reliably reduce the ‘abstraction penalty’ associated with high-level languages. Compilers with the guaranteed optimization property produce programs that are ‘optimal’ with respect to certain criteria, such as program size or static operation counts. If J is some criterion function on programs (e.g., textual size), and the optimizer never makes programs worse with respect to J , then the guaranteed optimization property implies: J (Op) ≤ min J (p )
Veldhuizen
Fig. 1. Sketch of the guaranteed optimization property. Each point represents a program and thin arrows indicate de-optimizing rewrites. The optimizer guarantees that it will undo any sequence of de-optimizing rewrites (bold arrows) in a single step (dashed arrow). Each circle represents an equivalence class of programs under ∗ ↔. Every program in an equivalence class is optimized to the same program.
can usefully be mechanized. This has allowed us to scale up the guaranteed optimization technique from theory to practice. We faced a decision of whether or not to use an existing general-purpose theorem prover. Using an existing tool would give more assurance in correctness. However, we decided that maintaining a description of the compiler for the proof tool together with the proof script as the compiler was modified would be too onerous. We had in mind a fully automated prover that would simply answer ‘yes, the property holds’ or ‘no, the property does not hold because ...’ when the compiler was modified. For this reason we have implemented a specialized theorem prover that outputs human-readable proofs; in the future we plan to output proofs in mechanically-checkable form for input to another prover. 1.2 Related work and contributions
1
Introduction
Guaranteed optimization is a technique for building compilers that have proven guarantees of what optimizations they perform [14, 15]. One gives a system of rewrite rules that ‘de-optimize’ programs, for example: x → if true then x else y x → car(cons(x, y )) The guaranteed optimization theorem states that any amount of de-optimization can be applied to a source program via such rules, and the compiler is guar1
Email: . Fax: +46 31 165655
c 2005 Published by Elsevier Science B. V.
Veldhuizen
anteed to undo it all in a single pass: If p → p then Op = Op .
p ∈[p] ∗
(2)

where [p] = {p | p ↔ p } is the equivalence class of program p under ↔ [14, §3.9]. That is, after optimization the value of the criterion function is at most its value for the optimal program in the equivalence class. Figure 1 illustrates. Finding programs optimal with respect to an approximate program ∗ equivalence such as ↔ is the best one can do, exact program equivalence being undecidable. The use of de-optimizing rewrite rules is a little odd, but it leads to a practical proof technique. The obvious solution of reversing the direction of the rewrites fails, since such rules when inverted have side-conditions that require a global analysis to satisfy; this is, after all, why we do program analysis. The use of de-optimizing rewrites gives fairly intuitive guarantees of what optimizations the compiler will perform. There is also a nice theory property: the de-optimizing rewrites give an inductive definition of a program equivalence for which the compiler is a complete decision procedure. 1.1 The automated verification connection.
Automating Proofs of Guaranteed Optimization
Todd L. Veldhuizen 1
Department of Computer Science Indiana University Bloomington, Indiana, USA
Abstract Guaranteed optimization is a technique for building compilers that have proven guarantees of what optimizations they perform. Such compilers optimize predictably and thoroughly, finding optimal forms of programs with respect to an approximate program equivalence. Guaranteed optimization is a “design-by-proof” technique: in attempting to verify a compiler has a certain property one uncovers failures in its design, and when the proof finally succeeds the compiler has the desired property. The proof technique is somewhat cumbersome, so maintaining the proof as the compiler evolves can be tedious. We describe a specialized theorem prover for guaranteed optimization that has been successfully used to verify a ial compiler having 8 simultaneous program analyses. Key words: Program analysis, optimizing compilers, compiler verification, guaranteed optimization.
相关文档
最新文档