Academic literature on the topic 'Software complex SCAD for Windows'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Software complex SCAD for Windows.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Software complex SCAD for Windows"

1

N., G. Kruhlikova, and О. Bannikov D. "RATIONAL DESIGN OF SHORT-SPAN INDUSTRIAL BUILDING ROOFFOR RECONSTRUCTION CONDITIONS." Science and Transport Progress. Bulletin of Dnipropetrovsk National University of Railway Transport, no. 2(80) (May 2, 2019): 144–52. https://doi.org/10.15802/stp2019/165853.

Full text
Abstract:
<strong>Purpose.</strong>&nbsp;Recently, the demand for reuse of industrial buildings that have not been in operation for some time has been increasing in Ukraine. Herewith, quite often the design of their roof requires the complete replacement and renovation by using modern roofing materials to meet the requirements of new government standards. Therefore, the choice and justification of the rational design of steel roof on the example of a short-span industrial building (18-24 m span), which is planned to be returned to exploitation after idle time, is the main goal of this publication. The object of the analysis is an unheated building equipped with bridge cranes of a small capacity (up to 10 tons).&nbsp;<strong>Me</strong><strong>-thodology.</strong>&nbsp;To achieve this purpose, the comparison of structural variants of a roof steel collar tie was performed. Such variants include two types of collar tie cross-section &ndash;a lattice truss and a solid I-girder. The first type was analyzed for four possible types of section of elements &ndash; double angles, a roll-welded square profile, an electric-welded round tube and a rolled round tube. The second type was analyzed for two possible types of section &ndash; rolled I-section made of normal strength steel and fabricated sections of thin-gage high-strength steel. The design variants were compared on the basis of a numerical analysis of their work using the finite element method based on the software complex SCAD for Windows.<strong>&nbsp;Findings.</strong>&nbsp;According to the research results it should be stated that for the conditions of the city of Dnipro the most cost-effective variant of the steel collar tie cross section for the short-span industrial building is the truss made of electric-welded round tubes. Also the construction of collar tie made of roll-welded square profiles or fabricated section of thin-gage high-strength steel is considered quite effective.&nbsp;<strong>Originality.</strong><strong>&nbsp;</strong>The research presented in the publication allows estimating the possibility and economic efficiency of usage for various types of cross-sections for the collar tie of a steel non-insulated roof of the industrial building for the reconstruction conditions in the Dnipro-city.&nbsp;<strong>Practical value.</strong>&nbsp;A practical estimation of mass and cost parameters for steel collar ties of various types has been carried out, and the methodology for conducting such estimation has been substantiated.
APA, Harvard, Vancouver, ISO, and other styles
2

Smirnova, Lyudmila M., Andrey A. Koltsov, and Elnur I. Dzhomardly. "Influence of orthopedic shoes on the indicators of the interzonal load distribution on the foot when walking patients with cerebral palsy." Pediatric Traumatology, Orthopaedics and Reconstructive Surgery 9, no. 1 (2021): 51–61. http://dx.doi.org/10.17816/ptors41766.

Full text
Abstract:
BACKGROUND: Clinical observations of patients with spastic forms of cerebral palsy and surveys showed the most commonly used technical rehabilitative device of this patient contingent are orthopedic shoes. However, almost no clinical and instrumental studies examine the effect of such shoes on the walking characteristics of patients with cerebral palsy (CP).&#x0D; AIM: This study aims to estimate the effect of orthopedic shoes on the interzonal load distribution on the plantar foot surface in children with CP and adolescents with different levels of gross motor function disorders (GMFCS).&#x0D; MATERIALS AND METHODS: Biomechanical studies were conducted in 42 patients with CP 5-16 years old with GMFCS 13 level while wearing standard and orthopedic shoes. In 14 healthy children controls while wearing standard shoes (a total of 112 feet). Biomechanical examinations were performed on the software and hardware complex DiaSled-M-Scan with matrix plantar pressure meters in the form of insoles. Statistical data analysis was performed using nonparametric methods via SPSS software for Windows.&#x0D; RESULTS: The use of complex orthopedic shoes in patients with level GMFCS 1 did not improve but worsened their foot loading parameters. The shoes reduced the loading of the heel, increased the toe-heel load ratio, and mediolateral load distribution in the fascicle area. In patients with GMFCS 2, the positive effect of orthopedic shoes was limited to improving the mediolateral load distribution in the fascicle area. In patients with GMFCS 3, the positive effect of orthopedic shoes was noted in the majority of the tested parameters.&#x0D; CONCLUSION: Thus, the study showed that in children and adolescents with CP using complex orthopedic shoes led to the most significant normalization of interzonal load distribution under the foot in GMFCS 3 patients, less significant in GMFCS 2 patients, and worsened the parameters in GMFCS 1 patients.
APA, Harvard, Vancouver, ISO, and other styles
3

Balani, Zina, and Mohammed Nasseh Mohammed. "Enhancing Cybersecurity against Stuxnet in the Future of Cyberwarfare: A Combined Approach Using Firewalls and Intrusion Detection Systems." International Journal of Science and Business 28, no. 1 (2023): 21–30. http://dx.doi.org/10.58970/ijsb.2202.

