Forecasting the Structure and the Hindered Contraction of Casts by Using the ProCAST System of Engineering Analysis

2019 ◽  
Vol 946 ◽  
pp. 661-667
Author(s):  
Ivan Nikolaevich Erdakov ◽  
Vasily A. Ivanov ◽  
Alexander V. Vyboishchik

The paper presents the methods for forecasting the structure and geometrical parameters of casts by using the ProCAST system of engineering analysis. Based on experimental studies and computer simulation, a regularity between the supercooling rate of aluminium alloy on the one hand and the nucleation rates and crystal growth rates on the other has been established. There have also been established dependencies describing the change in the plasticity modulus, the coefficient of thermal linear expansion, Poisson's coefficient within the temperature range of 20 to 1000°C for cores made from α-set mixture. The computer simulation based on the experimental data of the processing of silumin casts made it possible to forecast the alloy structure with the probability level of 95%, and to calculate the accuracy of hindered contraction of the alloy with accuracy equal to ± 1.5%.

Author(s):  
M. A. Danilov ◽  
◽  
M. V. Drobysh ◽  
A. N. Dubovitsky ◽  
F. G. Markov ◽  
...  

Restrictions of emissions for civil aircraft engines, on the one hand, and the need in increasing the engine efficiency, on the other hand, cause difficulties during development of low-emission combustors for such engines.


Author(s):  
Inge Hinterwaldner

It can be shown that the different conceptions of ‘simulation’ (the one of culture critique on the one hand and the denomination of technical applications on the other) that seem to be incompatible with each other can be reconciled on a single spectrum. Its basis in models, its replacement of reality, its lack of reference and of precession of the referent are some pejorative characteristics often emphasized in media philosophy with regard to simulations, for which the sciences applying computer simulations have no use for. It helps crossing over the views that first seem opposite to each other, but that turn out to be compatible if its root in reality is recognized and thus the representational logic is accepted at least according to the intention. The chapter combines ideas of the 'simulacrum' retrieved in the natural sciences with traces of cybernetic thinking in media studies. The whole study builds on a definition of computer simulation in the technical sense as the involvement with and the act of execution f a dynamic mathematic or procedural model that projects, depicts, or recreates a system or process.


10.29007/pxrk ◽  
2019 ◽  
Author(s):  
Philipp Meyer ◽  
Timo Häckel ◽  
Franz Korf ◽  
Thomas Schmidt

Ethernet is the most promising solution to reduce complexity and enhance the band- width in the next generation in-car networks. Dedicated Ethernet protocols enable the real-time aspects in such networks. One promising candidate is the IEEE 802.1Q Time- Sensitive Networking protocol suite. Common Ethernet technologies, however, increases the vulnerability of the car infrastructure as they widen the attack surface for many com- ponents. In this paper proposes an IEEE 802.1Qci based algorithm that on the one hand, protects against DoS attacks by metering incoming Ethernet frames. On the other hand, it adapts to the behavior of the Credit Based Shaping algorithm, which was standardized for Audio/Video Bridging, the predecessor of Time-Sensitive Networking. A simulation of this proposed Credit Based Metering algorithm evaluates the concept.


2013 ◽  
Vol 5 (1) ◽  
pp. 1-33 ◽  
Author(s):  
Marga Reimer

Recent experimental studies appear to discredit Gricean accounts of irony and metaphor. I argue that appearances are decidedly misleading here and that Gricean accounts of these figures of speech are actually confirmed by the studies in question. However, my primary aim is not so much to defend Gricean accounts of irony and metaphor as it is to motivate two related points: one substantive and one methodological. The substantive point concerns something Grice suggests in his brief remarks on irony: that the interpretation of an ironical (vs. metaphorical) utterance requires two distinct applications of second-order theory of mind (ToM). I argue that such a view has considerable explanatory power. It can explain an intuitive contrast between irony and metaphor, some interesting data on the ToM abilities of patients with schizophrenia, and some intuitive similarities between irony on the one hand and hyperbole and meiosis on the other. The methodological point concerns the relationship between the empirical psychologist’s (or experimental philosopher’s) experimental studies and the armchair philosopher’s thought-experiments. I suggest that the credibility of an experimentally supported claim is enhanced when it captures the reflective judgments captured in the armchair philosopher’s thought-experiments.


2017 ◽  
Vol 59 ◽  
pp. 133-173 ◽  
Author(s):  
Robert Bredereck ◽  
Jiehua Chen ◽  
Rolf Niedermeier ◽  
Toby Walsh

We study computational problems for two popular parliamentary voting procedures: the amendment procedure and the successive procedure. They work in multiple stages where the result of each stage may influence the result of the next stage. Both procedures proceed according to a given linear order of the alternatives, an agenda. We obtain the following results for both voting procedures: On the one hand, deciding whether one can make a specific alternative win by reporting insincere preferences by the fewest number of voters, the Manipulation problem, or whether there is a suitable ordering of the agenda, the Agenda Control problem, takes polynomial time. On the other hand, our experimental studies with real-world data indicate that most preference profiles cannot be manipulated by only few voters and a successful agenda control is typically impossible. If the voters' preferences are incomplete, then deciding whether an alternative can possibly win is NP-hard for both procedures. Whilst deciding whether an alternative necessarily wins is coNP-hard for the amendment procedure, it is polynomial-time solvable for the successive procedure.


2018 ◽  
Vol 63 (4) ◽  
pp. 288 ◽  
Author(s):  
G. A. Dolgonos ◽  
E. S. Kryachko ◽  
T. Yu. Nikolaienko

For more than twenty years, the endohedral fullerene cavity is attracting a permanent attention of experimenters and theorists, computational chemists and physicists, who apply their efforts to simulate encapsulated atoms and molecules in the fullerene cavity on computers and analyze the arising phenomena of atomic bonding. In this work, recent developments concerning the endohedral fullerene He2@C60, in particular, its experimental observation and relevant computational works, are reviewed. On the one hand, the dihelium He2 embedded into the C60 cavity is observed experimentally. On the other hand, the computer simulation shows that each of the He atoms is characterized by an insignificant charge transfer to C60, so that the He dimer exists as a partially charged (He+b)2 entity. The key issue of the work concerns the existence of a bond between those two helium atoms. Since the bond is created between two particles, we assert that it suffices to define the bond on the basis of the molecular L¨owdin’s postulate and use it to study the He dimer in the C60 cavity in terms of the He–He potential energy well. It was analytically demonstrated that this well can contain at least one bound (ground) state. Therefore, according to L¨owdin’s postulate, which is naturally anticipated in quantum theory, the conclusion is drawn that the (He+b)2 entity is a diatomic molecule, in which two heliums are bound with each other. On the basis of those arguments, the concept of endohedral fullerene stability is proposed to be extended.


2018 ◽  
Vol 16 (1) ◽  
pp. 48-71 ◽  
Author(s):  
Carla Canestrari ◽  
Ivana Bianchi

Abstract This paper proposes a new way of analyzing the contrast between an ironic comment and the referent context by focusing on the structure of the dimension which the contrast belongs to. This new approach was stimulated by previous experimental studies demonstrating that dimensions are perceptually made up of two opposite poles and an intermediate region consisting either of point or range properties. Applying this schema it became clear that, on the one hand what previous evidence-based literature mostly focuses on is the idea that for an ironic meaning to be detected there must be a contrast between two poles or within a pole; on the other hand, that there is room for new investigations concerning whether it is possible to make ironic comments containing poles to refer to intermediate situations (i.e. situations perceived as neither one pole nor the other) or, vice versa, to make ironic comments containing intermediates to refer to polarized situations.


Open Physics ◽  
2018 ◽  
Vol 16 (1) ◽  
pp. 326-331
Author(s):  
Jerzy Zgraja

Abstract Predictive computer simulation of the temperature field control system of an induction heated object encounters difficulties associated with the nonlinearityof systemon the one hand, and the time of calculation on the other hand, during numerical analysis of the magnetothermal field of the object, especially in 3D. The paper presents a methodology for the fast simulation of temperature field for a completed induction heating system of calender rolls. The method of 3D calculations of rotating calender rolls with a moving web of wet paper can be connected easily with a simulation of the temperature field controller, for simulation of complex control systems.


10.29007/c5td ◽  
2018 ◽  
Author(s):  
Sebastian Szancer ◽  
Philipp Meyer ◽  
Franz Korf

The communication infrastructure of industrial plants, vehicles and many other appli- cations must provide more and more bandwidth, sometimes with strict timing requirements for the transmission of critical data. Time-Sensitive Networking (TSN) is a set of IEEE 802 Ethernet sub-standards that meet these requirements for a wide range of applications and communication requirements. Market relevance of TSN increases in different sectors. On the other hand, SERCOS III is an established Ethernet-based communication standard, which is used in particular in the field of industrial plants. With cost and limitations of SERCOS III in mind, this paper examines the migration from SERCOS III Time Division Multiple Access (TDMA) communication on the one side to Credit Based Shaping (CBS) communication on the other side. TSN supports both mechanisms. The analyses are per- formed with OMNeT++ simulation models. Migration recommendations are derived from the comparison of TDMA- and CBS-based transportation of SERCOS III traffic.


2012 ◽  
Vol 2012 ◽  
pp. 1-5 ◽  
Author(s):  
F. A. Kari ◽  
F. Beyersdorf ◽  
M. Siepe

There are numerous types of bicuspid aortic valve (BAV) configurations. Recent findings suggest that various BAV types represent different pathophysiological substrates on the aortic media level. Data imply that the BAV type is probably not related to location and extent of the aneurysm. However, BAV type is likely linked to the severity of aortic media disease. Some BAVs with raphe seem more aggressive than BAV without a raphe. Cusp fusion pattern, altered hemodynamics, and the qualitative severity of the disease in the aortic media might on the one hand share the same substrate. On the other hand, the aortopathy's longitudinal extent and location may represent a different pathophysiological substrate, probably dictated by the heritable aspects of BAV disease. The exact nature of the relation between BAV type and the aneurysm's location and extent as well as to the risk of aortic complications remains unclear. This paper reviews results of recent human and experimental studies on the significance of BAV types for local aortic media disease and location and extent of the aortopathy. We describe the known and hypothesized hemodynamic and hereditary factors that may result in aortic aneurysm formation in BAV patients.


Sign in / Sign up

Export Citation Format

Share Document