Special Software Development for Tire Vulcanization Simulation

2013 ◽  
Vol 404 ◽  
pp. 764-768 ◽  
Author(s):  
Jian Zhang ◽  
You Su Wei ◽  
Guo Lin Wang ◽  
Wen Xian Tang

Special software for tire vulcanization simulation was developed using ABAQUS software as the core solver and Visual Basic6.0 as the develop language. The software was based on principles of easy operation, professional and intelligent analysis. In this way, automation and professionalization of the analysis process were performed. The special software mainly consists of three functions: Firstly, model grid was automatically recognized, and corresponding configuration files were automatically built, which were required in the analysis preprocess. Secondly, ABAQUS solver was invoked to solve the model. Finally, results such as state-of-cure, temperature and other curing performances were automatically extracted and saved as excel or word format. Besides, the curing profiles could be proposed. The results showed that this software is easy to use and work efficiently.

2015 ◽  
Vol 3 (2) ◽  
pp. 115-126 ◽  
Author(s):  
Naresh Babu Bynagari

Artificial Intelligence (AI) is one of the most promising and intriguing innovations of modernity. Its potential is virtually unlimited, from smart music selection in personal gadgets to intelligent analysis of big data and real-time fraud detection and aversion. At the core of the AI philosophy lies an assumption that once a computer system is provided with enough data, it can learn based on that input. The more data is provided, the more sophisticated its learning ability becomes. This feature has acquired the name "machine learning" (ML). The opportunities explored with ML are plentiful today, and one of them is an ability to set up an evolving security system learning from the past cyber-fraud experiences and developing more rigorous fraud detection mechanisms. Read on to learn more about ML, the types and magnitude of fraud evidenced in modern banking, e-commerce, and healthcare, and how ML has become an innovative, timely, and efficient fraud prevention technology.


Author(s):  
Janis Osis ◽  
Erika Nazaruka (Asnina)

Some experts opine that software is built in a primitive way. The role of modeling as a treatment for the weakness of software engineering became more important when the principles of Model Driven Architecture (MDA) appeared. Its main advantage is architectural separation of concerns. It showed the necessity of modeling and opened the way for software development to become an engineering discipline. However, this principle does not demonstrate its whole potential power in practice because of lack of mathematical accuracy in the very initial steps of software development. The sufficiency of modeling in software development is still disputable. The authors believe that software development in general (and modeling in particular) based on mathematical formalism in all of its stages and together with the implemented principle of architectural separation of concerns can become an important part of software engineering in its real sense. They propose the formalism by topological modeling of system functioning as the first step towards engineering.


Author(s):  
Mirna Muñoz

Software has become the core of organizations in different domains because the capacity of their products, systems, and services have an increasing dependence on software. This fact highlights the research challenges to be covered by computer science, especially in the software engineering (SE) area. On the one way, SE is in charge of covering all the aspects related to the software development process from the early stages of software development until its maintenance and therefore is closely related to the software quality. On the other hand, SE is in charge of providing engineers able to provide technological-base solutions to solve industrial problems. This chapter provides a research work path focused on helping software development organizations to change to a continuous software improvement culture impacting both their software development process highlighting the human factor training needs. Results show that the implementation of best practices could be easily implemented if adequate support is provided.


Author(s):  
Roberto Evaristo ◽  
Mary Beth Watson-Manheim ◽  
Jorge Audy

It is widely agreed that the trend toward distributed software development is growing. Although there are difficulties involved, this trend is here to stay, as organizations will continue to search for ways to develop software at lower cost but with same quality. Current research has focused primarily on the later stages of the software development life cycle, especially coding of software requirements. However, as organizations become more virtual, distributed development will become more apparent throughout the entire life cycle. In this study, we investigate distributed e collaboration in requirements determination in software development. We report on results from a field experiment with two graduate level Information Systems classes, one located in Porto Alegre, Brazil and one in Chicago, U.S. The students in Brazil played the role of users whereas the students in Chicago role-played analysts. The Chicago-based students developed a requirements document for an information system by interviewing the Brazil students using an electronic discussion board. Our findings provide insight into the distributed analysis process and identify sources of potential problems.


Author(s):  
Claudia Pons ◽  
Gabriel Baum

During the object-oriented software development process, a variety of models of the system is built. All these models are semantically overlapping and together represent the system as a whole. In this chapter, we present a classification of relationships between models along three different dimensions, proposing a formal description of them in terms of mathematical contracts, where the software development process is seen as involving a number of agents (the development team and the software artifacts) carrying out actions with the goal of building a software system that meets the user requirements. In this way, contracts can be used to reason about correctness of the development process, and to compare the capabilities of various groupings of agents in order to accomplish a particular contract. The goal of the proposed formalization is to provide formal foundations for tools that perform intelligent analysis on models assisting software engineers through the software life cycle.


2014 ◽  
Vol 971-973 ◽  
pp. 1076-1080 ◽  
Author(s):  
Quan Sheng Yu ◽  
Mei Ying Duan ◽  
Tian Shun Zhang ◽  
Hong Gang Wu ◽  
Shao Kun Lu

Considering the current situation that the temperature control systems in market have the general disadvantages of complicated structure, high power consumption and tremendous cost, a new greenhouse temperature supervising system is designed, with a Arduino Mega 2560 single chip microcomputer as the core, XBEE as the short distance wireless transferring tools, and with function of displaying information in computers and remote control. The core component of this system is the Arduino software-hardware open source platform, which is currently popular in the market. This platform embraces the excellence of stability, low power consumption, cheap cost and easy operation as its advantages and selling points. XBEE can constitute the mesh network, each module of which can supplied as the route node, coordinator and terminal node. This system can achieve the functions of collecting data from sensors while is capable of displaying these data in the computers and put them under the network remote control. Easy to install, it can simultaneously achieve network monitoring several greenhouses. Enormous convenience to production inside the greenhouse is fulfilled due to these mentioned features as well, which makes it suitable to the small scale agricultural production.


2014 ◽  
Vol 22 (3) ◽  
pp. 187-199
Author(s):  
Stergios Papadimitriou ◽  
Seferina Mavroudi ◽  
Kostas Theofilatos ◽  
Spiridon Likothanasis

Although there are a lot of robust and effective scientific libraries in Java, the utilization of these libraries in pure Java is difficult and cumbersome, especially for the average scientist that does not expertise in software development. We illustrate that ScalaLab presents an easier and productive MATLAB like front end. Also, the main strengths and weaknesses of the core Java libraries of ScalaLab are elaborated. Since performance is of paramount importance for scientific computation, the article discusses extensively performance aspects of the ScalaLab environment. Also, Java bytecode performance is compared to native code.


2012 ◽  
Vol 424-425 ◽  
pp. 1253-1257
Author(s):  
Xing Qiao Liu ◽  
Peng Zhang

In this paper, the scattering measuring principle of turbidity is introduced firstly. The new type of turbidity sensor probe designed in this paper overcomes the deficiencies of existing technologies, which has higher sensitivity, strong anti-interference and can detect the turbidity accurately and continuously. The system designed with the core of MCU C8051F020 is presented. Then the design of turbidity sensor probe, data acquisition, processing and non-linear compensation are introduced in detail. Besides, in order to eliminate the impact of temperature on the turbidity measurement and improve the measurement accuracy, temperature measurement circuit has been designed. Test results have shown that the designed on-line turbidity-meter has some advantages: low price, high precision, easy operation etc. It can be widely applied in the fields of waterworks, industrial production, aquaculture, environmental protection and so on


Author(s):  
Cătălin Tudose

The history of humankind offers lots of remarkable ideas and innovations in strategy and tactics. There is no area where people have shown more inventiveness than defending themselves or attacking and conquering others. On the other hand, the Agile methodology emerged from software development, where it tried to provide support for the successful organization of delivery projects, that have to fight and conquer the complexity. This article evidences similarities between the Agile methodology and attacking and war strategies, making extended references to one of the most renowned military treaties: Sun Tzu's The Art of War. Making inter-disciplinary analogies, comparing and contrasting the concepts from different disciplines are at the core of this article. We'll investigate what things as initial estimations, attack by stratagem, tactical dispositions, energy, weak points, and strong points, maneuvering, variation in tactics, the army on the march, terrain, arriving on unknown ground, concrete situations on the ground, the use of spies, or what the attack by fire may mean in software development. We'll analyze how these war strategy concepts transpose to Agile concepts like adding business value, getting to the business goals, managing complexity, conducting the work the incremental and non-incremental way.


Author(s):  
Johan Oomen ◽  
Maarten Brinkerink ◽  
Bouke Huurnink ◽  
Roeland Ordelman

Audiovisual archives are embracing the opportunities offered by digitization for managing their work processes and offering new services to a wide array of user groups. Organization strategy, working processes and software development need to be able to support a culture where innovation can flourish. Some institutions are beginning to adopt the concept of ‘two-speed IT’. The core strategy aims to accommodate two informational technology tracks simultaneously: foundational but ‘slow’ and innovative but exible and ‘fast’. This paper outlines the rationale behind the two-speed IT strategy. It highlights a specific implementation at the Netherlands Institute for Sound and Vision, a large audiovisual archive and museum where two-speed IT is enabling the institute to reach its business objectives.


Sign in / Sign up

Export Citation Format

Share Document