Full text
Abstract:
Stuxnet is a highly customized malware developed to destroy centrifuges used in the Iranian nuclear program through SCADA systems. It infects a computer through a USB drive, making it effective for targeting air-gapped networks. Stuxnet is larger and more complex than an equivalent worm; it is created in several different programming languages, and some components are encrypted. The malware utilizes four unprecedented zero-day vulnerability attacks that exploit application security vulnerabilities before developers become aware of the vulnerability. Additionally, it employs advanced rootkit technology to conceal itself from users and antimalware software on both Windows and the control computer it targets. To strengthen cybersecurity, this study implemented and configured a combination of firewalls and intrusion detection systems (IDS) to enhance security against the Stuxnet malware. By integrating these security measures, the aim was to establish a robust defense against the sophisticated attack methods employed by Stuxnet. It is essential to continuously update and adapt these security measures as the threat landscape evolves. By remaining vigilant and proactive, organizations can effectively safeguard their systems from sophisticated threats like Stuxnet, bolstering their cybersecurity defenses.
APA, Harvard, Vancouver, ISO, and other styles
4

Regeniter, Axel, Jürg U. Steiger, André Scholer, Peter R. Huber, and Werner H. Siede. "Windows to the Ward: Graphically Oriented Report Forms. Presentation of Complex, Interrelated Laboratory Data for Electrophoresis/Immunofixation, Cerebrospinal Fluid, and Urinary Protein Profiles." Clinical Chemistry 49, no. 1 (2003): 41–50. http://dx.doi.org/10.1373/49.1.41.

Full text
Abstract:
Abstract Background: Automated laboratory analyzers that mass produce data have been linked to information systems for more than two decades, but little progress has been made in developing more comprehensible report forms. Results are still reported in computer-generated printouts containing hundreds of numbers crowded into columns on each printed page. Methods: We developed three software applications focusing on the graphic presentation of laboratory results. Results: The first application summarizes data for a patient with a monoclonal gammopathy. The report provides a cumulative graphic presentation of immunofixation/electrophoresis data without any additional interpretation, focuses on a color-coded electrophoresis scan, and records up to 5 years on a single page. The second application deals with cerebrospinal fluid analysis. The report calculates relevant data and graphs the complex relationship between albumin and immunoglobulin results from paired serum and cerebrospinal fluid samples. Manually added interpretive text assures an output comprehensible to clinicians in all specialties. The third application produces a report summarizing quantitatively measured urinary marker protein profiles. The report form is generated by a flexible, completely user-definable knowledge-based system. It calculates numerous ratios and formulae, supports reflex testing, supplies an automated interpretation, and generates a specific graphic signature pattern of the results (MDI LabLink proteinuria differentiation). Conclusions: Increased clinical demand for graphically oriented report forms 5 years after their introduction has provided evidence that these reports transfer complex laboratory data and results to the clinician more effectively. The highest (more than threefold) increase in demand has been for reports for urinary marker protein profiles that feature a largely self-explanatory graphic signature pattern.
APA, Harvard, Vancouver, ISO, and other styles
5

D. O. Bannikov and A. E. Huslista. "Correcting accounting results of tensions using fem by Hss method." Science and Transport Progress, no. 38 (September 25, 2011): 134–41. http://dx.doi.org/10.15802/stp2011/6824.

Full text
Abstract:
The usage of the Hot Spot Stress (HSS) method by means of linear surface extrapolation (LSE) approach was analyzed for the correction of results of the Finite-Element Method (FEM) in case of singularity of stresses. The given examples of structures and testing examples were computed on the base of design-and-computation software SCAD for Windows (version 11.3).
APA, Harvard, Vancouver, ISO, and other styles
6

Voskresenskiy, Michail, Victor Mikhaylov, and Oleg Pakhmurin. "Modelling and validation of dynamic parameters and material heterogeneous damping properties of foundation structures and subsoils." EPJ Web of Conferences 221 (2019): 01008. http://dx.doi.org/10.1051/epjconf/201922101008.

