Academic literature on the topic 'FEM Cloud'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'FEM Cloud.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "FEM Cloud"

1

Biel, Damian, and Tomasz Lipecki. "Headframe modelling accuracy for finite element method analysis purposes." Reports on Geodesy and Geoinformatics 106, no. 1 (December 1, 2018): 19–24. http://dx.doi.org/10.2478/rgg-2018-0010.

Full text
Abstract:
Abstract Nowadays, the growing popularity of terrestrial laser scanners (TLS) allows to obtain a point cloud of many industrial objects along with classic surveying. However, the quality and model’s accuracy in comparison to a real shape seem to be a question, that must be further researched. It is crucial especially for Finite Element Method (FEM) analysis, which, being a part of technical design, estimate the values of construction’s dislocation and deformation. The article describes objects such as headgear with steel support and 4-post headframe with steel sheers. Both supports and sheers were modelled basing on point clouds. All the models were compared to the point cloud. The differences in models’ shape were calculated and the maximal values were determined. The results’ usefulness in FEM analysis was described.
APA, Harvard, Vancouver, ISO, and other styles
2

Quattrini, R., F. Clementi, A. Lucidi, S. Giannetti, and A. Santoni. "FROM TLS TO FE ANALYSIS: POINTS CLOUD EXPLOITATION FOR STRUCTURAL BEHAVIOUR DEFINITION. THE SAN CIRIACO’S BELL TOWER." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-2/W15 (August 26, 2019): 957–64. http://dx.doi.org/10.5194/isprs-archives-xlii-2-w15-957-2019.

Full text
Abstract:
<p><strong>Abstract.</strong> In the last few years, the evolution of acquisition techniques allowed to acquire reality-based models increasing accurate and rich of information. On the contrary, the ability to exploit the acquired data in the most efficient, economic (in terms of invested time), and impartial way (in terms of arbitrary choices of the operator) represents the most significant gap. Interoperability theme between points cloud and informative systems becomes relevant. Excellent results were achieved in 3D data exploitation in HBIM and GIS environments, as well as in VR and AR applications, whereas the structural analysis with the Finite Element Method (FEM) still lacks robust workflows based on point clouds. The present paper proposes a methodology allowing to transform the TLS point cloud obtained from the survey directly into a 3D FEM, in a semi-automatic way and, therefore, proposes a hybrid reverse engineering approach that aims to: (i) maximizing the correspondence between the model for structural analysis and the real object; (ii) minimizing the time and the operator’s decision. The strategy is validated on the belfry of the Metropolitan Cathedral-Basilica of Saint Cyriacus in Ancona, Central Italy. The reliability of the proposed model is assessed through a comparison between the model obtained from the Boolean modelling within a FEM software and the model obtained directly from points cloud processing. The comparison between the two numerical models highlights the enormous potential of the exposed method. The proposed case study shows how it is possible to develop high-quality 3D models, able to connect geometrical-historical survey with thematic analysis about structural behavior.</p>
APA, Harvard, Vancouver, ISO, and other styles
3

Fang, J. W., Z. Sun, and Y. R. Zhang. "TLS-FEM INTEGRATED STRUCTURAL DEFORMATION ANALYSIS ON THE BEAMLESS HALL AT NANJING, CHINA." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-M-1-2021 (August 28, 2021): 215–20. http://dx.doi.org/10.5194/isprs-archives-xlvi-m-1-2021-215-2021.

Full text
Abstract:
Abstract. A method integrating terrestrial laser scanning (TLS) and finite element modelling (FEM) is proposed in this study. It aims at assessing the structural deformation of a historic brick-masonry building, the Beamless Hall at Linggu Temple in Nanjing, China. The building was composed of a series of vaults and arches, the largest among whom spans over 11m. TLS (Z+F Imager5010X) was used to collect 3D point cloud with high density. Point slices and geometric feature computation (verticality) were employed to detect geometric displacement quantitatively and intuitively. FEM-simulation was based on an ideal 3D model ignoring geometric anomalies. Results show that the Beamless Hall has inherent structural defect owing to its asymmetric layout along the transverse axis. Computing geometric feature of point cloud is fast and intuitive to detect and show geometric deviation. Inferred by FEM-simulated results and TLS-based deviation analysis, the building’s asymmetrical layout under self-weight is probably the main reason causing its structural deformation. Further developments include FEM based on as-built geometry, corrected materials parameters, and a comprehensive geometric deviation analysis.
APA, Harvard, Vancouver, ISO, and other styles
4

Wałach, Daniel, and Grzegorz Piotr Kaczmarczyk. "Application of TLS Remote Sensing Data in the Analysis of the Load-Carrying Capacity of Structural Steel Elements." Remote Sensing 13, no. 14 (July 14, 2021): 2759. http://dx.doi.org/10.3390/rs13142759.

Full text
Abstract:
This paper proposes the use of terrestrial laser scanning (TLS) measurements together with finite element method (FEM) numerical modeling to assess the current technical condition. The main aim of the paper was to evaluate the effect of point cloud size reduction on the quality of the geometric model and the ability to represent the corrosion level in assessing its load-carrying capacity. In this study, a standard scanning was performed on a historical object and a point cloud of a selected corroded element was generated. In order to further process the data, gradual reductions were made in the number of points from which meshes representing the geometry of the selected beam were created. Inaccuracy analyses of the meshes generated on the reduced point clouds were performed. Numerical analysis was then conducted for the selected mesh generated from the reduced point cloud. The results identified the locations of maximum stresses. The presented analysis showed that by developing the presented measurement and computational technique, laser scanning can be used to determine the degree of corrosion of hard-to-reach steel elements.
APA, Harvard, Vancouver, ISO, and other styles
5

Štalmach, Ondrej, Alžbeta Sapietová, Vladimír Dekýš, Peter Šulka, and Lukáš Gajdoš. "Conversion of data from the laser scanner to the Ansys Workbench." MATEC Web of Conferences 254 (2019): 02003. http://dx.doi.org/10.1051/matecconf/201925402003.

