毕业设计方案英文翻译资料中文

合集下载

毕业设计中英文翻译【范本模板】

毕业设计中英文翻译【范本模板】

英文The road (highway)The road is one kind of linear construction used for travel。

It is made of the roadbed,the road surface, the bridge, the culvert and the tunnel. In addition, it also has the crossing of lines, the protective project and the traffic engineering and the route facility。

The roadbed is the base of road surface, road shoulder,side slope, side ditch foundations. It is stone material structure, which is designed according to route's plane position .The roadbed, as the base of travel, must guarantee that it has the enough intensity and the stability that can prevent the water and other natural disaster from corroding.The road surface is the surface of road. It is single or complex structure built with mixture。

The road surface require being smooth,having enough intensity,good stability and anti—slippery function. The quality of road surface directly affects the safe, comfort and the traffic。

毕业设计外文翻译译文

毕业设计外文翻译译文

1 工程概论1.1 工程专业1.2 工业和技术1.3 现代制造业工程专业1 工程行业是历史上最古老的行业之一。

如果没有在广阔工程领域中应用的那些技术,我们现在的文明绝不会前进。

第一位把岩石凿削成箭和矛的工具匠是现代机械工程师的鼻祖。

那些发现地球上的金属并找到冶炼和使用金属的方法的工匠们是采矿和冶金工程师的先祖。

那些发明了灌溉系统并建造了远古世纪非凡的建筑物的技师是他们那个时代的土木工程师。

2 工程一般被定义为理论科学的实际应用,例如物理和数学。

许多早期的工程设计分支不是基于科学而是经验信息,这些经验信息取决于观察和经历,而不是理论知识。

这是一个倾斜面实际应用的例子,虽然这个概念没有被确切的理解,但是它可以被量化或者数字化的表达出来。

3 从16、17世纪当代初期,量化就已经成为科学知识大爆炸的首要原因之一。

另外一个重要因素是实验法验证理论的发展。

量化包含了把来源于实验的数据和信息转变成确切的数学术语。

这更加强调了数学是现代工程学的语言。

4 从19世纪开始,它的结果的实际而科学的应用已经逐步上升。

机械工程师现在有精确的能力去计算来源于许多不同机构之间错综复杂的相互作用的机械优势。

他拥有能一起工作的既新型又强硬的材料和巨大的新能源。

工业革命开始于使用水和蒸汽一起工作。

从此使用电、汽油和其他能源作动力的机器变得如此广泛以至于它们承担了世界上很大比例的工作。

5 科学知识迅速膨胀的结果之一就是科学和工程专业的数量的增加。

到19世纪末不仅机械、土木、矿业、冶金工程被建立而且更新的化学和电气工程专业出现了。

这种膨胀现象一直持续到现在。

我们现在拥有了核能、石油、航天航空空间以及电气工程等。

每种工程领域之内都有细分。

6 例如,土木工程自身领域之内有如下细分:涉及永久性结构的建筑工程、涉及水或其他液体流动与控制系统的水利工程、涉及供水、净化、排水系统的研究的环境工程。

机械工程主要的细分是工业工程,它涉及的是错综复杂的机械系统,这些系统是工业上的,而非单独的机器。

本科毕业设计的英文资料与中文翻译

本科毕业设计的英文资料与中文翻译

英文资料与中文翻译IEEE 802.11 MEDIUM ACCESS CONTROLThe IEEE 802.11 MAC layer covers three functional areas:reliable data delivery, medium access control, and security. This section covers the first two topics.Reliable Data DeliveryAs with any wireless network, a wireless LAN using the IEEE 802.11 physical and MAC layers is subject to considerable unreliability. Noise, interference, and other propagation effects result in the loss of a significant number of frames. Even with error-correction codes, a number of MAC frames may not successfully be received. This situation can be dealt with by reliability mechanisms at a higher layer. such as TCP. However, timers used for retransmission at higher layers are typically on the order of seconds. It is therefore more efficient to deal with errors at the MAC level. For this purpose, IEEE 802.11 includes a frame exchange protocol. When a station receives a data frame from another station. It returns an acknowledgment (ACK) frame to the source station. This exchange is treated as an atomic unit, not to be interrupted by a transmission from any other station. If the source does not receive an ACK within a short period of time, either because its data frame was damaged or because the returning ACK was damaged, the source retransmits the frame.Thus, the basic data transfer mechanism in IEEE802.11 involves an exchange of two frames. To further enhance reliability, a four-frame exchange may be used. In this scheme, a source first issues a request to send (RTS) frame to the destination. The destination then responds with a clear to send (CTS). After receiving the CTS, the source transmits the data frame, and the destination responds with an ACK. The RTS alerts all stations that are within reception range of the source that an exchange is under way; these stations refrain from transmission in order to avoid a collision between two frames transmitted at the same time. Similarly, the CTS alerts all stations that are within reception range of the destination that an exchange is under way. The RTS/CTS portion of the exchange is a required function of the MAC but may be disabled.Medium Access ControlThe 802.11 working group considered two types of proposals for a MAC algorithm: distributed access protocols, which, like Ethernet, distribute the decision to transmit over all the nodes using a carrier-sense mechanism; and centralized access protocols, which involve regulation of transmission by a centralized decision maker. A distributed access protocol makes sense for an ad hoc network of peer workstations (typically an IBSS) and may also be attractive in other wireless LAN configurations that consist primarily of burst traffic. A centralized access protocol is natural for configurations in which a umber of wireless stations are interconnected with each other and some sort of base station that attaches to a backbone wired LAN: it is especially useful if some of the data is time sensitive or high priority.The end result for 802.11 is a MAC algorithm called DFWMAC (distributed foundation wireless MAC) that provides a distributed access control mechanism with an optional centralized control built on top of that. Figure 14.5 illustrates the architecture. The lower sub-layer of the MAC layer is the distributed coordination function (DCF). DCF uses a contention algorithm to provide access to all traffic. Ordinary asynchronous traffic directly uses DCE. The point coordination function (PCF) is a centralized MAC algorithm used to provide contention-free service. PCF is built on top of DCF and exploits features of DCF to assure access for its users. Let us consider these two sub-layers in turn.MAClayerFigure 14.5 IEEE 802.11 Protocol ArchitectureDistributed Coordination FunctionThe DCF sub-layer makes use of a simple CSMA (carrier sense multiple access) algorithm, which functions as follows. If a station has a MAC frame to transmit, it listens to the medium. If the medium is idle, the station may transmit; otherwise the station must wait until the current transmission is complete before transmitting. The DCF does not include a collision detection function (i.e. CSMA/CD) because collision detection is not practical on a wireless network. The dynamic range of the signals on the medium is very large, so that a transmitting station cannot effectively distinguish incoming weak signals from noise and the effects of its own transmission.To ensure the smooth and fair functioning of this algorithm, DCF includes a set of delays that amounts to a priority scheme. Let us start by considering a single delay known as an inter-frame space (IFS). In fact, there are three different IFS values, but the algorithm is best explained by initially ignoring this detail. Using an IFS, the rules for CSMA access are as follows (Figure 14.6):Figure 14.6 IEEE 802.11 Medium Access Control Logic1. A station with a frame to transmit senses the medium. If the medium is idle. It waits to see if the medium remains idle for a time equal to IFS. If so , the station may transmit immediately.2. If the medium is busy (either because the station initially finds the medium busy or because the medium becomes busy during the IFS idle time), the station defers transmission and continues to monitor the medium until the current transmission is over.3. Once the current transmission is over, the station delays another IFS. If the medium remains idle for this period, then the station backs off a random amount of time and again senses the medium. If the medium is still idle, the station may transmit. During the back-off time, if the medium becomes busy, the back-off timer is halted and resumes when the medium becomes idle.4. If the transmission is unsuccessful, which is determined by the absence of an acknowledgement, then it is assumed that a collision has occurred.To ensure that back-off maintains stability, a technique known as binary exponential back-off is used. A station will attempt to transmit repeatedly in the face of repeated collisions, but after each collision, the mean value of the random delay is doubled up to some maximum value. The binary exponential back-off provides a means of handling a heavy load. Repeated failed attempts to transmit result in longer and longer back-off times, which helps to smooth out the load. Without such a back-off, the following situation could occur. Two or more stations attempt to transmit at the same time, causing a collision. These stations then immediately attempt to retransmit, causing a new collision.The preceding scheme is refined for DCF to provide priority-based access by the simple expedient of using three values for IFS:●SIFS (short IFS):The shortest IFS, used for all immediate responseactions,as explained in the following discussion●PIFS (point coordination function IFS):A mid-length IFS, used by thecentralized controller in the PCF scheme when issuing polls●DIFS (distributed coordination function IFS): The longest IFS, used as aminimum delay for asynchronous frames contending for access Figure 14.7a illustrates the use of these time values. Consider first the SIFS.Any station using SIFS to determine transmission opportunity has, in effect, the highest priority, because it will always gain access in preference to a stationwaiting an amount of time equal to PIFS or DIFS. The SIFS is used in the following circumstances:●Acknowledgment (ACK): When a station receives a frame addressed onlyto itself (not multicast or broadcast) it responds with an ACK frame after, waiting on1y for an SIFS gap. This has two desirable effects. First, because collision detection IS not used, the likelihood of collisions is greater than with CSMA/CD, and the MAC-level ACK provides for efficient collision recovery. Second, the SIFS can be used to provide efficient delivery of an LLC protocol data unit (PDU) that requires multiple MAC frames. In this case, the following scenario occurs. A station with a multi-frame LLC PDU to transmit sends out the MAC frames one at a time. Each frame is acknowledged after SIFS by the recipient. When the source receives an ACK, it immediately (after SIFS) sends the next frame in the sequence. The result is that once a station has contended for the channel, it will maintain control of the channel until it has sent all of the fragments of an LLC PDU.●Clear to Send (CTS):A station can ensure that its data frame will getthrough by first issuing a small. Request to Send (RTS) frame. The station to which this frame is addressed should immediately respond with a CTS frame if it is ready to receive. All other stations receive the RTS and defer using the medium.●Poll response: This is explained in the following discussion of PCF.longer than DIFS(a) Basic access methodasynchronous trafficdefers(b) PCF super-frame constructionFigure 14.7 IEEE 802.11 MAC TimingThe next longest IFS interval is the: PIFS. This is used by the centralized controller in issuing polls and takes precedence over normal contention traffic. However, those frames transmitted using SIFS have precedence over a PCF poll.Finally, the DIFS interval is used for all ordinary asynchronous traffic.Point C00rdination Function PCF is an alternative access method implemented on top of the DCE. The operation consists of polling by the centralized polling master (point coordinator). The point coordinator makes use of PIFS when issuing polls. Because PI FS is smaller than DIFS, the point coordinator call seize the medium and lock out all asynchronous traffic while it issues polls and receives responses.As an extreme, consider the following possible scenario. A wireless network is configured so that a number of stations with time, sensitive traffic are controlled by the point coordinator while remaining traffic contends for access using CSMA. The point coordinator could issue polls in a round—robin fashion to all stations configured for polling. When a poll is issued, the polled station may respond using SIFS. If the point coordinator receives a response, it issues another poll using PIFS. If no response is received during the expected turnaround time, the coordinator issues a poll.If the discipline of the preceding paragraph were implemented, the point coordinator would lock out all asynchronous traffic by repeatedly issuing polls. To prevent this, an interval known as the super-frame is defined. During the first part of this interval, the point coordinator issues polls in a round, robin fashion to all stations configured for polling. The point coordinator then idles for the remainder of the super-frame, allowing a contention period for asynchronous access.Figure l4.7 b illustrates the use of the super-frame. At the beginning of a super-frame, the point coordinator may optionally seize control and issues polls for a give period of time. This interval varies because of the variable frame size issued by responding stations. The remainder of the super-frame is available for contention based access. At the end of the super-frame interval, the point coordinator contends for access to the medium using PIFS. If the medium is idle. the point coordinator gains immediate access and a full super-frame period follows. However, the medium may be busy at the end of a super-frame. In this case, the point coordinator must wait until the medium is idle to gain access: this result in a foreshortened super-frame period for the next cycle.OctetsFC=frame control SC=sequence controlD/I=duration/connection ID FCS=frame check sequence(a ) MAC frameBitsDS=distribution systemMD=more data MF=more fragmentsW=wired equivalent privacy RT=retryO=orderPM=power management (b) Frame control filedFigure 14.8 IEEE 802.11 MAC Frame FormatMAC FrameFigure 14.8a shows the 802.11 frame format when no security features are used. This general format is used for all data and control frames, but not all fields are used in all contexts. The fields are as follows:● Frame Control: Indicates the type of frame and provides contr01information, as explained presently.● Duration/Connection ID: If used as a duration field, indicates the time(in-microseconds) the channel will be allocated for successful transmission of a MAC frame. In some control frames, this field contains an association, or connection, identifier.●Addresses: The number and meaning of the 48-bit address fields dependon context. The transmitter address and receiver address are the MAC addresses of stations joined to the BSS that are transmitting and receiving frames over the wireless LAN. The service set ID (SSID) identifies the wireless LAN over which a frame is transmitted. For an IBSS, the SSID isa random number generated at the time the network is formed. For awireless LAN that is part of a larger configuration the SSID identifies the BSS over which the frame is transmitted: specifically, the SSID is the MAC-level address of the AP for this BSS (Figure 14.4). Finally the source address and destination address are the MAC addresses of stations, wireless or otherwise, that are the ultimate source and destination of this frame. The source address may be identical to the transmitter address and the destination address may be identical to the receiver address.●Sequence Control: Contains a 4-bit fragment number subfield used forfragmentation and reassembly, and a l2-bit sequence number used to number frames sent between a given transmitter and receiver.●Frame Body: Contains an MSDU or a fragment of an MSDU. The MSDUis a LLC protocol data unit or MAC control information.●Frame Check Sequence: A 32-bit cyclic redundancy check. The framecontrol filed, shown in Figure 14.8b, consists of the following fields.●Protocol Version: 802.11 version, current version 0.●Type: Identifies the frame as control, management, or data.●Subtype: Further identifies the function of frame. Table 14.4 defines thevalid combinations of type and subtype.●To DS: The MAC coordination sets this bit to 1 in a frame destined to thedistribution system.●From DS: The MAC coordination sets this bit to 1 in a frame leaving thedistribution system.●More Fragments: Set to 1 if more fragments follow this one.●Retry: Set to 1 if this is a retransmission of a previous frame.●Power Management: Set to]if the transmitting station is in a sleep mode.●More Data: Indicates that a station has additional data to send. Each blockof data may be sent as one frame or a group of fragments in multiple frames.●WEP:Set to 1 if the optional wired equivalent protocol is implemented.WEP is used in the exchange of encryption keys for secure data exchange.This bit also is set if the newer WPA security mechanism is employed, as described in Section 14.6.●Order:Set to 1 in any data frame sent using the Strictly Ordered service,which tells the receiving station that frames must be processed in order. We now look at the various MAC frame types.Control Frames Control frames assist in the reliable delivery of data frames. There are six control frame subtypes:●Power Save-Poll (PS-Poll): This frame is sent by any station to the stationthat includes the AP (access point). Its purpose is to request that the AP transmit a frame that has been buffered for this station while the station was in power saving mode.●Request to Send (RTS):This is the first frame in the four-way frameexchange discussed under the subsection on reliable data delivery at the beginning of Section 14.3.The station sending this message is alerting a potential destination, and all other stations within reception range, that it intends to send a data frame to that destination.●Clear to Send (CTS): This is the second frame in the four-way exchange.It is sent by the destination station to the source station to grant permission to send a data frame.●Acknowledgment:Provides an acknowledgment from the destination tothe source that the immediately preceding data, management, or PS-Poll frame was received correctly.●Contention-Free (CF)-End: Announces the end of a contention-freeperiod that is part of the point coordination function.●CF-End+CF-Ack:Acknowledges the CF-End. This frame ends thecontention-free period and releases stations from the restrictions associated with that period.Data Frames There are eight data frame subtypes, organized into two groups. The first four subtypes define frames that carry upper-level data from the source station to the destination station. The four data-carrying frames are as follows: ●Data: This is the simplest data frame. It may be used in both a contentionperiod and a contention-free period.●Data+CF-Ack: May only be sent during a contention-free period. Inaddition to carrying data, this frame acknowledges previously received data.●Data+CF-Poll: Used by a point coordinator to deliver data to a mobilestation and also to request that the mobile station send a data frame that it may have buffered.●Data+CF-Ack+CF-Poll: Combines the functions of the Data+CF-Ack andData+CF-Poll into a single frame.The remaining four subtypes of data frames do not in fact carry any user data. The Null Function data frame carries no data, polls, or acknowledgments. It is used only to carry the power management bit in the frame control field to the AP, to indicate that the station is changing to a low-power operating state. The remaining three frames (CF-Ack, CF-Poll,CF-Ack+CF-Poll) have the same functionality as the corresponding data frame subtypes in the preceding list (Data+CF-Ack, Data+CF-Poll, Data+CF-Ack+CF-Poll) but withotit the data. Management FramesManagement frames are used to manage communications between stations and APs. The following subtypes are included:●Association Request:Sent by a station to an AP to request an association,with this BSS. This frame includes capability information, such as whether encryption is to be used and whether this station is pollable.●Association Response:Returned by the AP to the station to indicatewhether it is accepting this association request.●Reassociation Request: Sent by a station when it moves from one BSS toanother and needs to make an association with tire AP in the new BSS. The station uses reassociation rather than simply association so that the new AP knows to negotiate with the old AP for the forwarding of data frames.●Reassociation Response:Returned by the AP to the station to indicatewhether it is accepting this reassociation request.●Probe Request: Used by a station to obtain information from anotherstation or AP. This frame is used to locate an IEEE 802.11 BSS.●Probe Response: Response to a probe request.●Beacon: Transmitted periodically to allow mobile stations to locate andidentify a BSS.●Announcement Traffic Indication Message: Sent by a mobile station toalert other mobile stations that may have been in low power mode that this station has frames buffered and waiting to be delivered to the station addressed in this frame.●Dissociation: Used by a station to terminate an association.●Authentication:Multiple authentication frames are used in an exchange toauthenticate one station to another.●Deauthentication:Sent by a station to another station or AP to indicatethat it is terminating secure communications.IEEE802.11 媒体接入控制IEEE 802.11 MAC层覆盖了三个功能区:可靠的数据传送、接入控制以及安全。

毕业设计外文翻译英文加中文传送带

毕业设计外文翻译英文加中文传送带

A Comparison of Soft Start Mechanisms for Mining BeltConveyors1800 Washington Road Pittsburgh, PA 15241 Belt Conveyors are an important method for transportation of bulk materials in the mining industry. The control of the application of the starting torque from the belt drive system to the belt fabric affects the performance, life cost, and reliability of the conveyor. This paper examines applications of each starting method within the coal mining industry.INTRODUCTIONThe force required to move a belt conveyor must be transmitted by the drive pulley via friction between the drive pulley and the belt fabric. In order to transmit power there must be a difference in the belt tension as it approaches and leaves the drive pulley. These conditions are true for steady state running, starting, and stopping. Traditionally, belt designs are based on static calculations of running forces. Since starting and stopping are not examined in detail, safety factors are applied to static loadings (Harrison, 1987). This paper will primarily address the starting or acceleration duty of the conveyor. The belt designer must control starting acceleration to prevent excessive tension in the belt fabric and forces in the belt drive system (Suttees, 1986). High acceleration forces can adversely affect the belt fabric, belt splices, drive pulleys, idler pulleys, shafts, bearings, speed reducers, and couplings. Uncontrolled acceleration forces can cause belt conveyor system performance problems with vertical curves, excessive belt take-up movement, loss of drive pulley friction, spillage of materials, and festooning of the belt fabric. The belt designer is confronted with two problems, The belt drive system must produce a minimum torque powerful enough to start the conveyor, and controlled such that the acceleration forces are within safe limits. Smooth starting of the conveyor can be accomplished by the use of drive torque control equipment, either mechanical or electrical, or a combination of the two (CEM, 1979).SOFT START MECHANISM EVALUATION CRITERIONWhat is the best belt conveyor drive system? The answer depends on many variables. The best system is one that provides acceptable control for starting, running, and stopping at a reasonable cost and with high reliability (Lewdly and Sugarcane, 1978). Belt Drive System For the purposes of this paper we will assume that belt conveyors are almost always driven byelectrical prime movers (Goodyear Tire and Rubber, 1982). The belt "drive system" shall consist of multiple components including the electrical prime mover, the electrical motor starter with control system, the motor coupling, the speed reducer, the low speed coupling, the belt drive pulley, and the pulley brake or hold back (Cur, 1986). It is important that the belt designer examine the applicability of each system component to the particular application. For the purpose of this paper, we will assume that all drive system components are located in the fresh air, non-permissible, areas of the mine, or in non-hazardous, National Electrical Code, Article 500 explosion-proof, areas of the surface of the mine.Belt Drive Component Attributes SizeCertain drive components are available and practical in different size ranges. For this discussion, we will assume that belt drive systems range from fractional horsepower to multiples of thousands of horsepower. Small drive systems are often below 50 horsepower. Medium systems range from 50 to 1000 horsepower. Large systems can be considered above 1000 horsepower. Division of sizes into these groups is entirely arbitrary. Care must be taken to resist the temptation to over motor or under motor a belt flight to enhance standardization. An over motored drive results in poor efficiency and the potential for high torques, while an under motored drive could result in destructive overspending on regeneration, or overheating with shortened motor life (Lords, et al., 1978).Torque ControlBelt designers try to limit the starting torque to no more than 150% of the running torque (CEMA, 1979; Goodyear, 1982). The limit on the applied starting torque is often the limit of rating of the belt carcass, belt splice, pulley lagging, or shaft deflections. On larger belts and belts with optimized sized components, torque limits of 110% through 125% are common (Elberton, 1986). In addition to a torque limit, the belt starter may be required to limit torque increments that would stretch belting and cause traveling waves. An ideal starting control system would apply a pretension torque to the belt at rest up to the point of breakaway, or movement of the entire belt, then a torque equal to the movement requirements of the belt with load plus a constant torque to accelerate the inertia of the system components from rest to final running speed. This would minimize system transient forces and belt stretch (Shultz, 1992). Different drive systems exhibit varying ability to control the application of torques to the belt at rest and at different speeds. Also, the conveyor itself exhibits two extremes of loading. An empty belt normally presents the smallest required torque for breakaway and acceleration, while a fully loaded belt presents the highest required torque. A mining drive system must be capable of scaling the applied torque from a 2/1 ratio for a horizontal simple belt arrangement, to a 10/1 ranges for an inclined or complex belt profile.Thermal RatingDuring starting and running, each drive system may dissipate waste heat. The waste heat may be liberated in the electrical motor, the electrical controls,, the couplings, the speed reducer, or the belt braking system. The thermal load of each start Is dependent on the amount of belt load and the duration of the start. The designer must fulfill the application requirements for repeated starts after running the conveyor at full load. Typical mining belt starting duties vary from 3 to 10 starts per hour equally spaced, or 2 to 4 starts in succession. Repeated starting may require the dreading or over sizing of system components. There is a direct relationship between thermal rating for repeated starts and costs. Variable Speed. Some belt drive systems are suitable for controlling the starting torque and speed, but only run at constant speed. Some belt applications would require a drive system capable of running for extended periods at less than full speed. This is useful when the drive load must be shared with other drives, the belt is used as a process feeder for rate control of the conveyed material, the belt speed is optimized for the haulage rate, the belt is used at slower speeds to transport men or materials, or the belt is run a slow inspection or inching speed for maintenance purposes (Hager, 1991). The variable speed belt drive will require a control system based on some algorithm to regulate operating speed. Regeneration or Overhauling Load. Some belt profiles present the potential for overhauling loads where the belt system supplies energy to the drive system. Not all drive systems have the ability to accept regenerated energy from the load. Some drives can accept energy from the load and return it to the power line for use by other loads. Other drives accept energy from the load and dissipate it into designated dynamic or mechanical braking elements. Some belt profiles switch from motoring to regeneration during operation. Can the drive system accept regenerated energy of a certain magnitude for the application? Does the drive system have to control or modulate the amount of retarding force during overhauling? Does the overhauling occur when running and starting? Maintenance and Supporting Systems. Each drive system will require periodic preventative maintenance. Replaceable items would include motor brushes, bearings, brake pads, dissipation resistors, oils, and cooling water. If the drive system is conservatively engineered and operated, the lower stress on consumables will result in lower maintenance costs. Some drives require supporting systems such as circulating oil for lubrication, cooling air or water, environmental dust filtering, or computer instrumentation. The maintenance of the supporting systems can affect the reliability of the drive system.CostThe drive designer will examine the cost of each drive system. The total cost is the sum of the first capital cost to acquire the drive, the cost to install and commission the drive, thecost to operate the drive, and the cost to maintain the drive. The cost for power to operate the drive may vary widely with different locations. The designer strives to meet all system performance requirements at lowest total cost. Often more than one drive system may satisfy all system performance criterions at competitive costs.ComplexityThe preferred drive arrangement is the simplest, such as a single motor driving through a single head pulley.However,mechanical, economic,and functional requirements often necessitate the use of complex drives.The belt designer must balance the need for sophistication against the problems that accompany complex systems. Complex systems require additional design engineering for successful deployment. An often-overlooked cost in a complex system is the cost of training onsite personnel, or the cost of downtime as a result of insufficient training.SOFT START DRIVE CONTROL LOGICEach drive system will require a control system to regulate the starting mechanism. The most common type of control used on smaller to medium sized drives with simple profiles is termed "Open Loop Acceleration Control". In open loop, the control system is previously configured to sequence the starting mechanism in a prescribed manner, usually based on time. In open loop control, drive-operating parameters such as current, torque, or speed do not influence sequence operation. This method presumes that the control designer has adequately modeled drive system performance on the conveyor. For larger or more complex belts, "Closed Loop" or "Feedback" control may he utilized. In closed loop control, during starting, the control system monitors via sensors drive operating parameters such as current level of the motor, speed of the belt, or force on the belt, and modifies the starting sequence to control, limit, or optimize one or wore parameters. Closed loop control systems modify the starting applied force between an empty and fully loaded conveyor. The constants in the mathematical model related to the measured variable versus the system drive response are termed the tuning constants. These constants must be properly adjusted for successful application to each conveyor. The most common schemes for closed loop control of conveyor starts are tachometer feedback for speed control and load cell force or drive force feedback for torque control. On some complex systems, It is desirable to have the closed loop control system adjust itself for various encountered conveyor conditions. This is termed "Adaptive Control". These extremes can involve vast variations in loadings, temperature of the belting, location of the loading on the profile, or multiple drive options on the conveyor. There are three commonadaptive methods. The first involves decisions made before the start, or 'Restart Conditioning'. If the control system could know that the belt is empty, it would reduce initial force and lengthen the application of acceleration force to full speed. If the belt is loaded, the control system would apply pretension forces under stall for less time and supply sufficient torque to adequately accelerate the belt in a timely manner. Since the belt only became loaded during previous running by loading the drive, the average drive current can be sampled when running and retained in a first-in-first-out buffer memory that reflects the belt conveyance time. Then at shutdown the FIFO average may be use4 to precondition some open loop and closed loop set points for the next start. The second method involves decisions that are based on drive observations that occur during initial starting or "Motion Proving'. This usually involves a comparison In time of the drive current or force versus the belt speed. if the drive current or force required early in the sequence is low and motion is initiated, the belt must be unloaded. If the drive current or force required is high and motion is slow in starting, the conveyor must be loaded. This decision can be divided in zones and used to modify the middle and finish of the start sequence control. The third method involves a comparison of the belt speed versus time for this start against historical limits of belt acceleration, or 'Acceleration Envelope Monitoring'. At start, the belt speed is measured versus time. This is compared with two limiting belt speed curves that are retained in control system memory. The first curve profiles the empty belt when accelerated, and the second one the fully loaded belt. Thus, if the current speed versus time is lower than the loaded profile, it may indicate that the belt is overloaded, impeded, or drive malfunction. If the current speed versus time is higher than the empty profile, it may indicate a broken belt, coupling, or drive malfunction. In either case, the current start is aborted and an alarm issued.CONCLUSIONThe best belt starting system is one that provides acceptable performance under all belt load Conditions at a reasonable cost with high reliability. No one starting system meets all needs. The belt designer must define the starting system attributes that are required for each belt. In general, the AC induction motor with full voltage starting is confined to small belts with simple profiles. The AC induction motor with reduced voltage SCR starting is the base case mining starter for underground belts from small to medium sizes. With recent improvements, the AC motor with fixed fill fluid couplings is the base case for medium to large conveyors with simple profiles. The Wound Rotor Induction Motor drive is the traditional choice for medium to large belts with repeated starting duty or complex profilesthat require precise torque control. The DC motor drive, Variable Fill Hydrokinetic drive, and the Variable Mechanical Transmission drive compete for application on belts with extreme profiles or variable speed at running requirements. The choice is dependent on location environment, competitive price, operating energy losses, speed response, and user familiarity. AC Variable Frequency drive and Brush less DC applications are limited to small to medium sized belts that require precise speed control due to higher present costs and complexity. However, with continuing competitive and technical improvements, the use of synthesized waveform electronic drives will expand.REFERENCES[1]Michael L. Nave, P.E.1989.CONSOL Inc.煤矿业带式输送机几种软起动方式的比较1800 年华盛顿路匹兹堡, PA 15241带式运送机是采矿工业运输大批原料的重要方法。

毕业设计中英文翻译

毕业设计中英文翻译

本科生毕业设计(论文)外文翻译毕业设计(论文)题目:电力系统检测与计算外文题目:The development of the single chipmicrocomputer译文题目:单片机技术的发展与应用学生姓名: XXX专业: XXX指导教师姓名: XXX评阅日期:单片机技术的发展与应用从无线电世界到单片机世界现代计算机技术的产业革命,将世界经济从资本经济带入到知识经济时代。

在电子世界领域,从 20 世纪中的无线电时代也进入到 21 世纪以计算机技术为中心的智能化现代电子系统时代。

现代电子系统的基本核心是嵌入式计算机系统(简称嵌入式系统),而单片机是最典型、最广泛、最普及的嵌入式系统。

一、无线电世界造就了几代英才。

在 20 世纪五六十年代,最具代表的先进的电子技术就是无线电技术,包括无线电广播,收音,无线通信(电报),业余无线电台,无线电定位,导航等遥测、遥控、遥信技术。

早期就是这些电子技术带领着许多青少年步入了奇妙的电子世界,无线电技术展示了当时科技生活美妙的前景。

电子科学开始形成了一门新兴学科。

无线电电子学,无线通信开始了电子世界的历程。

无线电技术不仅成为了当时先进科学技术的代表,而且从普及到专业的科学领域,吸引了广大青少年,并使他们从中找到了无穷的乐趣。

从床头的矿石收音机到超外差收音机;从无线电发报到业余无线电台;从电话,电铃到无线电操纵模型。

无线电技术成为当时青少年科普、科技教育最普及,最广泛的内容。

至今,许多老一辈的工程师、专家、教授当年都是无线电爱好者。

无线电技术的无穷乐趣,无线电技术的全面训练,从电子学基本原理,电子元器件基础到无线电遥控、遥测、遥信电子系统制作,培养出了几代科技英才。

二、从无线电时代到电子技术普及时代。

早期的无线电技术推动了电子技术的发展,其中最主要的是真空管电子技术向半导体电子技术的发展。

半导体电子技术使有源器件实现了微小型化和低成本,使无线电技术有了更大普及和创新,并大大地开阔了许多非无线电的控制领域。

毕业设计英文翻译解读

毕业设计英文翻译解读

金刚钻的工业化运用一个程序一般需要50至70美网。

在这样的切割频率下,工具的负载量是比较低的。

而欧洲这样的程序下金刚钻的模型是完全不一样的!在我国,在这样的程序下,普遍金刚钻工具在非常自由的切割条件下,产品是不规则的易碎的微粒!在欧洲因为各种因素,情况是不同的。

因为欧洲的生活水平远高于我国,因此,他们的劳动力成本也要高。

为了使欧洲最大的石材生产商保持竞争力,他们必须要把注意力从原材料转移到生产的有效输出和最大化输出。

这就要求产品从原材料到成品的生产过程中尽可能减小能源的耗费和不必要的浪费。

该方法需要机床技术能够高速运作和先进的加工,可进行可靠的长时间持续的,无人值守操作。

在20世纪90年代,在机械和金刚石工具技术方面有很大的发展,使产量增加和降低生产成本。

如果我们对比一下欧洲和中国生产标准,我们可以看到在机器和工具的生产方面,中欧存在很大的差距。

在欧洲,制造这些瓷砖几乎是完全自动的,因为高效率的机械设计和自动处理设施。

最新一代的锯床这种应用能够使用主轴高达80分直径锯片。

机器和工具的设计,在达到下列的参数下,切割率是可以更快的。

•表面速度:- 25 – 35m / s•切削深度:-1mm•大桥速度:- 17m/min•切割速度:- IPOcm/5min或1m/h每个刀片•机输出:- 640m/5day(8小时每天)在这样的条件下,生产浪费减至最低,产量确更高。

通常情况下,在欧洲,刀片会产生10mm的缺口,而中国有12mm。

并且相对于中国12-15mm的切面的切口,欧洲只有10-12mm的切口。

在实现生产最大化材料处理和优化加工时间也是关键,厚片的切据被自动转移到自动的二次加工。

在这样精确的切割率下,对于金刚钻工具的要求是很高的,在程序控制下,型号和尺寸与中国的标准下是有很大不同的。

由于切割率相对高很多,最通常的尺寸是30-50。

切割率高,意味着工具的负载量也高,金刚钻的性质也会不一样!金刚钻的要求一般都是统一的,强大,块状颗粒,这是使在长时间的高负荷下,保持高产量。

毕业设计外文文献翻译范文

毕业设计外文文献翻译范文

毕业设计外文文献翻译专业学生姓名班级学号指导教师优集学院外文资料名称:Knowledge-Based Engineeri--ng Design Methodology外文资料出处:Int.J.Engng Ed.Vol.16.No.1附件: 1.外文资料翻译译文2.外文原文基于知识工程(KBE)设计方法D. E. CALKINS1.背景复杂系统的发展需要很多工程和管理方面的知识、决策,它要满足很多竞争性的要求。

设计被认为是决定产品最终形态、成本、可靠性、市场接受程度的首要因素。

高级别的工程设计和分析过程(概念设计阶段)特别重要,因为大多数的生命周期成本和整体系统的质量都在这个阶段。

产品成本的压缩最可能发生在产品设计的最初阶段。

整个生命周期阶段大约百分之七十的成本花费在概念设计阶段结束时,缩短设计周期的关键是缩短概念设计阶段,这样同时也减少了工程的重新设计工作量。

工程权衡过程中采用良好的估计和非正式的启发进行概念设计。

传统CAD工具对概念设计阶段的支持非常有限。

有必要,进行涉及多个学科的交流合作来快速进行设计分析(包括性能,成本,可靠性等)。

最后,必须能够管理大量的特定领域的知识。

解决方案是在概念设计阶段包含进更过资源,通过消除重新设计来缩短整个产品的时间。

所有这些因素都主张采取综合设计工具和环境,以在早期的综合设计阶段提供帮助。

这种集成设计工具能够使由不同学科的工程师、设计者在面对复杂的需求和约束时能够对设计意图达成共识。

那个设计工具可以让设计团队研究在更高级别上的更多配置细节。

问题就是架构一个设计工具,以满足所有这些要求。

2.虚拟(数字)原型模型现在需要是一种代表产品设计为得到一将允许一产品的早发展和评价的真实事实上原型的过程的方式。

虚拟样机将取代传统的物理样机,并允许设计工程师,研究“假设”的情况,同时反复更新他们的设计。

真正的虚拟原型,不仅代表形状和形式,即几何形状,它也代表如重量,材料,性能和制造工艺的非几何属性。

本科毕业设计外文文献翻译

本科毕业设计外文文献翻译

(Shear wall st ructural design ofh igh-lev el fr ameworkWu Jiche ngAbstract : In t his pape r the basic c oncepts of man pow er from th e fra me sh ear w all str uc ture, analy sis of the struct ur al des ign of th e c ont ent of t he fr ame she ar wall, in cludi ng the seism ic wa ll she ar spa本科毕业设计外文文献翻译学校代码: 10128学 号:题 目:Shear wall structural design of high-level framework 学生姓名: 学 院:土木工程学院 系 别:建筑工程系 专 业:土木工程专业(建筑工程方向) 班 级:土木08-(5)班 指导教师: (副教授)nratiodesign, and a concretestructure in themost co mmonly usedframe shear wallstructurethedesign of p oints to note.Keywords: concrete; frameshearwall structure;high-risebuildingsThe wall is amodern high-rise buildings is an impo rtant buildingcontent, the size of theframe shear wall must comply with building regulations. The principle is that the largersizebut the thicknessmust besmaller geometric featuresshouldbe presented to the plate,the force is close to cylindrical.The wall shear wa ll structure is a flatcomponent. Itsexposure to the force along the plane level of therole ofshear and moment, must also take intoaccountthe vertical pressure.Operate under thecombined action ofbending moments and axial force andshear forcebythe cantilever deep beam under the action of the force levelto loo kinto the bottom mounted on the basis of. Shearwall isdividedinto a whole walland theassociated shear wall in theactual project,a wholewallfor exampl e, such as generalhousingconstruction in the gableor fish bone structure filmwalls and small openingswall.Coupled Shear walls are connected bythecoupling beam shear wall.Butbecause thegeneralcoupling beamstiffness is less thanthe wall stiffnessof the limbs,so. Walllimb aloneis obvious.The central beam of theinflection pointtopay attentionto thewall pressure than the limits of the limb axis. Will forma shortwide beams,widecolumn wall limbshear wall openings toolarge component atbothen ds with just the domain of variable cross-section ro din the internalforcesunder theactionof many Walllimb inflection point Therefore, the calcula tions and construction shouldAccordingtoapproximate the framestructure to consider.The designof shear walls shouldbe based on the characteristics of avariety ofwall itself,and differentmechanical ch aracteristicsand requirements,wall oftheinternalforcedistribution and failuremodes of specific and comprehensive consideration of the design reinforcement and structural measures. Frame shear wall structure design is to consider the structure of the overall analysis for both directionsofthehorizontal and verticaleffects. Obtain theinternal force is required in accordancewiththe bias or partial pull normal section forcecalculation.The wall structure oftheframe shear wall structural design of the content frame high-rise buildings, in the actual projectintheuse of themost seismic walls have sufficient quantitiesto meet thelimitsof the layer displacement, the location isrelatively flexible. Seismic wall for continuous layout,full-length through.Should bedesigned to avoid the wall mutations in limb length and alignment is notupand down the hole. The sametime.The inside of the hole marginscolumnshould not belessthan300mm inordertoguaranteethelengthof the column as the edgeof the component and constraint edgecomponents.Thebi-direc tional lateral force resisting structural form of vertical andhorizontalwallconnected.Each other as the affinityof the shear wall. For one, two seismic frame she ar walls,even beam highratio should notgreaterthan 5 and a height of not less than400mm.Midline columnand beams,wall midline shouldnotbe greater tha nthe columnwidthof1/4,in order toreduce thetorsional effect of the seismicaction onthecolumn.Otherwisecan be taken tostrengthen thestirrupratio inthe column tomake up.If theshear wall shearspan thanthe big two. Eventhe beamcro ss-height ratiogreaterthan 2.5, then the design pressure of thecut shouldnotmakeabig 0.2. However, if the shearwallshear spanratioof less than two couplingbeams span of less than 2.5, then the shear compres sion ratiois notgreater than 0.15. Theother hand,the bottom ofthe frame shear wallstructure to enhance thedesign should notbe less than200mmand notlessthanstorey 1/16,otherpartsshouldnot be less than 160mm and not less thanstorey 1/20. Aroundthe wall of the frame shear wall structure shouldbe set to the beam or dark beamand the side columntoform a border. Horizontal distributionofshear walls can from the shear effect,this design when building higher longeror framestructure reinforcement should be appropriatelyincreased, especially in the sensitiveparts of the beam position or temperature, stiffnesschange is bestappropriately increased, thenconsideration shouldbe givento the wallverticalreinforcement,because it is mainly from the bending effect, andtake in some multi-storeyshearwall structurereinforcedreinforcement rate -likelessconstrained edgeofthecomponent or components reinforcement of theedge component.References: [1 sad Hayashi,He Yaming. On the shortshear wall high-rise buildingdesign [J].Keyuan, 2008, (O2).高层框架剪力墙结构设计吴继成摘要: 本文从框架剪力墙结构设计的基本概念人手, 分析了框架剪力墙的构造设计内容, 包括抗震墙、剪跨比等的设计, 并出混凝土结构中最常用的框架剪力墙结构设计的注意要点。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

故障概率模型的数控车床摘要:领域的失效分析被计算机数字化控制<CNC)车床描述。

现场收集了为期两年的约80台数控车床的故障数据。

编码系统代码失效数据是制定和失效分析数据库成立的数控车床。

失败的位置和子系统,失效模式及原因进行了分析,以显示薄弱子系统的数控车床。

另外,故障的概率模型,分析了数控车床的模糊多准则综合评价。

作者关键词:数控车床;场失败;概率模型;模糊信息文章概述绍介1.述2. 车的床概 CNC据3.整和数理收集据数收3.1. 集性据3.2. 的效效领域失数有库数和数据3.3. 核对据析效失4. 分4.1. 对失败位置和子系统的频率分析分4.2. 率败析失对的形式频型机失5.率模败学方5.1.法5.2. 分布倍之间连续的失败5.3. 发时修理间的行6.结论1.介绍在过去十年中,计算机数字化控制<CNC)车床已经越来越多地被引入到机械加工过程中。

由于其固有的灵活性很大,稳定的加工精度和高生产率,数控车床是能给用户巨大的利益。

然而,作为一个单一的数控车床故障也许会导致整个生产车间被停[1],数控车床能够给用户带来很多的麻止,而且维修更加困难和昂贵,当故障发生时烦。

与此同时,制造商还需要持续改进数控车床的可靠性来提高市场的竞争力。

因此,数控车床的可靠性能使生产商和用户增加显著性和至关重要的意义。

需要改进数控车床的可靠性,使用户和制造商收集和分析领域的故障数据和采取措施1 / 17减少停机时间。

本文论述了研究失效模式及原因,失效的位置和薄弱的子系统,故障概率模型的数控车床。

C车床的概述数控车床是一个复杂的系统,以高层次的自动化和复杂的结构,采用机械,电[234],,。

图1/或供气系统是系统子,液压等。

它主要由机械系统,数控系统,液压和方框图的一个典型的数控车床。

液供电动控制面可编开按控I/O电路磁继电编码刷滑伺服驱电动主编码电滑伺服驱主电机驱动器主轴机主轴电编码器显示器/键盘内存里程电路RS232C I/O设备供应板电池图1系统框图的数控车床机械系统包括主轴及其传动链<固定在主轴箱),两根滑动轴<命名X、Z或者U,W在轮),车床拖板箱,转动架或刀架,尾座,床身等。

主轴持续或加强连续变速,驱2 / 17动交流或直流主轴电机直接或通过主传动,并有一个光电编码器的主轴车削螺纹。

X和Z两根轴的驱动交流或直流伺服车削螺纹和控制同时进行。

该转动架或刀架可自动交换工具。

所有这些都是控制的数控系统。

[4],通常是包括电源,主要电路板<PCB)<通常是微型计算数控系统的核心车床机),可编程控制器<PLC)的I/O电路板<连接控制面板,限位开关,按钮,磁铁,刀架等),主轴电路板<控制滑块轴与主轴通过半封闭或闭环电子控制电机驱动器和光电编码器),内存电路板<连接额外编码器,显示器/键盘<手动数据输入),手动脉冲发生器<MPG),备用电池和RS-232串行通信设备)。

数控系统和一些电子元件,如接触器开关,继电器,稳压器,按钮等,都固定在一个柜子里。

其他电子元件,如限位开关,接近开关,编码器等,都安装在机器上。

数控系统的基本和可选功能有直线和圆弧插补,间隙补偿,自动协调系统设置,刀具偏移,刀具补偿,编辑后处理,自我诊断,固定循环等,不同于经济全功能模型机床。

3.收集和整理数据3.1收集数据数年前,数控车床很难收集到可靠的领域失效数据,因为用户很少在保修期保持[1567],,,。

幸运的是,一个国家行政机构在这个国家对使用数控充分和完整的维修记录机床的用户制定了强制性规则,所有数控机床用户必须追踪数控机床的性能和保养和反馈完整的维修报告给在保修期间的制造商和相关研究机构。

维修报告应存放在一台计算机上,或者记录在一个统一的格式里[8],并应包含以下信息:1、产品名称,型号和大小。

2、产品代码。

3、故障的日期和时间。

4、在失效之前累积的工作时间。

5、失效现象。

6、原因分析。

7、修复过程。

8、修理时间。

9、停机。

10、失效元件的型号,尺寸和数量。

11、故障判断<据说或没有失败)。

12、如何防止重复出现的故障。

3 / 1713、管理工程师或修理工程师的数据。

14、机器的场地。

数据分析是从一些典型代表的军械和汽车厂所提取的维修报告,如一汽<第一汽车制造厂),长春齿轮厂,上海汽车齿轮厂,上海第8号车辆厂,大连电冰箱厂,中国人民解放军7407厂等。

该调查显示上述工厂所使用的数控车床来自于大陆<66台数控车床),台湾<9台数控车床)和匈牙利<5台数控车床)。

3.2领域失效数据的有效性[8],但维修报告随不同的用户而不同。

为了尽量减少虽然有一个领域故障判定标准差异,我们把领域故障分为两组:故障失效和准确性失效,都受数控车床的内在可靠性的影响。

此外,前者通常是受操作条件,如灰尘,湿度,操作者的技能等,后者是受运作要求的主要影响,如表面光洁度,公差等。

3.3整理数据和数据库即使领域失效数据记录在第3.1节和验证在第3.2节,用计算机分析数据也很难的。

因此,编码系统的编码数据,设计失效和故障数据库成立的数控车床,以及数据库的结构如表1所示。

4 / 178品产3 称名特征用404征户特40造制5 征商特406现象特征40障7 故特原因408 征方复修5 / 17 值8.3h14 停机值数8.3h故障15特模式316征位故障特征置3累计17时作工数值间10.3h18特明说40征[8]和产品代码是被编撰在图失效模式和失效位置编撰的建议标准2。

车间代号车间用户制造商2 例如产品代码图失效数据库可以根据任何专用机器,批量机器,制造商,用户,故障模式,故障状况等被加工和回收,以适应不同的分析目的。

主要任务的可靠性分析下可以根据数据库执行如下:平均修理时间),利用率平均故障间隔时间),MTTR<1、可靠性特征的计算,如MTBF< 。

机器批特定机器或量等,、失效模式及32、图形分析技术,如频率失效,分层图,因果系统图解等频率直方图 <FMEA),如失效分析子系统,故障模式,故障原因,找出薄弱的子系统。

效应分析修。

维布效的分格局和失4、)。

5、故障树分析<FTA 4、失效分析4.1故障位置和子系统的频率分析6 / 17为了找到最薄弱的子系统,我们计数失效数量的每个子系统的检索子系统代码在表2中定义的数据库,然后计算每个子系统的失败频率。

表2失效的频率和失效位置与子系统的代码代码子系统失效频率<%)代码子系统失效频率<%)V电气和电子系统27 M刀架或刀19NC数控11 夹和夹10.3电8 F伺服6.67S 轴装3.7润滑统7 / 17 2.67其他R2.57W冷却系2.1 统切屑K 送输1.87S1主传动1.4Z进给Z 统系1.4 D液压系统1.05X进给 0.7不清0.351PC可编控制0.23 保护 0.117是失效位置和是失效位置和子系统代码和每个子系统的失败频率的数控车床。

图32表子系统的直方图。

可以看出主要的故障子系统的电气和电子系统、刀架、数控系统、夹头和夹具,电源,伺服单元等。

电气和电子系统包括接触开关,继电器,磁铁,按钮,限位开关等,都位于机器或在箱子里。

也可以看出机械系统的主要故障子系统是8 / 17刀架和卡盘。

统系子具电夹和或气头动电统器夹传置系动统统主装源架统统油驱送系系统轴电刀系系滑服输却压系置主器给给润伺屑冷液控装楚率制进进切数护他清控频ZX保其不程编可图.3 直方图的失效位置4.2对失效模式的频率分析为了分析失效模式及起因,我们根据数据库计数失效的数量的每种失效模式通过检索被定义的失效模式代码在表3,然后计算每种失效模式的失效频率。

表3失效的频率和故障模型的代码代码故障模型失效频率<%)代码故障模型失效频9 / 17 <%)率53部件的损坏33.363保险丝/毁烧大功率9电61路断开或开启8.8传64感器故7.6 障错3 误输7.1358机损6.525.5694.62架不4.649存储3.610 / 17 数68控系统参数错 2.8 误35错误回2.1 车7密封或冲粘1.1742油路阻断0.936浮54 0.7570.76 0.58390.234是故障模型的直43表是每个失效模型的故障模型代码和失效的频率的数控车床。

图方图。

可以看出,主要的失效模型是部件的损坏。

该组件包括电气,电子元件,如继%),液压和气动元电器,按钮,限位开关等<69%的所有损坏部件),机械部件<26%)。

并且大部分是标准组件和购买的部件。

这证据表明,当数控车床被设计和<5件制造时,是缺乏可靠性分配和可靠性筛选。

11 / 17率功大启/开坏误毁或损错烧开的数丝障断件参险故常源部统出保器坏动异电系输感车损器不控误传回机储架断数错冲误电存刀阻粘错的的路/率松封路他载油疏其超密短频热动过浮图4故障模型的直方图5.失败的概率模型[1][9][10]。

这些参早期工作或对数分布,认为这模型的失效可能是最好的说明使用威布尔数的分布估计通常用最大似然法<MLM)或最小二乘法<LSM),和哥洛夫—斯M尔诺夫[11]2[12]通常是用来测试的吻合度。

χ检验统计Dmax检验统计或有一些模糊信息被确定分配来描述观测数据。

通常,当一个分配选为假设分布来描述观测数据时,不仅考虑到错误的累积分布函数,还应考虑到错误的概率密度函数与属性和功能的分配。

因此分配的测定是一个多准则综合评价问题的模糊信息。

[13-14]。

本文确定了分配的模糊多准则综合评在模糊集方法上有大量的出版文献价。

我们可以选择威布尔,对数正态分布,指数分布和伽马等作为选择修建一套方案A=<AAAA…)=<威布尔对数伽玛指数...)。

为了隔开一套更可取的解决方案,决4321策者必须首先对替代率的因素或标准,来反映这主要目标的研究。

对于概率模型,其主要目标是:1、尽量减少哥洛夫一斯M尔诺夫检验统计Dmax;2、尽量减少错误的累积分布函数;3、尽量减少错误的概率密度函数;4、分配的性质最适合故障数据;5、功能分布最适合故障数据。

这些目标是组建成一组因素F=(FFFFF>。

534125.1方法学评价矩阵:当某一决策小组评估了一套替代方案(AA…A>作为对之前一系列因N1212 / 174界定之前,评价矩阵可以构造与沿一根轴的另一边选择和因素,如表F>素(FF…M12是一个典型的工程评价矩阵。

是被考虑选择的数量,r所示,其中M是若干因素和N ij评价矩阵表4尔可以按照下列相应计算公式。

例如,哥洛夫一斯M定量因素,导入的评价矩阵,r ij[11]Dmax计算时被使用诺夫检验统计(1>是n 是随着样本,>是在假设累积分布函数,x(x>是经验累积分布函数,F(x其中,F ino样品的数量。

相关文档
最新文档