Full text
Abstract:
In this paper, an integrated technology for performing finite element calculations in SCAD Office FEA-software with instrumental verification of actual dynamic characteristics of load-bearing structures and subsoils with the use of seismic hardware-software complex REGISTR is proposed.
APA, Harvard, Vancouver, ISO, and other styles
7

Elsmore, Timothy F., Frederick W. Hegge, Paul Naitoh, Tamsin Kelly, and Dave Ryman. "WinCD: Windows Software for Complex Demodulation." Chronobiology International 12, no. 4 (1995): 248–56. http://dx.doi.org/10.3109/07420529509057273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Petrenko, V. D., O. L. Tiutkin, I. O. Sviatko, and A. M. M. Alhdur. "COMPLEX ANALYSIS OF SUBGRADE STRESS-STRAIN STATE WITH COMBINED STRENGTHENING." ACADEMIC JOURNAL Series: Industrial Machine Building, Civil Engineering 1, no. 48 (2017): 165–74. http://dx.doi.org/10.26906/znp.2017.48.790.

Full text
Abstract:
The paper highlights combined techniques of strengthening that include geotextile laying as well as other related advanced technologies. Subgrade construction analysis and its modification, reinforced with the different types and options of combined strengthening were conducted. To justify strengthening of subgrade a series of numerical calculations were made. Simulation with software package SCAD has confirmed the experimental results. From obtained results one can conclude that minimum horizontal displacements are observed in the version with deepening of geotextile at 1m and vertical ones at 0.4 m. Based on simulation results it is possible to make recommendations concerning modernization of existing subgrade and construction of new one in complex engineering-geological conditions
APA, Harvard, Vancouver, ISO, and other styles
9

Bannikov, Dmytro Olegovitch, Anatoliy Valentinovitch Radkevich, and Nataliya Anatoliivna Nikiforova. "Features of the Design of Steel Frame Structures in India for Seismic Areas." Materials Science Forum 968 (August 2019): 348–54. http://dx.doi.org/10.4028/www.scientific.net/msf.968.348.

Full text
Abstract:
This article is devoted to the analysis of one of the most common structural designs of the steel frame of small spans, currently used in India in construction and reconstruction for seismic areas. This scheme constructively involves the implementation of the main bearing elements - bolts and columns - in the form of a spatial truss box section. At the same time, rather simple rolling profiles from small-sized corners are used, as well as a round steel bar. The studies performed by the authors were carried out using the finite element method based on the national design computing complex SCAD for Windows. The loads, as well as the geometrical characteristics of the profiles, were taken according to the current building standards of India. Based on the results of the analysis, a number of recommendations were formulated to improve the efficiency of the considered design scheme for seismic effects of varying intensity.
APA, Harvard, Vancouver, ISO, and other styles
10

Bernard, Alimuddin, Sahid, and Ilham Minggi. "MODELING DAN PENYELESAIAN MASALAH PROGRAM LINEAR DENGAN POM-QM FOR WINDOWS." Ininnawa : Jurnal Pengabdian Masyarakat 1, no. 1 (2023): 107–15. https://doi.org/10.26858/ininnawa.v1i1.189.

Full text
Abstract:
Today the use of software has developed in various fields of human life, including the world of education. These developments also have an impact on learning mathematics in general and linear programming as part of mathematics. The software on the computer that is used to solve problems in linear programming material is POM-QM FOR WINDOWS. POM-QM for Windows is a software that can be used to solve various problems related to linear programming material, ranging from very simple problems to more complex problems that are difficult to solve manually. With this software, it is hoped that it can facilitate the process of learning linear program material carried out by teachers in schools. To be able to solve these linear programming problems both manually and by using the POM-QM for Windows software, then of course these problems must be made/formulated in the form of a mathematical model through the model formulation process or what is commonly known as modeling. Modeling is the process of translating real/everyday problems (linear programming problems) into mathematical language (abstract problems).
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Software complex SCAD for Windows"

1

Láruson, Áki Jarl, and Floyd Allan Reed. Population Genetics with R. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198829539.001.0001.