Full text
Abstract:
This paper deals with the data processing in the form of a cloud of points scanned using a handheld 3D laser scanner. The aim of this paper is to use this data to create a representative FEM model and compare two different approaches while one of them involves creating a CAD model and the other one not. The data processing is carried out in the freeware systems MeshLab and Meshmixer and FEM analysis in the software ANSYS Workbench.
APA, Harvard, Vancouver, ISO, and other styles
6

Barazzetti, Luigi, Fabrizio Banfi, Raffaella Brumana, Gaia Gusmeroli, Mattia Previtali, and Giuseppe Schiantarelli. "Cloud-to-BIM-to-FEM: Structural simulation with accurate historic BIM from laser scans." Simulation Modelling Practice and Theory 57 (September 2015): 71–87. http://dx.doi.org/10.1016/j.simpat.2015.06.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Feng, De Zhen, Hao Feng Luan, and Ran Zhao. "FEM Strength Analysis on the Main Structure of Modular Mechanical Water Treatment Plant." Advanced Materials Research 588-589 (November 2012): 208–11. http://dx.doi.org/10.4028/www.scientific.net/amr.588-589.208.

Full text
Abstract:
The modular mechanical water treatment plant is a kind of new technology in present. The new technology has changed the work way of conventional water plants and got very wide use in practice. According to characteristics of the modular mechanical water treatment equipment, the paper analyzed the strength of the main mechanical structure, compared the stress and deformation, presented the stress and strain cloud picture. Finally, the paper combined theory with practice and improved and optimized the design plan.
APA, Harvard, Vancouver, ISO, and other styles
8

Wen, Feng, Chen Han, Qiang Li, Zhoujian Chu, Wenhan Zhao, Shuqi Wu, Xiang Zhang, and Wenjie Pei. "Research on Coil Identification Algorithm of Wireless Power Transfer System Based on Magnetic Field Features." World Electric Vehicle Journal 12, no. 3 (September 1, 2021): 140. http://dx.doi.org/10.3390/wevj12030140.

Full text
Abstract:
In the practical application of wireless power transfer (WPT), the identification of the secondary coil and the analysis of the space magnetic field of the coil will affect the matching scheme of the coil, which will further affect the performance of energy transmission. At present, the establishment of the coil space magnetic field model mainly adopts the finite element method (FEM). The accuracy of the results is limited by the computer performance and the specific settings during calculation, which usually takes a long time. Additionally, it can only analyze and establish the space magnetic field of the coil with specific parameters. Especially when the coil structure and parameters change, it is difficult to quickly establish the spatial magnetic field. This paper presents a secondary side coil identification method of a wireless charging system based on the magnetic field cloud image characteristics. The image feature extraction algorithm is used to extract features of a certain height magnetic field cloud image of an unknown structure type coil obtained by FEM. Further, by matching with the characteristics of the magnetic field cloud image of the known coil, the identification of the unknown coil structure type is realized. The effectiveness and accuracy of the proposed method is verified by an example. This algorithm is helpful to extract the characteristics of the coil space magnetic field, and can establish coil space magnetic field models with different structure types and different coil parameters combined with deep learning to guide the matching scheme of the primary and secondary coils, and realize efficient energy transmission.
APA, Harvard, Vancouver, ISO, and other styles
9

Ding, Hui, Xian Xu, and Yaozhi Luo. "Generating Free-Form Grid Truss Structures from 3D Scanned Point Clouds." Mathematical Problems in Engineering 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/5818627.

Full text
Abstract:
Reconstruction, according to physical shape, is a novel way to generate free-form grid truss structures. 3D scanning is an effective means of acquiring physical form information and it generates dense point clouds on surfaces of objects. However, generating grid truss structures from point clouds is still a challenge. Based on the advancing front technique (AFT) which is widely used in Finite Element Method (FEM), a scheme for generating grid truss structures from 3D scanned point clouds is proposed in this paper. Based on the characteristics of point cloud data, the search box is adopted to reduce the search space in grid generating. A front advancing procedure suit for point clouds is established. Delaunay method and Laplacian method are used to improve the quality of the generated grids, and an adjustment strategy that locates grid nodes at appointed places is proposed. Several examples of generating grid truss structures from 3D scanned point clouds of seashells are carried out to verify the proposed scheme. Physical models of the grid truss structures generated in the examples are manufactured by 3D print, which solidifies the feasibility of the scheme.
APA, Harvard, Vancouver, ISO, and other styles
10

Jo, Hyeon Cheol, Hong-Gyoo Sohn, and Yun Mook Lim. "A LiDAR Point Cloud Data-Based Method for Evaluating Strain on a Curved Steel Plate Subjected to Lateral Pressure." Sensors 20, no. 3 (January 28, 2020): 721. http://dx.doi.org/10.3390/s20030721.

Full text
Abstract:
Structural health monitoring (SHM) and safety assessment are very important areas for evaluating the behavior of structures. Various wired and wireless sensors can measure the physical responses of structures, such as displacement or strain. One recently developed wireless technique is a light imaging detection and ranging (LiDAR) system that can remotely acquire three-dimensional (3D) high-precision coordinate information using 3D laser scanning. LiDAR systems have been previously used in geographic information systems (GIS) to collect information on geography and terrain. Recently, however, LiDAR is used in the SHM field to analyze structural behavior, as it can remotely detect the surface and deformation shape of structures without the need for attached sensors. This study demonstrates a strain evaluation method using a LiDAR system in order to analyze the behavior of steel structures. To evaluate the strains of structures from the initial and deformed shape, a combination of distributed 3D point cloud data and finite element methods (FEM) was used. The distributed 3D point cloud data were reconstructed into a 3D mesh model, and strains were calculated using the FEM. By using the proposed method, the strain could be calculated at any point on a structure for SHM and safety assessment during construction.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "FEM Cloud"

1

Törmä, Joel. "Cloud HPC strategies and performance for FEM." Thesis, Uppsala universitet, Avdelningen för beräkningsvetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-279033.

