Methodology For Using Origami in Designing Deployable Shelters
نویسندگان
چکیده
منابع مشابه
Origami-inspired deployable auxetic metamaterials
Developing complex spatial objects from a fl at sheet of material using origami folding techniques has long attractedattention in science and engineering. Recent research has shown that in origami-based deployable folded sheetmaterials, such as Miura-ori, metamaterial properties of the patterns are basically because of their folding geom-etry [1, 2]. In this study, we employ tai...
متن کاملOrigami-inspired, on-demand deployable and collapsible mechanical metamaterials with tunable stiffness
Origami has been employed to build deployable mechanical metamaterials through folding and unfolding along the crease lines. Deployable metamaterials are usually flexible, particularly along their deploying and collapsing directions, which unfortunately in many cases leads to an unstable deployed state, i.e., small perturbations may collapse the structure along the same deployment path. Here we...
متن کاملA methodology for designing semantic annotations
This paper presents a methodology for designing languages for semantic annotation. Central in this methodology is the specification of representation formats as renderings of conceptual structures defined by an abstract syntax as set-theoretic constructs. An ideal representation format is defined as one that is able to represent all the conceptual distinctions made in the abstract syntax, and o...
متن کاملDesigning a Modelling Methodology for Legal Workflows
This paper analyses the requirements that need to be met in order to provide a modelling methodology suitable for the modelling of legal workflows. It subsequently provides a methodology for the legal environment which meets the stated requirements.
متن کاملA Methodology for Designing Controlled Anonymous Applications
Many anonymous applications offer unconditional anonymity to their users. However, this can provoke abusive behavior. Dissatisfied users will drop out or liability issues may even force the system to suspend or cease its services. Therefore, controlling abuse is as important as protecting the anonymity of legitimate users. However, designing such applications is no sinecure. This paper presents...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Design Sciences and Applied Arts
سال: 2020
ISSN: 2682-2156
DOI: 10.21608/jdsaa.2020.28469.1016