Presentation is loading. Please wait.

Presentation is loading. Please wait.

Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud.

Similar presentations


Presentation on theme: "Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud."— Presentation transcript:

1 Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment J. Manuf. Sci. Eng. 2015;137(4):040905-040905-10. doi:10.1115/1.4030592 A typical collaborative scenario with different levels of encryption granularity of a CAD model Figure Legend:

2 Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment J. Manuf. Sci. Eng. 2015;137(4):040905-040905-10. doi:10.1115/1.4030592 An example of the DLG: (a) the feature tree, (b) the CAD model, and (c) the DLG Figure Legend:

3 Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment J. Manuf. Sci. Eng. 2015;137(4):040905-040905-10. doi:10.1115/1.4030592 The transformation of the feature f (a) the initial feature f and (b) the Hausdorff distance changing according to α Figure Legend:

4 Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment J. Manuf. Sci. Eng. 2015;137(4):040905-040905-10. doi:10.1115/1.4030592 The encryption procedure of a CAD model Figure Legend:

5 Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment J. Manuf. Sci. Eng. 2015;137(4):040905-040905-10. doi:10.1115/1.4030592 The initial model M 0 and its DLG: (a) the model M 0 and its feature tree and (b) the DLG of M 0 Figure Legend:

6 Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment J. Manuf. Sci. Eng. 2015;137(4):040905-040905-10. doi:10.1115/1.4030592 (a) M 0 is encrypted to M 1 and the shape comparison between M 0 and M 1 Figure Legend:

7 Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment J. Manuf. Sci. Eng. 2015;137(4):040905-040905-10. doi:10.1115/1.4030592 Key-based authorization of M 1 Figure Legend:

8 Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment J. Manuf. Sci. Eng. 2015;137(4):040905-040905-10. doi:10.1115/1.4030592 The secure sharing of the propeller part Figure Legend:


Download ppt "Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud."

Similar presentations


Ads by Google