Full text
Abstract:
High precision results for large scientific problems often require immense computational power, an investment which can be expensive and hard to access. Therefore companies are looking to the cloud, where providers are offering highly scalable on-demand computing power, virtual machines, over the internet. An example of this is the Amazon Elastic Compute Cloud (EC2), a service providing virtual machines, instead of direct access to physical computers. This enables a more efficient utilization of computer resources, resulting in affordable and effectively unlimited on-demand computing power. The downside with the cloud resources is heterogeneous and sub-optimal (due to sharing physical resources and virtualization overhead) performance. The findings show that the performance degradation of virtual machines differs depending on how much the resources are being shared with other users. 13-42% degradation for virtual machines are observed using a non-production grade system with the virtualization layer based on a non-optimized version of KVM hypervisor with resource overcommit. Running finite element method, FEM, simulations with COMSOL Multiphysics, a commercial FEM simulation software, on Amazon EC2 proved successful for large simulations, where the runtime for test problems is reduced using up to 16 virtual machines.
APA, Harvard, Vancouver, ISO, and other styles
2

Longo, Rosario Alessandro. "Dalla generazione di modelli 3D densi mediante TLS e fotogrammetria alla modellazione BIM." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13284/.

Full text
Abstract:
La tesi tratta la ricerca di procedure che permettano di rilevare oggetti utilizzando il maggior numero di informazioni geometriche ottenibili da una nuvola di punti densa generata da un rilievo fotogrammetrico o da TLS realizzando un modello 3D importabile in ambiente FEM. Il primo test si è eseguito su una piccola struttura, 1.2x0.5x0.2m, in modo da definire delle procedure di analisi ripetibili; la prima consente di passare dalla nuvola di punti “Cloud” all’oggetto solido “Solid” al modello agli elementi finiti “Fem” e per questo motivo è stata chiamata “metodo CSF”, mentre la seconda, che prevede di realizzare il modello della struttura con un software BIM è stata chiamata semplicemente “metodo BIM”. Una volta dimostrata la fattibilità della procedura la si è validata adottando come oggetto di studio un monumento storico di grandi dimensioni, l’Arco di Augusto di Rimini, confrontando i risultati ottenuti con quelli di altre tesi sulla medesima struttura, in particolare si è fatto riferimento a modelli FEM 2D e a modelli ottenuti da una nuvola di punti con i metodi CAD e con un software scientifico sviluppato al DICAM Cloud2FEM. Sull’arco sono state eseguite due tipi di analisi, una lineare sotto peso proprio e una modale ottenendo risultati compatibili tra i vari metodi sia dal punto di vista degli spostamenti, 0.1-0.2mm, che delle frequenze naturali ma si osserva che le frequenze naturali del modello BIM sono più simili a quelle dei modelli generati da cloud rispetto al modello CAD. Il quarto modo di vibrare invece presenta differenze maggiori. Il confronto con le frequenze naturali del modello FEM ha restituito differenze percentuali maggiori dovute alla natura 2D del modello e all’assenza della muratura limitrofa. Si sono confrontate le tensioni normali dei modelli CSF e BIM con quelle ottenute dal modello FEM ottenendo differenze inferiori a 1.28 kg/cm2 per le tensioni normali verticali e sull’ordine 10-2 kg/cm2 per quelle orizzontali.
APA, Harvard, Vancouver, ISO, and other styles
3

Briggs, Jared Calvin. "Developing an Architecture Framework for Cloud-Based, Multi-User, Finite Element Pre-Processing." BYU ScholarsArchive, 2013. https://scholarsarchive.byu.edu/etd/3813.

Full text
Abstract:
This research proposes an architecture for a cloud-based, multi-user FEA pre-processing system, where multiple engineers can access and operate on the same model in a parallel environment. A prototype is discussed and tested, the results of which show that a multi-user preprocessor, where all computing is done on a central server that is hosted on a high performance system, provides significant benefits to the analysis team. These benefits include a shortened preprocessing time, and potentially higher-quality models.
APA, Harvard, Vancouver, ISO, and other styles
4

Voyantzis, Mitchell D. "CloudMEMS Platform for Design and Simulation of MEMS: Physics Modules & End-to-End Testing." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1533226484963866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sehgal, Anil. "CloudMEMS Platform for Design and Simulation of MEMS: Architecture, Coding, and Deployment." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1532963816803508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Guenane, Fouad Amine. "Gestion de la sécurité des réseaux à l'aide d'un service innovant de Cloud Based Firewall." Thesis, Paris 6, 2014. http://www.theses.fr/2014PA066631/document.

Full text
Abstract:
Le Cloud Computing a évolué au cours de la dernière décennie, passant d’un simple service de stockage à des services plus complexes, en proposant le software comme service (SaaS), les plateformes comme service(PaaS) et très récemment la sécurité comme service (SECaaS).Dans notre travail, nous sommes partis de l'idée simple d'utiliser les ressources offertes par le Cloud avec un faible coût financier pour proposer des nouvelles architectures de service de sécurité. La sécurité des environnements virtuels est un sujet majeur pour le déploiement de l’usage du Cloud. Malheureusement, comme ces environnements sont composés d’un ensemble de technologies déjà existantes, utilisées d'une manière nouvelle, de nombreuses solutions sécuritaires ne sont que des solutions traditionnelles reconditionnées à la problématique Cloud et réseaux virtuels. Le travail effectué dans le cadre de cette thèse vient répondre à la limitation de ressources des équipements physiques de sécurité comme les Firewalls et a pour objectif de proposer de nouveaux services de sécurité composés d’architectures de gestion de la sécurité des réseaux dans le Cloud basé sur le modèle Security as a Service, ainsi que des architectures de management de ces services. Nous avons pris l’initiative de proposer une architecture totalement Cloud-Based. Cette dernière, permet à un Cloud provider de proposer un service de Firewalling à ses clients. Celui-ci leur demande de s’abonner à l’offre en leur garantissant le traitement (analyse) d’une capacité de bande-passante de trafic avec des règles de filtrages fonctionnelles et d’autres proposées par l’abonné. Les résultats obtenus ont démontré les aptitudes de nos architectures à gérer et à faire face à des attaques réseaux de type DDoS et à augmenter la capacité d’analyse en distribuant le trafic sur plusieurs pare-feu virtuels
Cloud computing has evolved over the last decade from a simple storage service for more complex services, offering the software as a service (SaaS) platforms as a service (PaaS) and most recently the security as a service (SECaaS). In our work, we started with the simple idea to use the resources offered by the Cloud with a low financial cost to propose new architectures of security service. The security of virtual environments is a major issue for the deployment of the use of the Cloud. Unfortunately, these environments are composed of a set of already existing technologies used in a new way, many security solutions are only traditional reconditioned solutions to solve the Cloud and virtual networks security issues. The work done in this thesis is a response to the resource limitations of physical security devices such as firewalls and propose new security architectures consist of management of network security in the cloud-based services following Security as a Service model and propose novel architectures for managing these services. We took the initiative to propose a completely Cloud-Based architecture. The latter allows a cloud provider to provide firewalling service to its customers. It asks them to subscribe to the offer by guaranteeing treatment (analysis) with a capacity of bandwidth traffic with functional filtering rules and other proposed by the subscriber. The results demonstrated the ability of our architecture to manage and cope with network DDoS attacks and to increase analytical capacity by distributing traffic over multiple virtual
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Fei [Verfasser], Ramin [Akademischer Betreuer] Yahyapour, Ramin [Gutachter] Yahyapour, Fu [Gutachter] Xiaoming, and Jin [Gutachter] Hai. "Challenges and New Solutions for Live Migration of Virtual Machines in Cloud Computing Environments / Fei Zhang ; Gutachter: Ramin Yahyapour, Fu Xiaoming, Jin Hai ; Betreuer: Ramin Yahyapour." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2018. http://d-nb.info/1160442126/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lazri, Kahina. "Sécurité de la gestion dynamique des ressources basée sur la prise en compte des profils de consommation en ressources des machines virtuelles, dans un cloud IaaS." Thesis, Paris 13, 2014. http://www.theses.fr/2014PA132063/document.

