Methodology For Using Origami in Designing Deployable Shelters

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Origami-inspired deployable auxetic metamaterials

Developing complex spatial objects from a fl at sheet of material using origami folding techniques has long attractedattention in science and engineering. Recent research has shown that in origami-based deployable folded sheetmaterials, such as Miura-ori, metamaterial properties of the patterns are basically because of their folding geom-etry [1, 2]. In this study, we employ tai...

متن کامل

Origami-inspired, on-demand deployable and collapsible mechanical metamaterials with tunable stiffness

Origami has been employed to build deployable mechanical metamaterials through folding and unfolding along the crease lines. Deployable metamaterials are usually flexible, particularly along their deploying and collapsing directions, which unfortunately in many cases leads to an unstable deployed state, i.e., small perturbations may collapse the structure along the same deployment path. Here we...

متن کامل

A methodology for designing semantic annotations

This paper presents a methodology for designing languages for semantic annotation. Central in this methodology is the specification of representation formats as renderings of conceptual structures defined by an abstract syntax as set-theoretic constructs. An ideal representation format is defined as one that is able to represent all the conceptual distinctions made in the abstract syntax, and o...

متن کامل

Designing a Modelling Methodology for Legal Workflows

This paper analyses the requirements that need to be met in order to provide a modelling methodology suitable for the modelling of legal workflows. It subsequently provides a methodology for the legal environment which meets the stated requirements.

متن کامل

A Methodology for Designing Controlled Anonymous Applications

Many anonymous applications offer unconditional anonymity to their users. However, this can provoke abusive behavior. Dissatisfied users will drop out or liability issues may even force the system to suspend or cease its services. Therefore, controlling abuse is as important as protecting the anonymity of legitimate users. However, designing such applications is no sinecure. This paper presents...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Design Sciences and Applied Arts

سال: 2020

ISSN: 2682-2156

DOI: 10.21608/jdsaa.2020.28469.1016