Full text
Abstract:
Population genetics is an inherently quantitative discipline. Because the focus of population genetics studies is usually on abstract concepts like the frequencies of genetic variants over time, it can at first glance be difficult to conceptualize and appropriately visualize. As more and more quantitative models and methods have become established in the discipline, it has become necessary for people just entering the field to quickly develop a good understanding of the many layers of complex approaches, so as to correctly interpret even basic results. An unfortunate side effect of the widespread implementation of ready-to-use quantitative software packages is that some facets of analysis can become rote, which at best might lead to implementation without the full understanding of the user and at worst, inappropriate application leading to misguided conclusions. In this book a “learning by doing” approach is employed to encourage readers to begin developing an intuitive understanding of population genetics concepts. The analytical software R, which has increasingly been the program of choice for early exposure to basic statistical programming, is freely available online, has cross-platform compatibility (Windows, Mac, and Linux all support distributions of R), and offers the potential for hands-on implementation by the students, in addition to using pre-packaged functions.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Software complex SCAD for Windows"

1

Stojanović, Boban, Nikola Milivojević, Miloš Ivanović, and Dejan Divac. "Dot Net Platform for Distributed Evolutionary Algorithms with Application in Hydroinformatics." In Advances in Systems Analysis, Software Engineering, and High Performance Computing. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5784-7.ch015.

Full text
Abstract:
Real-world problems often contain nonlinearities, relationships, and uncertainties that are too complex to be modeled analytically. In these scenarios, simulation-based optimization is a powerful tool to determine optimal system parameters. Evolutionary Algorithms (EAs) are robust and powerful techniques for optimization of complex systems that perfectly fit into this concept. Since evolutionary algorithms require a large number of time expensive evaluations of candidate solutions, the whole process of optimization can take huge CPU time. In this chapter, .NET platform for distributed evaluation using WCF (Windows Communication Foundation) Web services is presented in order to reduce computational time. This concept provides parallelization of evolutionary algorithms independently of geographic location and platform where evaluation is performed. Hydroinformatics is a typical representative of fields where complex systems with many uncertainties are studied. Application of the developed platform in hydroinformatics is also presented in this chapter.
APA, Harvard, Vancouver, ISO, and other styles
2

Bhardwaj, Akashdeep, Pradeep Singh, and Ajay Prasad. "Constructing A Robust Digital Forensics Environment." In Practical Digital Forensics: A Guide for Windows and Linux Users. BENTHAM SCIENCE PUBLISHERS, 2024. https://doi.org/10.2174/9789815305579124010004.

Full text
Abstract:
Establishing a Digital Forensic laboratory is paramount in modern investigative practices. This chapter delineates the essential components and procedures necessary for setting up an effective Digital Forensic lab. It covers various aspects, including infrastructure requirements, hardware, and software provisioning, as well as the implementation of standardized procedures and protocols. Additionally, it discusses the significance of maintaining the integrity and security of Digital evidence throughout the Forensic process. By offering practical insights and recommendations, this chapter aims to empower Forensic practitioners with the knowledge and resources required to establish a robust Forensic laboratory capable of addressing the complex challenges of Digital investigations in today's Digital landscape.
APA, Harvard, Vancouver, ISO, and other styles
3

Dawson, Maurice, Imad Al Saeed, Jorja Wright, and Festus Onyegbula. "Open Source Software to Enhance the STEM Learning Environment." In Handbook of Research on Education and Technology in a Changing Society. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-6046-5.ch042.

Full text
Abstract:
This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to commercial products such as Microsoft Office Suite and Adobe Photoshop. Second, creating Virtual Machines (VMs) is another avenue to teach complex concepts in computer science, engineering, and Information Technology (IT). Third, cloud computing is an inexpensive way for clients to access information from multiple locations and devices. Fourth, universities can use the Operating System (OS) Linux and its various distributions as replacements for commercial operating systems like Windows in order to reduce IT costs. Lastly, open source programming languages like Python and their associated Integrated Development Environments (IDEs) provide comprehensive facilities for software engineers for application development or testing.
APA, Harvard, Vancouver, ISO, and other styles
4

Dawson, Maurice, Imad Al Saeed, Jorja Wright, and Festus Onyegbula. "Open Source Software to Enhance the STEM Learning Environment." In Open Source Technology. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-7230-7.ch075.

Full text
Abstract:
This chapter examines the use of Open Source Software (OSS) technologies that can be used to improve the learning of Science, Technology, Engineering, and Mathematics (STEM). Explored are the various methods that can be utilized to improve the percentage of STEM majors in the American educational system with resources such as: Open Source as Alternative (OSALT), virtualization, cloud computing, Linux distributions, open source programming, and open source hardware platforms. Increasing the amount of students that pursue STEM majors is important because the projected job growth in the STEM field compared to non-STEM jobs is 33%. OSALT provides cost-effective alternatives to commercial products such as Microsoft Office Suite and Adobe Photoshop. Second, creating Virtual Machines (VMs) is another avenue to teach complex concepts in computer science, engineering, and Information Technology (IT). Third, cloud computing is an inexpensive way for clients to access information from multiple locations and devices. Fourth, universities can use the Operating System (OS) Linux and its various distributions as replacements for commercial operating systems like Windows in order to reduce IT costs. Lastly, open source programming languages like Python and their associated Integrated Development Environments (IDEs) provide comprehensive facilities for software engineers for application development or testing.
APA, Harvard, Vancouver, ISO, and other styles
5

Barbucha Dariusz. "An Agent-Based Cooperative Population Learning Algorithm for Vehicle Routing Problem with Time Windows." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2013. https://doi.org/10.3233/978-1-61499-254-7-159.

Full text
Abstract:
Population-based metaheuristics, mostly inspired by biological or social phenomena, belong to a widely used class of approaches suitable for solving complex hard optimization problems. Their effectiveness has been confirmed for many real-time instances of different optimization problems. This paper proposes an Agent-Based Cooperative Population Learning Algorithm for the Vehicle Routing Problem with Time Windows, where the search for solutions is divided into stages, and different learning/improvement procedures are used at each stage. These procedures are based on a set of heuristics (represented as software agents) which are run under the cooperation schemma defined separately for each stage. Computational experiment, which has been carried out, confirmed the effectiveness of the proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
6

Nguyen Jean-Michel, Six Patrick, Antonioli Daniel, Lombrail Pierre, and Beux Pierre Le. "Beds Simulator 1.0: a software for the modelisation of the number of beds required for a hospital department." In Studies in Health Technology and Informatics. IOS Press, 2003. https://doi.org/10.3233/978-1-60750-939-4-310.

Full text
Abstract:
The determination of the number of beds needed for a hospital department is a complex problem that try to take into account efficiency, forecasting of needs, appropriateness of stays. Health authority used methods based on ratios that do not take into account local specificities and use rather to support an economic decision. On the other side, the models developed are too specific to be applied to all type of hospital department. Moreover, all the solutions depend on the LoS (Length of Stay). We have developed a non parametric method to solve this problem. This modelisation was successfully tested in teaching and non teaching hospitals, for an Intensive Care Unit, two Internal Medicine and a surgical departments. A software easy to use was developed, working on Windows available on our website www.sante.univnantes.femed/stat/
APA, Harvard, Vancouver, ISO, and other styles
7

Rahman, Nayem, and Dale Rutz. "Building Data Warehouses Using Automation." In Rapid Automation. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8060-7.ch034.

Full text
Abstract:
Software development is a complex endeavor. While significant benefits can be achieved, the process is often laborious, time consuming and error prone requiring multiple iterations in order to achieve the desired result. Issues arise for numerous reasons – coding defects, unclear requirements, migration challenges, lack of convention, and inadequate testing to name a few. When convention and automation are introduced into the software development lifecycle there are significantly fewer opportunities for failure. Automation also allows for shorter development windows. Generally there are fewer errors throughout testing, with the bulk of those being found in unit and functional testing, far before the users get involved in systems acceptance testing. A data warehouse consists of multiple subject areas in which many tasks are common and should be automated for the sake of efficiency and enforcing convention. This article discusses a set of tools that can be used to automate writing data warehouse objects. The article also provides statistics of time saved using automation.
APA, Harvard, Vancouver, ISO, and other styles
8

Deore, Mahendra, and Chhaya S. Gosavi. "File Content-based Malware Classification." In Artificial Intelligence, Machine Learning and User Interface Design. BENTHAM SCIENCE PUBLISHERS, 2024. http://dx.doi.org/10.2174/9789815179606124010014.

Full text
Abstract:
Malicious Software (MALWARE) is a serious threat to system security the moment any electronic gadget or ‘Thing’ is connected to the World Wide Web (WWW). The malware - stealthy software that is used to collect sensitive information gains access to private systems and can disrupt device operation. Thus, malware acts against the user requirement and is a threat to all operating systems (OS), but more to Windows and Android systems, as those are the most widely used OS. Malware developers try to invade the system by means of viruses, adware, spyware, ransomware, botware, Trojans, etc. Developers try different anti-forensic techniques so that malware cannot be detected or investigated. Malware developers typically play ‘peekaboo’ with the malware investigators. The result is that investigating such attacks becomes more complex, and many times it fails because of immature forensics methodology or a lack of appropriate tools. This chapter is the first step towards analysing malware. The process started with malware dataset collection and understanding the same. ML has two basic blocks, i.e., feature extraction and classification. In the case of supervised learning, this feature plays a significant role. This asks for understanding features and their effect on classification, which was a major task. Two separate experimental processes were explored. The first one involved extracting n-grams from the binary files using the kfNgram tool, and the second one used a shell script to parse the assembly files for method calls to external API libraries. Several supervised machine learning classifiers like Decision Trees, SVM, and Naive Bayes were used to classify the malware family based on extracted features. We proposed a method to classify malware into nine families as per the Kaggle dataset. It analyses the n-gram of the malware file to generate the feature vector. Here, the value of ’n’ in n-gram is selectable; presently, it is four. The objective was to extract highly probable n-grams from the binary files after pre-processing, i.e., calculating the IG parameter. The present threshold for selecting n-gram from the top-most lists is five hundred. It has been observed that SVM and Decision trees provide accuracy on the scale of 98%. Nevertheless, there are chances of improvement as there is a probability of selecting irrelevant n-grams due to the sequential selection of n-grams. This method is considered a starting point for malware classification.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Software complex SCAD for Windows"

1

Specht, Fred R. "Control Systems for Induction Heat Treating: Obsolete Methods and the Newest Designs." In HT 2013, edited by B. Lynn Ferguson. ASM International, 2013. https://doi.org/10.31399/asm.cp.ht2013p0081.

Full text
Abstract:
Abstract This paper examines the evolution and current state of induction heat-treating system controls, ranging from the rudimentary timer and push-button configurations to sophisticated computer systems integrating color touch screens with programmable logic controllers (PLCs). It addresses the challenges of maintaining aging systems, particularly when obsolete components such as PLCs, monitors, or keypads fail and halt production. The discussion encompasses replacement options, upgrade pathways, and emerging control technology and software trends. The presentation provides a comprehensive overview of various control systems employed in induction heat-treating equipment for static and scan hardening applications. The evolution of control technology is traced from mechanical systems to modern computing platforms, including cam bar scanners, Multiplex units, thumb wheel and digital timers, digital counters, microprocessors, and Windows-based computer systems—all explained in accessible terminology. We illustrate the progression from handwritten setup sheets to EPROM chips and contemporary data communication methods. Current capabilities include virtually unlimited storage capacity via Ethernet connections (wired or wireless) for part recipes, quality assurance protocols, and maintenance schedules, with USB flash drives offering convenient options for recipe modifications and backup procedures. We also review static heat lift-rotate fixtures utilizing hard-wired relay controls and cascading timer arrays, discussing their current applications. Finally, we provide guidance on determining cost-effective upgrade options versus complete replacement, balancing customer requirements with future technological developments.
APA, Harvard, Vancouver, ISO, and other styles
2

Srinivasan, Sridhar, Pierre Constantineau, and Kwei Meng Yap. "Improved Mechanical Integrity through Real-Time Process Monitoring and Predictive Analytics." In CORROSION 2019. NACE International, 2019. https://doi.org/10.5006/c2019-13286.

Full text
Abstract:
Abstract Refinery operators face increasingly complex challenges in managing integrity of process units and assets – driven by the goal to achieve operational excellence and maximize asset performance while minimizing costs and maintaining the highest safety and environmental standards. Such challenges stem from multiple operational factors, including changing process feed, driven by opportunity crudes and throughput, need to work with more complex process dynamics and difficulties associated with correlating potential corrosion damage to process parameters across different refinery units in a real-time framework. A novel software framework incorporating intelligent predictive analytics linked to process historian has been created to provide refinery operators with the ability to see corrosion damage in real time. Built on decades of intense experimental corrosion data and predictive model development through Joint Industry Programs (JIP), this framework offers first-of-its-kind insights to proactively manage unit operations, optimize throughput management and derive enhanced mechanical integrity through real-time linkages to process data. The system also enables easy implementation of industry-best practices through support for digitized API RP584 (Integrity Operating Windows) and API RP970 (Corrosion Control Documents).1, 2 This paper provides an overview of the predictive analytics technology foundational to the software and describes the implementation of software based corrosion prediction framework at multiple refinery sites as well as the benefits of pre-emptive, proactive corrosion monitoring through a real time ‘software sensor’ framework. This prediction framework leverages information already existing within the DCS and process historian infrastructure and provides the reliability group with a real-time dashboard presenting corrosion rates, piping circuit wall thicknesses and inspection planning information. Such an approach has quantified profitability benefits stemming from flexibility in processing opportunity crude slates while enhancing real time mechanical integrity and reliability management of critical refinery units.
APA, Harvard, Vancouver, ISO, and other styles
3

Lysenko, Maxim A., and Alexandra A. Kravtsova. "Analysis of the fire resistance of structures on the example of the construction of a building of a sports and recreation complex in the village Tambovka, Amur region." In Agro-industrial complex: problems and prospects of development. Far Eastern State Agrarian University, 2024. https://doi.org/10.22450/978-5-9642-0635-4-123-127.

Full text
Abstract:
The article shows the results of calculating the effects of elevated temperatures, taking into account the joint work of building structures of a frame structure on non-design loads. The calculation was performed in the SCAD++ software package.
APA, Harvard, Vancouver, ISO, and other styles
4

Tanaka, Kenichi, Minoru Uehara, Makoto Murakami, and Motoi Yamagiwa. "Office Grid Based on Windows PCs." In 2009 International Conference on Complex, Intelligent and Software Intensive Systems (CISIS). IEEE, 2009. http://dx.doi.org/10.1109/cisis.2009.72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mactaggart, Ross H., and Richard M. Myers. "PC Based Leak Detection." In 1996 1st International Pipeline Conference. American Society of Mechanical Engineers, 1996. http://dx.doi.org/10.1115/ipc1996-1920.

Full text
Abstract:
Software based leak detection has a reputation of being very complex and requiring large amounts of computing power to be effective. This makes it impractical for application on small pipelines. This paper will discuss implementation of a software based leak detection system on a small crude oil gathering pipeline. The leak detection system uses a more practical approach to the problem than traditional methods and was implemented on a PC under the Windows operating system.
APA, Harvard, Vancouver, ISO, and other styles
6

Hassan, Mohamed Ali, Jim Strand, and Per Inge Remmen. "Cloud-Based Software for Automated Well Planning." In Gas & Oil Technology Showcase and Conference. SPE, 2023. http://dx.doi.org/10.2118/214075-ms.

Full text
Abstract:
Abstract The Automatic Well Design workflow presented in this paper is a starting step to achieve Well Construction Autonomy. This workflow made possible through modern "API" based drilling calculation engines hosted on a cloud computing environment. In the Drilling Digitalization Infrastructure, everything will be connected via Open APIs, and Real time Machine-to- Machine Communication. Modern Cloud-Based Applications will enable Engineers, within seconds, to automatically execute complex drilling simulations and calculations This software tool, named WellDesign, is a cloud based single page application utilizing networks and cloud computers for data storage and collaboration. It offers a set of application programming interfaces (API), enabling machine-to-machine communication &amp; 100% automation, where whole or parts of the software can be operated by other computers. On top of this interface, the software tool has a 2D and 3D human graphical user interface, utilizing web technologies such as accelerated 2D (Canvas, 3D.js) and 3D (WebGL, three.js) graphics. This software tool aims to run on all kinds of computers (Windows, Macs) and other interactive devices supporting modern web browsers (tablets, phones and similar). Well Construction Automation is gradually becoming more prominent in oil &amp; gas industry. It encompasses the application of digital technology in all aspects of well drilling and completion (i.e., automatic well design, digitalization of downhole tools &amp; surface equipment, remote monitoring, real time data transmission, and robotic rig systems). In today's Industry 4.0 transformation world, easy-to-use cloud-based software can partially automate Oil &amp; Gas wells design. Future software development should be made to produce fully autonomous Oil &amp; Gas well designs while maintaining industry safety &amp; well integrity standards The Automatic Well Design workflow presented in this paper is a starting step to achieve Well Construction Autonomy. This workflow made possible through modern "API" based drilling calculation engines hosted on a cloud computing environment. In the Drilling Digitalization Infrastructure, everything will be connected via Open APIs, and Real time Machine-to- Machine Communication. Modern Cloud-Based Applications will enable Engineers, within seconds, to automatically execute complex drilling simulations and calculations Two automatic design workflows shall be illustrated in detail: Automatic Well Trajectories Automatic Casing Design
APA, Harvard, Vancouver, ISO, and other styles
7

Mistry, S. I., and S. S. Nair. "Development of a Design Tool Incorporating Neural Networks." In ASME 1992 International Computers in Engineering Conference and Exposition. American Society of Mechanical Engineers, 1992. http://dx.doi.org/10.1115/cie1992-0009.

Full text
Abstract:
Abstract A software environment is described which uses MS Windows and neural networks for design problems involving complex nonlinear relationships. This paper reports initial results in the development of the program using an example case of selection and design of coupler curves. The flexible user interface and fast neural network models described can be expanded to include the specific design features of a particular application.
APA, Harvard, Vancouver, ISO, and other styles
8

Nešković, Đorđe, Marko Marković, Lara Kašca, et al. "Proposition of laboratory equipment and its utilisation for complex battlefield IP network simulation." In 11th International Scientific Conference on Defensive Technologies - OTEX 2024. Military Technical Institute, Belgrade, 2024. http://dx.doi.org/10.5937/oteh24070n.

Full text
Abstract:
This paper gives a proposition for laboratory equipment and its use for simulation of effects of network topology and link state reconfiguration during battlefield operations. All equipment presented in this paper is based on open source software solutions and well-known hardware development platforms in order to minimize equipment cost as well as provide a simulation environment that is independent of any single manufacturer. Utilization of open source solutions gives us a level of security as it lessens a chance of traditional vendor abuse in more unfortunate circumstances. The core of the laboratory is based on a GNS3 simulator, which can be installed on all three major operating systems (Linux, Windows and Mac) and has the capability of simulating a network that can be added in between two physical end devices that we wish to test in various battlefield scenarios using highly available network adapters. In addition to that, we will focus on network intermediate devices (switches and routers) that are not dependent on any single manufacturer and are open source solutions that can be used for future development of secure and fully-known equipment. We present expected results for the transition of encrypted and unencrypted traffic.
APA, Harvard, Vancouver, ISO, and other styles
9

Kupershtein, Leonid M., Mykhailo D. Krentsin, and Andrii V. Prytula. "Use of peer-to-peer networks for secured communication." In 16th IC Measurement and Control in Complex Systems. VNTU, 2022. http://dx.doi.org/10.31649/mccs2022.20.

Full text
Abstract:
Peculiarities of the applied application of peering networks are considered (every node is equal; it can be both a client and a server). Mathematically, a decentralized network can be represented as a graph. The reasons for the emergence of peering networks are analyzed (low load on the client processor, the need to provide access to data and joint work on data). The classification of P2P networks according to three characteristics (functions, degree of centralization and method of connection) is also considered. The relevance and perspective of their application for personal communication, especially for data exchange within the company (required data security, fault tolerance and independence from Internet access) are determined.&#x0D; A peering network organization model is proposed, which provides for increased data security (messages, files, audio, user settings, etc.), reliable authentication of nodes (based on a combination of manual key distribution and trust network principles), scalability of the network itself and expansion of its functional capabilities (sending text, files, support for audio, video, etc.). The software implementation should work on most modern devices and operating systems (Android, IOS, Windows, MacOS). The created model makes it possible to increase security due to the combination of various cryptographic algorithms and data exchange protocols. Data exchange is based on the Tox protocol, which involves the use of distributed hash tables and asymmetric encryption. Data transport using the Tox protocol is organized based on TCP and UDP. A graphic representation of the above-described model is given, as well as a key exchange scheme between nodes. The data is also stored at the node in a protected form, and it can be read only if the key is present.
APA, Harvard, Vancouver, ISO, and other styles
10

Piroi, Cristina, and Irina Cristian. "SOFTWARE APPLICATION USED AS TEACHING INSTRUMENT FOR TECHNOLOGICAL DESIGN IN SPINNING MILL." In eLSE 2015. Carol I National Defence University Publishing House, 2015. http://dx.doi.org/10.12753/2066-026x-15-270.

Full text
Abstract:
Nowadays, the manufacture of textile products has become a highly competitive activity and the success across the global textile market depends on many factors. Higher productivity, increased flexibility, constant quality products and quick response to the market requirements are competitive advantages that companies can achieve by using IT instruments. Production of high quality yarns is based on an assembly of technological and mechanical factors that are closely correlated with the characteristics of processed raw material. Designing the manufacturing technology in spinning mills is an important stage within the complex process of yarn manufacturing. It aims at obtaining the spinning plan that ensures the coordination of the equipment's operating parameters and the correlation of its production capacities. Establishing the spinning plan parameters requires a large amount of work and assumes extended knowledge concerning the raw material characteristics, the spinning technology, the type and technical performances of the equipment, the level of yarns quality. Given the diversity and the large volume of data and calculations required to achieve the spinning plan, the efficiency of this activity may be increased by using specialized software designed for this purpose. This paper presents a software application used as a teaching instrument for technological design in spinning mills. The PFirLB software gathers all the information and provides the tools required to design the manufacturing technology in tow spinning mills. It is used for student training in order to teach them the skills for technological design, required by their future work as engineers in a spinning mill. The software was created with Microsoft Visual Basic and Visual C++ and runs in a Windows environment.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography