scholarly journals Ladder Slide Out: First Order Analysis

Author(s):  
Ralph L. Barnett

Abstract One of the more important collapse modes for straight, combination, and extension ladders is base slide out; the top of the ladder slides down the support wall as the base slips away from it. Various fundamental models have been used to study this behavior. This paper revisits the analytical solutions associated with these models and describes their implications for the analysis, design, and testing of ladders.

2011 ◽  
Vol 243-249 ◽  
pp. 1405-1408
Author(s):  
Bo Li ◽  
Shao Bin Hu ◽  
Ya Xin Sun ◽  
Yan Wang

The deficiency of effective length approach and the necessity of second order analysis design on nonferrous engineering steel industrial plant are emphasized. Second order analysis approach by nonlinear finite-element with ANSYS is used to design an industrial plant. The example indicates that second-order effect should not be neglect and the result of first order analysis is not safe enough for industrial plant.


2004 ◽  
Author(s):  
Yasuaki Tsurumi ◽  
Hidekazu Nishigaki ◽  
Toshiaki Nakagawa ◽  
Tatsuyuki Amago ◽  
Katsuya Furusu ◽  
...  

2019 ◽  
Vol 22 ◽  
pp. 122-129 ◽  
Author(s):  
Gabriel Stockdale ◽  
Gabriele Milani

2012 ◽  
Vol 588-589 ◽  
pp. 359-363
Author(s):  
Jian Ping Sun ◽  
Jian Xin Wang

the columns of magnetostrictive transducer for the object, the establishment of a Radiant Panel in magnetostrictive rods through the spring of motion model, gives a method for solving first-order analysis and solutions, discusses the spring rate on radiation effect of amplitude. On reasonable determination of Radiant Panel structure, the size of the transducer, and optimization methods.


2017 ◽  
Vol 8 (1) ◽  
Author(s):  
Ferdian Aditya Pratama ◽  
Eko Sediyono

Abstract. The user involvement in information system development has an important role to develop some systems. The user involvement also has an important role to determine whenever the system is executed properly or not. SDLC is a procedure used to describe a process that occurs during the manufacturing the system. SDLC Process has some phases, they are Project Selection & Planning, Analysis, Design, and Testing & Deployment. The Objective of this study is to understand how much percentage from the user involvement that occur during the information system developing process. The result from this paper is an analysis result from the user involvement that occurs during the information system developing using the SDLC model.Keywords: Information System, SDLC, User Involvement. Abstrak. Peranan dari user terhadap pengembangan sebuah sistem informasi memiliki peranan yang penting dalam proses pembuatan sebuah sistem. Peranan dari user juga menentukan apakah sistem yang dibangun sudah terpenuhi sesuai dengan kebutuhan atau belum. SDLC merupakan sebuah prosedur yang digunakan untuk mendeskripsikan sebuah proses yang terjadi selama pembuatan sebuah sistem. Proses SLDC memiliki beberapa fase seperti Project Selection and Planning, Analysis, Design, dan Testing & Deployment. Tujuan dari penelitian ini adalah mengetahui seberapa besar persentase dari keterlibatan user selama proses pembangunan sistem informasi perjalanan dinas. Hasil dari penelitian ini yaitu berupa sebuah hasil analisis terhadap keterlibatan user dalam proses pembangunan sistem informasi menggunakan model SDLC.Kata Kunci: Sistem Informasi, SDLC, User Involvement.