Full text
Abstract:
La virtualisation matérielle telle que mise en oeuvre dans le cloud computing, permet le partage de ressources matérielles entre plusieurs machines virtuelles pouvant appartenir à différents utilisateurs. Ce partage des ressources constitue l’atout majeur de ces infrastructures,qui permet aux fournisseurs d’exploiter plus efficacement les ressources des centres de données, notamment à travers l’allocation dynamique des ressources. Cependant, le partage des ressources introduit de nouvelles contraintes de sécurité. Plusieurs travaux de l’état de l’art ont démontré l’apparition de nouvelles stratégies d’attaques propres aux infrastructures cloud computing, exploitant le partage des ressources. Néanmoins, il a aussi été démontré qu’il est possible de tirer avantage de la position privilégiée de la couche de virtualisation pour offrir une meilleure sécurité que celle assurée dans les plate-formes traditionnelles d’hébergement en silo. Cette thèse poursuit deux axes de recherche complémentaires. Le premier axe traite des nouvelles vulnérabilités liées aux infrastructures cloud computing. Nous avons démontré une attaque que nous appelons attaque par "migrations intempestives de machines virtuelles", dans laquelle un attaquant parvient à amener le système de gestion dynamique de ressources à migrer de façon abusive des machines virtuelles, par simple manipulation des quantités de ressources consommées par des machines virtuelles qui sont sous son contrôle. Nous avons démontré cette attaque sur une plate-forme constituée de cinq serveurs et analysé les conditions nécessaires à son succès ainsi que l’exposition des clusters vis-à-vis de la vulnérabilité qu’elle exploite. Le second axe propose de tirer avantage de la position privilégiée de l’opérateur qui dispose à la fois d’une vue multi-couches plus riche de l’utilisation des ressources et d’une vue plus globale des contextes d’exécution des machines virtuelles, comparativement à la vue limitée de l’utilisateur, pour offrir une meilleure sécurité. Nous avons proposé AMAD (Abusive VM Migration Attack Detection), un système de supervision, chargé de détecter l’occurrence des attaques par migrations intempestives de machines virtuelles et d’identifier de façon automatique celles à l’origine de l’attaque. AMAD est implémenté sur notre plate-forme d’expérimentation et évalué à l’aide de traces de consommation de machines virtuelles collectées sur des clouds réels. Les résultats d’évaluation montrent qu’AMAD opère avec une bonne précision de détection
Hardware virtualisation is the core technology which enables resource sharing among multiple virtual machines possibly belonging to different tenants within cloud infrastructures. Resources haring is the main feature that enables cost effectiveness of cloud platforms, achieved through dynamic resource management. However, resource sharing brings several new security concerns. Several proofs of concepts have demontrated new attack strategies brought by the resource sharing paradigm, known as cross-virtual machine attacks. Even so, it is also showed that the priviligied position of the virtualisation layer can be leveraged to offer better security protection mecanisms than the ones offered in non virtualized platfoms.This thesis follows two main objectives. The first one is related to the domain of cloud-specific vulnerabilities. We have demonstrated a new attack, called the abusive virtual machine migration attack, in which an attacker can leverage the sharing of resources, through the manipulation of the amounts of resources consumed by virtual machines under his control, to abusively enforce the dynamic resource management system to trigger virtual machine migrations. We have demonstrated this attack on a virtualized platform composed of five physical machines, the necessary conditions for the attack to succeed and the vulnerability exposure of clusters against this kind of attack is also analyzed. The second main contribution of this thesis aims at leveraging the privilged position of the cloud provider who has both a more reliable view of the ressource utilisation and a more complete view of the virtual machine execution contexts compared to the limited view of cloud users, to provide better security. We propose AMAD (Abusive Virtual Machine Migration Attack Detection), a system designed for detecting an abusive use of the dynamic virtual machine migration, in the case of the abusive virtual machine migration attack. AMAD identifies the virtual machines possibly at the origin of the attack by analyzing their resource consumption profiles which show fluctuation and correlation in the usage of resources. We have implemented AMAD on top of our laboratory platform and evaluated it with the help of virtual machine resource consumption traces collected from real cloud. Our evaluation results show that AMAD identifes the attacking virtual machines with high detection accuracy
APA, Harvard, Vancouver, ISO, and other styles
9

Wirgot, Nolwenn. "Etude du métabolisme microbien dans les nuages : réponse au stress et impact sur la chimie atmosphérique." Thesis, Université Clermont Auvergne‎ (2017-2020), 2017. http://www.theses.fr/2017CLFAC101/document.

Full text
Abstract:
La phase aqueuse de l’atmosphère et plus précisément les gouttelettes de nuage est un des milieux les plus concentrés et réactifs de l’atmosphère au sein duquel les composés présents peuvent subir de nombreuses transformations, principalement par voie photochimique. De plus, elle a la propriété d’être oxydante due à la présence d’espèces radicalaires telles qu’OH ou HO2 et de composés tels que le peroxyde d’hydrogène et le fer.La présence avérée de microorganismes métaboliquement actifs dans l’atmosphère a soulevé de nombreuses questions et plus récemment sur leur rôle dans les processus atmosphériques. Ces organismes pourraient modifier la composition des nuages en utilisant comme substrat les composés carbonés représentant une part importante des composés présents dans les nuages. De plus, ils sont suspectés de jouer un rôle dans la capacité oxydante des nuages en impactant des composés clés de la réactivité chimique tels que le fer ou le peroxyde d’hydrogène. L’objectif de ces travaux de thèse était de se focaliser sur les interactions des microorganismes avec deux espèces oxydantes de la phase aqueuse des nuages, le fer et le peroxyde d’hydrogène.Tout d’abord, un intérêt particulier a été porté au cycle du fer et à sa complexation dans les nuages, de nature encore très incertaine à ce jour. Dans l’idée d’apporter des premiers éléments de réponse quant à cette complexation, un large screening réalisé sur des microorganismes des nuages a été effectué afin d’évaluer leur capacité à produire des sidérophores. Les résultats obtenus suggèrent l’éventuelle présence de sidérophores dans les eaux de nuage comme molécules chélatantes du fer(III) ce qui pourrait impacter la chimie du fer dans la phase aqueuse des nuages.Il a ensuite été question de s’intéresser au peroxyde d’hydrogène. Dans une première approche, les paramètres et mécanismes responsables de la transformation biotique et abiotique de H2O2 dans les eaux de nuage ont été étudiés, ainsi que ses effets sur le métabolisme énergétique des microorganismes. Dans une deuxième approche, les modifications du métabolisme microbien face à H2O2 ont été approfondies à travers une approche métabolomique. Les résultats ont ainsi suggéré que le peroxyde d’hydrogène module fortement le métabolisme énergétique des microorganismes des nuages. Les microorganismes sont capables de gérer une condition de stress oxydant mais qu’en même temps ce stress induit une réorganisation de leur métabolisme. Il a également été montré que diverses voies métaboliques telles que le métabolisme des sucres, acides carboxyliques, lipides, acides aminés, peptide et glutathion sont impactées.Intégrer ces données biologiques dans des modèles de chimie atmosphérique pour améliorer la quantification de cette modulation sur la chimie atmosphérique apparait comme une des perspectives les plus importantes à envisager. Pour cela, des constantes cinétiques de biodégradation de quatre composés majeurs des nuages ont été déterminées. Les sorties du modèle nous permettront de mieux évaluer l’impact du métabolisme microbien sur la chimie des nuages
The aqueous phase of the atmosphere and, more precisely, cloud droplets is one of the most reactive environments of the atmosphere within which the compounds present can be transformed especially by photochemical reactions. In addition, it contains many radical species such as HO, HO2, hydrogen peroxide or iron which explains its oxidizing power.The presence of metabolically active microorganisms in the atmosphere raised many questions and, currently, on their role in atmospheric processes. These organisms could modify the composition of clouds using carbon compounds as substrate that represented an important part of compounds present in clouds. They are also suspected to play a role in the oxidative capacity of clouds by impacting key compounds of chemical reactivity such as iron or hydrogen peroxide.The objective of this work was to focus on the interactions between cloud microorganisms and two oxidant species of clouds aqueous phase, iron and hydrogen peroxide.First, the cycling of iron and its complexation still very uncertain was studied. In order to provide responses we achieved a screening to evaluate the capacity of cloud microorganisms to produce siderophores. The results obtained suggest the possible presence of siderophores in cloud water as chelating molecules of iron (III) which could have a strong impact on iron chemistry in cloud aqueous phase.Then, we focused on hydrogen peroxide. The parameters and mechanisms responsible for the biotic and abiotic transformation of H2O2 in cloud water were studied, as well as its effects on energetic metabolism of microorganisms. The modifications of the microbial metabolism in the presence of H2O2 were pursued using metabolomics. The results suggest that H2O2 strongly modulate the energetic metabolism of cloud microorganisms. They are able to handle oxidative stress conditions but at the same time this stress induces a reorganization of their metabolism. Various metabolic pathways such as sugar, carboxylic acids, lipids, amino acids, peptide and glutathione metabolism are impacted.One of the important perspectives to consider is the integration of these biological data into atmospheric chemistry models in order to improve the quantification of this modulation on atmospheric chemistry. For this, biodegradation rate constants of four major compounds present in clouds were determined. The output will allow us to assess better the impact of microbial metabolism on clouds chemistry
APA, Harvard, Vancouver, ISO, and other styles
10

Wen, Kuei-Fen, and 温桂芬. "Use of SEM and FCM based Approach for Investigating the Effect of Implementing the Cloud Roll-call System on Student’s Self-Regulation." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/5vmu85.

Full text
Abstract:
碩士
國立虎尾科技大學
資訊管理研究所
102
In this study, it is to investigate the effect of implementing the cloud roll-call system on students’ self-regulation in NFU. Additionally, this study is based on the social cognitive theory, which illustrate the implementation the cloud roll-call system environment, behavior, and interactions among individuals, influencing on students’ self-regulation. To collect the data, a questionnaire-based survey was conducted on the random NFU students. In this study, we delivered 1100 questionnaires, 946 were returned. Research hypotheses were from literature review. SPSS is used as the tool for the descriptive statistics analysis, structural equation modeling with AMOS software is utilized as the tool for the model analysis and fuzzy cognitive map (FCM) is applied as the tool for obtaining the analysis of structural relationships between variables, situational simulation research based on three scenarios.   According to the statistical analysis of the data, it shows that the factor of attitudes is with positive impact on motivation, the factor of subjective norms is with positive impact on the attitudes, and the factor of target identification is with the positive impact on motivation. Also, the factor of learning motivation is with a positive effect on self-regulation, the factor of attitudes has a positive effect on self-regulation, but the factor of self-regulation effects on target identification is not significant. Finally, an FCM is built based on the SEM model, In the computational study, FCM is with three scenarios simulation. It is found that the FCM simulation reached to stable point after 4 time period. Through FCM results, scenario 1 is the best, followed by scenarios 7 and the last is scenarios 6. Based on the findings and recommendations, it is hoped that we can provide future research issues related to the reference to the possible researchers in this research field.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "FEM Cloud"

1

Zhongguo yun de fen bu. Beijing Shi: Qi xiang chu ban she, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. National Aeronautics and Space Administration., ed. [Theory of grain alignment in molecular clouds]: [annual status report, 1 May 1992 - 28 Feb. 1993]. [Washington, DC: National Aeronautics and Space Administration, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. National Aeronautics and Space Administration., ed. [Theory of grain alignment in molecular clouds]: [annual status report, 1 May 1992 - 28 Feb. 1993]. [Washington, DC: National Aeronautics and Space Administration, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Caps, John. Blake Edwards and the High Times. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252036736.003.0006.

Full text
Abstract:
This chapter focuses on Mancini's successful partnership with Blake Edwards. The rising star of Mancini also brought Edwards up in the world. Edwards' success in television more or less assured he could return to the movies with a lot more clout than he had known just a few years before at Universal. The two were a study in contrasts; on the one side, Mancini was curious and disciplined at work, deferential and ingenuous in person, and on the other, Edwards was conceptual and uncompromising in his profession, friendly and explosive and inscrutable in private. That natural clash is almost completely masked in the work they eventually did together, but it would later cause some problems in regard to Mancini's output. Mostly, though, the presence of Blake Edwards in Mancini's career had a wildly positive and prosperous effect. Their notable collaborations include Breakfast at Tiffany's (1961) and The Pink Panther (1964).
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "FEM Cloud"

1

Zhang, Yongwei, Yonghua Wang, Pin Wan, Shunchao Zhang, and Nan Li. "A Spectrum Sensing Method Based on Null Space Pursuit Algorithm and FCM Clustering Algorithm." In Cloud Computing and Security, 231–42. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00006-6_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Piprani, Baba. "An FBM Model of ISO Cloud Computing Architecture." In Lecture Notes in Computer Science, 152–62. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73805-5_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jung, Ju-Hyun, and Wolfgang Schweiger. "Pion-Cloud Contribution to the $$N\rightarrow \varDelta $$ Transition Form Factors." In Recent Progress in Few-Body Physics, 643–47. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-32357-8_101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tzouros, Giannis, and Vana Kalogeraki. "Fed-DIC: Diagonally Interleaved Coding in a Federated Cloud Environment." In Distributed Applications and Interoperable Systems, 55–72. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50323-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lynn, Theo. "Dear Cloud, I Think We Have Trust Issues: Cloud Computing Contracts and Trust." In Palgrave Studies in Digital Business & Enabling Technologies, 21–42. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54660-1_2.

Full text
Abstract:
Abstract Cloud computing is the dominant paradigm in modern computing, used by billions of Internet users worldwide. It is a market dominated by a small number of hyperscale cloud service providers. The overwhelming majority of cloud customers agree to standard form click-wrap contracts, with no opportunity to negotiate specific terms and conditions. Few cloud customers read the contracts that they agree to. It is clear that contracts in cloud computing are primarily an instrument of control benefiting one side, the cloud service provider. This chapter provides an introduction to the relationship between psychological trust, contracts and contract law. It also offers an overview of the key contract law issues that arise in cloud computing and introduces some emerging paradigms in cloud computing and contracts.
APA, Harvard, Vancouver, ISO, and other styles
6

Rudhrra Priyaa, A., E. Rini Tonia, and N. Manikandan. "Resource Scheduling Using Modified FCM and PSO Algorithm in Cloud Environment." In Second International Conference on Computer Networks and Communication Technologies, 697–704. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37051-0_78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gopal, Dinesh, Umasankar Periasamy, and Mohana Periyasamy. "Fuzzy and PID Controllers for Buck-Boost Converter Fed Bridgeless BLDC Motor over Cloud." In International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018, 1328–37. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03146-6_155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wilson, Ann. "Hauntings: Ghosts and the Limits of Realism in Cloud Nine and Fen by Caryl Churchill." In Drama on Drama, 152–67. London: Palgrave Macmillan UK, 1988. http://dx.doi.org/10.1007/978-1-349-25443-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lyons, Valerie. "Justice vs Control in Cloud Computing: A Conceptual Framework for Positioning a Cloud Service Provider’s Privacy Orientation." In Palgrave Studies in Digital Business & Enabling Technologies, 79–104. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54660-1_5.

Full text
Abstract:
Abstract The continued rise in frequency and magnitude of cloud-based privacy breaches brings to the fore the challenges experienced by cloud service providers (CSPs) in balancing the need to maximize profit with the need to maintain data privacy. With a backdrop of the ineffectiveness of regulatory approaches to protecting privacy, this chapter explores privacy from a non-regulatory perspective—instead exploring a CSP’s approach to privacy as dynamics of control and justice. We apply control theory to represent the CSP’s compliance with privacy legislation and power over data, and we apply justice theory to represent the CSP exceeding compliance. Control theories, such as social contract theory, have frequently been applied to explore privacy challenges between organizations and consumers, as too have justice theories e.g. procedural and distributive justice. However, few studies have combined these theoretical concepts to provide a balanced view of these tensions in the cloud computing landscape. Integrating concepts from these theories, we construct a framework that can help to explain and position a CSP’s privacy orientation. Four key privacy orientations emerge in our framework, namely: Risk Managers, Integrators, Citizens and Warriors. We discuss the implications of each privacy orientation for CSPs. Our framework will enable future research to further understand, explore and compare the impact and effectiveness of each privacy orientation.
APA, Harvard, Vancouver, ISO, and other styles
10

Mohamed, H., D. W. Bao, and R. Snooks. "Super Composite: Carbon Fibre Infused 3D Printed Tectonics." In Proceedings of the 2020 DigitalFUTURES, 297–308. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4400-6_28.

