Download presentation
Presentation is loading. Please wait.
Published byAlbert Freeman Modified over 8 years ago
1
Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment J. Manuf. Sci. Eng. 2015;137(4):040905-040905-10. doi:10.1115/1.4030592 A typical collaborative scenario with different levels of encryption granularity of a CAD model Figure Legend:
2
Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment J. Manuf. Sci. Eng. 2015;137(4):040905-040905-10. doi:10.1115/1.4030592 An example of the DLG: (a) the feature tree, (b) the CAD model, and (c) the DLG Figure Legend:
3
Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment J. Manuf. Sci. Eng. 2015;137(4):040905-040905-10. doi:10.1115/1.4030592 The transformation of the feature f (a) the initial feature f and (b) the Hausdorff distance changing according to α Figure Legend:
4
Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment J. Manuf. Sci. Eng. 2015;137(4):040905-040905-10. doi:10.1115/1.4030592 The encryption procedure of a CAD model Figure Legend:
5
Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment J. Manuf. Sci. Eng. 2015;137(4):040905-040905-10. doi:10.1115/1.4030592 The initial model M 0 and its DLG: (a) the model M 0 and its feature tree and (b) the DLG of M 0 Figure Legend:
6
Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment J. Manuf. Sci. Eng. 2015;137(4):040905-040905-10. doi:10.1115/1.4030592 (a) M 0 is encrypted to M 1 and the shape comparison between M 0 and M 1 Figure Legend:
7
Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment J. Manuf. Sci. Eng. 2015;137(4):040905-040905-10. doi:10.1115/1.4030592 Key-based authorization of M 1 Figure Legend:
8
Date of download: 9/16/2016 Copyright © ASME. All rights reserved. From: Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment J. Manuf. Sci. Eng. 2015;137(4):040905-040905-10. doi:10.1115/1.4030592 The secure sharing of the propeller part Figure Legend:
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.