2018 ◽  
Vol 5 (1) ◽  
pp. 137-144
Author(s):  
Ade Mubarok ◽  
Ivan Sofyan ◽  
Ali Akbar Rismayadi ◽  
Ina Najiyah

Abstrak Keamanan merupakan hal sangat penting bagi setiap orang. Rumah yang sering ditinggal pemiliknya dapat dimanfaatkan oleh pencuri untuk melakukan aksinya. Oleh karena itu diperlukan sistem keamanan rumah yang efektif agar pemilik rumah dapat mengetahui informasi apabila rumahnya dibobol oleh pencuri. Penulis merancang sebuah sistem keamanan rumah dengan memanfaatkan teknologi RFID yang di lengkapi dengan sensor PIR dan modul GSM sebagai sistem informasi peringatan SMS, dimana semua sistemnya diolah dalam sebuah mikrokontroler ATmega328. Tujuan dari penelitian ini untuk mengganti kunci konvesional dengan kunci solenoid sehingga sulit untuk diduplikat serta mengurangi kesempatan aksi pencurian ketika rumah dalam keadaan kosong. Metode penelitian yang digunakan antara lain dimulai dari pengumpulan data (observasi, wawancara dan studi pustaka) serta pembuatan alat (planning, analisis, desain dan testing). Berdasarkan hasil pengujian diperoleh bahwa kunci solenoid dapat bekerja sesuai dengan kartu akses RFID yang diberikan. Sensor PIR dan modul GSM dapat bekerja dengan baik saat pencuri masuk kedalam rumah, sehingga rumah menjadi aman ketika ditinggalkan oleh pemiliknya. Kata Kunci: RFID, Sensor PIR, Modul GSM, ATmega328 Abstract Security is very important for everyone. Homes that are often left the owner can be used by thieves to perform the action. Therefore required an effective home security system so that homeowners can find out information if the house burglarized by thieves. The author designed a home security system by utilizing RFID technology that is equipped with PIR sensor and GSM module as SMS warning information system, where all the system is processed in an ATmega328 microcontroller. The purpose of this research is to change the conventional key with the solenoid key so that it is difficult to duplicate and reduce the chance of theft action when the house is empty. Research methods used, among others, starting from data collection (observation, interview and literature study) as well as making tools (planning, analysis, design and testing). Based on the test results obtained that the solenoid key can work in accordance with the given RFID access card. PIR sensors and GSM modules work well when thieves enter the house, so the house becomes secure when left by the owner. Key Word: RFID, PIR Sensor, GSM Module, ATmega328


2020 ◽  
Vol 7 (1) ◽  
pp. 61-77
Author(s):  
Ahmad Zubaidi

This study aimed to develop the feasibility of the Mahârah al-Istimâ’ test instrument for electronic-based Arabic students using the Kahoot! application at UIN Sunan Kalijaga Yogyakarta. The method used in this research is the research and development of  Borg and Gall model through analysis, design, and testing. Eligibility is based on the expert validator test and the final operation field test. The results of the study can be concluded that: 1) Preparation of the Test Instrument refers to the 5 objectives or indicators of Mahmud Kamil an-Naqah into 50 questions in product design using the Kahoot! application, 2) From the results of the expert validator it is known that the results of the material quality are obtained by an average 5.37 and the media quality of the application is obtained by an average of 4.75 (very feasible), 3) After being obtained from the main field test to 20 students there are 6 questions or 12% that are not feasible because they are invalid and have not discrimination index, then the author revise and test the revision results to 70 students with 100% valid results and are suitable for use.


2018 ◽  
Vol 1 (1) ◽  
pp. 645-653
Author(s):  
Hanan Alateeq ◽  
Dalal Alzaid ◽  
Nadia Selim ◽  
Afnan Abouelwafa ◽  
Shiroq Al-Megren ◽  
...  

This paper proposed an application that supports visually impaired users in the community by providing voluntary audio support for readable content. The application, Basirah, allows visually impaired users to post audio request for reading text. Volunteers are able to view these requests and offer their response as recorded audio links. The application is developed for iOS devices and supports requests in English and allows for multi-lingual responses for volunteers. This paper presents Basirah and walks through the analysis, design, and testing phases of development. Preliminary testing was carried out on Basirah, where it has shown promising results and contribution.


Sign in / Sign up

Export Citation Format

Share Document