Full text
Abstract:
AbstractThis research posits an innovative process of embedding carbon fibre as the primary structure within large-scale polymer 3D printed intricate architectural forms. The design and technical implications of this research are explored and demonstrated through two proto-architectural projects, Cloud Affects and Unclear Cloud, developed by the RMIT Architecture Snooks Research Lab. These projects are designed through a tectonic approach that we describe as a super composite – an approach that creates a compression of tectonics through algorithmic self-organisation and advanced manufacturing. Framed within a critical view of the lineage of polymer 3D printing and high tech fibres in the field of architectural design, the research outlines the limitations of existing robotic processes employed in contemporary carbon fibre fabrication. In response, the paper proposes an approach we describe as Infused Fibre Reinforced Plastic (IFRP) as a novel fabrication method for intricate geometries. This method involves 3D printing of sacrificial formwork conduits within the skin of complex architectural forms that are infused with continuous carbon fibre structural elements. Through detailed observation and critical review of Cloud Affects and Unclear Cloud (Fig. 2), the paper assesses innovations and challenges of this research in areas including printing, detailing, structural analysis and FEA modelling. The paper notes how these techniques have been refined through the iterative design of the two projects, including the development of fibre distribution mapping to optimise the structural performance.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "FEM Cloud"

1

Lin, Haiming, Xiaohu Liu, Wei Fu, and Kangyu Jia. "A Study on Linear Elastic FEM by Cloud Computing." In the Second International Conference. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2556871.2556902.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Huang Zhanpeng, Gong Guanghong, Han Liang, and Song Zijian. "Geometry surface simplication and reconstruction of FEM point cloud." In 2010 International Conference on Computer Application and System Modeling (ICCASM 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccasm.2010.5620131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ospina-Aldana, Gustavo, Mohamed I. Hassan Ali, Hendrik Odendaal, Abdelqader A. Abusafieh, and Wei Woon. "Predictive Shimming of Frame-Panel Assemblies Using FEM and Laser Scanning." In ASME 2019 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/imece2019-11232.

Full text
Abstract:
Abstract This paper presents a predictive shimming methodology based on finite element analysis modeling (FEM) and laser scanning metrology. The aim of the predictive shimming methodology is to provide the geometry of the necessary shims for an assembly beforehand, so the shims can be manufactured in advance and placed on the exact location reducing ergonomic harmful conditions for plant personnel, improving accuracy, reducing the components assembly time and lowering manufacturing cost. The case study for the predictive shimming method is an aircraft torque box assembly (TBA). The interface of interest is the mating surface of the skin and the rib shear ties. A FEM model of the skin was developed to calculate the skin deformation under prescribed displacements at the shimming locations. The FEM model was successfully verified and validated. Using the FEM deformation data, the geometry of the shims needed for an assembly can be calculated. Laser scanning metrology is used to get a point cloud of the assembly, fine-tuning the shims geometry.
APA, Harvard, Vancouver, ISO, and other styles
4

Kaszynski, Alexander A., Joseph A. Beck, and Jeffrey M. Brown. "Experimental Validation of a Mesh Quality Optimized Morphed Geometric Mistuning Model." In ASME Turbo Expo 2015: Turbine Technical Conference and Exposition. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/gt2015-43150.

Full text
Abstract:
High cycle fatigue due to mode localization caused by geometric and material mistuning is one of the leading failure risks of integrally bladed rotors (IBRs). Due to the computational analysis cost of full wheel models, IBR mistuned response amplifications are often modeled with reduced order models (ROMs). However, many developed ROMs are based on nominal mode assumptions that do not consider mode shape variations that have been shown to impact predicted mistuned response. Geometrically mistuned finite element models (FEMs) do account for mode shape variations but are notoriously difficult to construct and analyze. Recent advancements in optical scanning have enabled the rapid acquisition of highly accurate dense point clouds representative of manufactured hardware. Previous research pioneered a novel method to automatically and robustly construct an FEM directly from tessellated scan data, this research adds new mesh quality verification algorithms and experimentally validates this algorithm using results from traveling wave excitation. Sensitivity to mesh and point cloud density are also assessed to determine a best practice for creation of the as manufactured mistuned rotor model.
APA, Harvard, Vancouver, ISO, and other styles
5

Sou, Akira, Shinichi Nitta, and Tsuyoshi Nakajima. "Bubble Tracking Simulation of Cavitating Flow in an Atomization Nozzle." In ASME 2002 Joint U.S.-European Fluids Engineering Division Conference. ASMEDC, 2002. http://dx.doi.org/10.1115/fedsm2002-31018.

Full text
Abstract:
Numerical simulation of transient cavitating flow in a axisymmetric nozzle was conducted in order to investigate the detailed motion of cavitation bubble clouds which may be dominant to atomization of a liquid jet. Two-way coupled bubble tracking technique was assigned in the present study to predict the unsteady cloud cavitation phenomena. Large Eddy Simulation (LES) was used to predict turbulent flow. Calculated pressure distribution and injection pressure were compared with measured ones. Then, calculated motion of cavitation bubble clouds was carefully investigated to understand the cavitation phenomena in a nozzle. As a result, the following conclusions were obtained: (1) Calculated result of pressure distribution along the wall, the relation between injection pressure vs. flow rate, and bubble distribution agreed with existing experimental result. (2) Cavitation bubble clouds were periodically shed from the tail of vena contracta, which usually formed by the coalescence of a few small bubble clouds. (3) Collapse of cavitation bubbles due to the re-entrant jet was observed in the numerical simulation.
APA, Harvard, Vancouver, ISO, and other styles
6

Brown, Jeffrey M., Alex A. Kaszynski, Daniel L. Gillaugh, Emily B. Carper, and Joeseph A. Beck. "Optimization of Airfoil Blend Limits With As-Manufactured Geometry Finite Element Models." In ASME Turbo Expo 2020: Turbomachinery Technical Conference and Exposition. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/gt2020-15481.

Full text
Abstract:
Abstract Conventional airfoil blend repair limits are established using nominal, design intent geometry. This convention does not explicitly consider the inherent blade-to-blade structural response variation associated with geometric manufacturing deviations. In this work, we explore whether accounting for these variations leads to significant differences in blend depths and develop a novel approach to effectively predict blade-specific blend allowables. These blade-specific values maximize the part repairability according to their proximity to defined structural integrity constraints. The methodology is demonstrated on the as-manufactured geometry of an aerodynamic research rig compressor rotor. Geometric point cloud data of this rotor is used to construct as-built finite element models (FEMs) of each airfoil. The effect of two large blends on these airfoils demonstrates the opportunity of blade-specific blend limits. A new approach to determine each airfoil’s blend repair capacity is developed that uses sequential least squares quadratic programming and a parametric blended blade FEM that accounts for manufacturing geometry variations and variable blend geometry. A mesh morphing algorithm modifies a nominal geometry model to match the as-built airfoil surface and blend geometry. The numerical optimization maximizes blend depth values within frequency, mode shape, and high cycle fatigue (HCF) constraint boundaries. It is found that there are large variations in blend depth allowables between blades and competing structural integrity criteria are responsible for their limits. It is also found that, despite complex modal behavior caused by eigenvalue veering, the proposed optimization approach converges. The developed methodologies may be used in the future to extend blend limits, enable continued operations, and reduce sustainment costs.
APA, Harvard, Vancouver, ISO, and other styles
7

Schreve, K., and A. H. Basson. "Edge Detection in Reverse Engineering Using a Virtual CMM." In ASME 2000 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2000. http://dx.doi.org/10.1115/detc2000/dac-14540.

Full text
Abstract:
Abstract This paper describes a method to reconstruct edges, i.e. the intersection curves of adjacent non-tangent surfaces, from point clouds. The method is quick, easy to use and provides accurate results. It does not rely on extending surface patches that were individually fitted to the segments of the point data. Only edges of C1 discontinuity and C0 continuity are considered. The method samples the point cloud by simulating a co-ordinate measurement machine (CMM). The edge detection procedure is semi-automatic and only requires a few simple inputs from the user. The technique can also be implemented as a measurement strategy on a CMM.
APA, Harvard, Vancouver, ISO, and other styles
8

Schoenenborn, Harald, David Grossmann, Wilhelm Satzger, and Herbert Zisik. "Determination of Blade-Alone Frequencies of a Blisk for Mistuning Analysis Based on Optical Measurements." In ASME Turbo Expo 2009: Power for Land, Sea, and Air. ASMEDC, 2009. http://dx.doi.org/10.1115/gt2009-59148.

Full text
Abstract:
Meanwhile the importance of mistuning especially for blisks is well known. Most of the mistuning studies so far done are based on assumed statistical distributions of the eigenfrequencies. But it is important to know the real eigenfrequency distribution of the blades of blisks as they come out of the manufacturing process or after they are in service for some time and have experienced erosion, wear and FOD. Some of the current analytical procedures for mistuning calculations need the blade-alone frequencies, such as the reduced-order code Turbo-Reduce which is used in the subsequent analysis. One way to determine the eigenfrequency distribution is to ping-test every blade while damping all other blades. This procedure is very tedious and may take several days, depending on the number of blades. Further, it is very difficult to eliminate the influence of the disk and to obtain the pure blade-alone eigenfrequencies. In this paper a method for the analytical determination of the eigenfrequency distribution due to geometric imperfections based on optical measurements is described. Starting from the point-cloud from the optical measurements a procedure to obtain a FEM-Model of all blades of a blisk is presented. As the procedure can partly be run as a batch-job, the time to determine the eigenfrequency distribution is drastically reduced compared to the experimental way. The procedure is applied to a real blisk and the calculated eigenfrequencies are compared with the measured frequencies. Then mistuning calculations are performed based on this eigenfrequency distribution.
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, Po Ting, and Yu-Cheng Chou. "Principles on Collaborations in Cloud-Aided X (CLAX)." In ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12882.

Full text
Abstract:
In the past few years, the Computer-Aided Technologies, also known as Computer-Aided X (CAX) have been evolving to the Cloud. Cloud computing provides remote services with data storage, software, platform and infrastructure. The next-generation computing applications rely on the collaborations using the technologies of Cloud-Aided Technologies, or Cloud-Aided X (CLAX). The engineers and designers at various locations in different time zones can collaboratively and simultaneously work on a computing design project using CLAX. Issues such as security, conflict, storage, and online computing are inevitable. This paper presents the challenging problems in cloud-based collaborations and some principles for CLAX.
APA, Harvard, Vancouver, ISO, and other styles
10

Zang, Tiegang, Yongkui Liu, and Xun Xu. "Cloud Manufacturing: An Industry Survey." In ASME 2016 11th International Manufacturing Science and Engineering Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/msec2016-8752.

Full text
Abstract:
The emerging business technology trends such as cloud, Internet of Things, and the new requirements and challenges of future development of manufacturing industry such as green manufacturing and knowledge innovations, have together given rise to a novel cloud-based service-oriented manufacturing business model — cloud manufacturing. Since its inception, cloud manufacturing has attracted much attention of researchers from both academia and industry. As a nascent concept aiming to achieve comprehensive and full resource sharing and e-business collaboration, the success of cloud manufacturing depends heavily on the support and participation of industrial enterprises. However, so far there have been few reports on the status of cloud manufacturing among industrial enterprises. In order to understand the situation of cloud manufacturing in industry, we conducted a survey with respect to its acceptability and application prospect among enterprises located in Jiangsu province, China. This paper presents the results of the survey and some analysis.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "FEM Cloud"

1

Chand, Duli, Rob Newsom, Tyler Thorsen, Erol Cromwell, Chitra Sivaraman, Connor Flynn, John Shilling, and Jennifer Comstock. Aerosol and Cloud Optical Properties from the ARM Raman Lidars: The Feature Detection and Extinction (FEX) Value-Added Product. Office of Scientific and Technical Information (OSTI), August 2019. http://dx.doi.org/10.2172/1560857.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography