Guangdong Jidian Polytechnic

Guangzhou, China

Guangdong Jidian Polytechnic

Guangzhou, China

Time filter

Source Type

Suo H.,Guangdong Jidian Polytechnic | Liu Z.,Guangdong Jidian Polytechnic | Wan J.,Guangdong Jidian Polytechnic | Zhou K.,Jiangxi University of Science and Technology
2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013 | Year: 2013

With the development of cloud computing and mobility, mobile cloud computing has emerged and become a focus of research. By the means of on-demand self-service and extendibility, it can offer the infrastructure, platform, and software services in a cloud to mobile users through the mobile network. Security and privacy are the key issues for mobile cloud computing applications, and still face some enormous challenges. In order to facilitate this emerging domain, we firstly in brief review the advantages and system model of mobile cloud computing, and then pay attention to the security and privacy in the mobile cloud computing. By deeply analyzing the security and privacy issues from three aspects: mobile terminal, mobile network and cloud, we give the current security and privacy approaches. © 2013 IEEE.


Wan J.,Guangdong Jidian Polytechnic | Liu Z.,Guangdong Jidian Polytechnic | Zhou K.,Jiangxi University of Science and Technology | Lu R.,Jiangxi University of Science and Technology
2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013 | Year: 2013

In recent years, Mobile Cloud Computing (MCC) as a new technology of increasing interest from industry, academia and government has extended infrastructure, platform, and software services offered in a cloud to mobile users. However, the traditional client-server based on mobile service models are not able to meet the increasing demands from mobile users in terms of user experience, services diversity, security, and privacy. In this article, we provide a brief review of MCC, with respect to the basic concept and representative applications (e.g., mobile video streaming and mobile online gaming). The background of new mobile cloud service models is introduced, and then a novel human-centric MCC service model to promote the existing MCC research is proposed. © 2013 IEEE.


Zhou J.,Guangdong JIDIAN Polytechnic | Liu Y.,Beijing University of Technology
Advanced Materials Research | Year: 2012

As the transferring, application and integration of knowledge can highly improve organizational dynamic manufacturing capability, this paper takes an empirical study to explore the relationships among knowledge transfer, flexible manufacturing capability and manufacturing performance based on questionnaires from 113 advanced manufacturing firms in Pearl River Delta of China by the used of structural equation model method.© (2012) Trans Tech Publications, Switzerland.


He B.,Guangdong Jidian Polytechnic | Liao C.,Guangdong Jidian Polytechnic
Energy Education Science and Technology Part A: Energy Science and Research | Year: 2013

After analyzing the structure and forming process of volute mould and researching on the structure, concept of volute upper water outlet, this paper has designed a energy-saving mould of hydraulic pressure side parting mechanism, and realized the mould of the structure. Meanwhile, this paper has designed the specific mould gating system, forming component, side parting core-pulling mechanism, orienting and other system. The results of practices show the design of mould is rational with compact structure and reliable action. © Sila Science.


Hu N.,Guangdong Jidian Polytechnic | Yan Q.,Guangdong Jidian Polytechnic
2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012 - Proceedings | Year: 2012

A new QA35Y-16 hydraulic combined punching & shearing machine has designed. The shearing mechanism has been analyzed and established mathematical model between size and motion parameters. The machine can be realized the parametric design by to solve nonlinear equations. It's simpler with the same power and structure, the shearing width increase of 37.5%. QA35Y-16 is controlled by the MCU, can realize single, continuous, micro punching and shearing operation, and has the function of automatic counting and pre-setting. It adopts a transmission lever and a single cylinder, working stroke has large pressure, its speed is proper and return speed is high. Comparing with other machines, it's obviously improved the ability to shearing with different shapes of steel such as square, round, and angled. © 2012 IEEE.


He B.,Guangdong Jidian Polytechnic | Liao C.,Guangdong Jidian Polytechnic
Energy Education Science and Technology Part A: Energy Science and Research | Year: 2012

It conducts an experimental research about the heat transfer characteristic of trans-critical CO2 on the aluminum micro-channel parallel flow gas cooler, exploring the CO2 refrigerant side fluid resistance performance, the heat transfer performance of mass flow on the gas cooler, and its surface temperature distribution in the heat exchange process of trans-critical CO2. Through the experiment, we know that within a certain mass flow range, the heat exchange amount of the gas cooler will increase with the rise of mass flow. Additionally, we also get the result of the cooler windward surface temperature distribution. The study provides the reference of selection design for CO2 car air conditioning system to utilize the aluminum micro-channel parallel flow gas cooler. © Sila Science.


Lu E.,South China Agricultural University | Yang Z.,South China Agricultural University | Lu H.,South China Agricultural University | Wang G.,Guangdong Jidian Polytechnic | And 2 more authors.
Nongye Gongcheng Xuebao/Transactions of the Chinese Society of Agricultural Engineering | Year: 2012

An experimental platform with atmosphere controlled system by liquid nitrogen injection was established to study and solve the cold damage problem caused by liquid nitrogen during the transportation. The bore diameter of the outlet valve on the liquid nitrogen tank, the length of the vaporization coiled pile, the aperture direction on the horizontal pile, the ratio of opening area on the perforated partition, the airflow velocity and the length of the air return channel were chosen as variables to analyze their effects on the temperature regulating characteristics of liquid nitrogen and the parameters were optimized. The best regulation performance was obtained under the condition with the bore diameter of the outlet at 1.5 mm, the length of the vaporization coiled pile at 4 m, the aperture direction on the horizontal pile towards the draught fan, the ratio of the opening area on the partition at 4.03%, the airflow velocity at 8 m/s, and the length of the air return channel at 1.5 m. Under this condition, the O 2 concentration was reduced from 20.95% to 5%, the maximum temperature difference among the outlets of the perforated partition was only 1.3°C, and the maximum temperature difference between the outlet of perforated partition and the air return channel was only 2.72°C. The liquefied-nitrogen atmosphere controlled system could rapidly reduce the oxygen concentration in the container from 20.95% to 5% in 43 min, while cooling the internal environment of the container. The results can provide valuable references for the design of fresh-keeping vehicle with controlled atmosphere system.


Zhang X.F.,Guangdong Jidian Polytechnic | Xie J.,South China University of Technology | Xie H.F.,South China University of Technology | Li L.H.,South China University of Technology
International Journal of Advanced Manufacturing Technology | Year: 2012

Four tool path strategies such as equal-interval tool paths, parallel tool paths, parallel-tangency tool paths, and freeform tool paths are proposed in computer numerical control milling of a complex freeform surface. The objective is to understand how 3D tool paths influence their machining efficiency, surface quality, and form accuracy. In this study, their scallop heights were less than or equal to 15 μm. First, their scallop heights distributions and 3D tool path distances were theoretically analyzed; then, four tool path strategies were investigated with reference to machining efficiency, surface texture height, surface roughness, and form errors. It is shown that scallop heights distribution can be used to display the surface texture state and predict tool path distance. Experimental results indicate that the surface texture height, the surface roughness, and the form errors were nearly identical on the machined flat location and surface for various tool path strategies, whereas their surface quality and form accuracy are easily destroyed on the abrupt ones except for the parallel tool paths. Although the freeform tool paths produce the shortest tool path distance through 3-axes driving mode, the parallel tool paths offer the best surface quality and form accuracy through 2-axes driving mode. This is because the 3-axes driving and its vector changes on abrupt location easily lead to large machine vibration and movement errors. It is confirmed that the parallel tool path strategy with 2-axes driving mode can improve the surface quality and form accuracy in actual milling of a complex freeform surface. © Springer-Verlag London Limited 2011.


Nie X.,Guangdong Jidian Polytechnic
Applied Mechanics and Materials | Year: 2013

In recent years, cloud computing and Internet of Things have been the focus of research at home and abroad, the application of them is becoming increasingly wider, and smart campus is the outcome of the application of intergrading the cloud computing and the internet of things. In this paper we first introduce the application of the IOT and the cloud computing in education. Then we raise the model and application framework of smart campus. By the means of analyzing the model and application framework of smart campus base on the cloud computing and the internet of things, we study its function apply. At last we discuss the issues of smart campus to be widely applied. © (2013) Trans Tech Publications, Switzerland.


Nie X.,Guangdong Jidian Polytechnic
Applied Mechanics and Materials | Year: 2013

Nowadays, the internet of things (IOT) has attracted the attention of the researchers. As a key technology of the Internet of Things, RFID (Radio Frequency Identification) has also attracted the interest of industry and academia. One of the most important issues for the applications of the IOT based on RFID is security. In order to promote the development of IOT based on RFID, first of all, we briefly introduce the IOT system components and work process based on RFID, and then we deeply analyze the security threats in the IOT based on RFID, by the means of these analysis we discuss the current countermeasures for the security threats of RFID. Aiming at the RFID system, the corresponding technologies are raised such as Tag killing, Tag sleeping and blocker Tag; and the authentication based on HASH is the main method aiming at the communication process. © (2013) Trans Tech Publications, Switzerland.

Loading Guangdong Jidian Polytechnic collaborators
Loading Guangdong Jidian Polytechnic collaborators