Mobility Analysis of Novel Deployable Mechanism Based on Tetrahedral Element
نویسندگان
چکیده
منابع مشابه
Adaptive tetrahedral subdivision for finite element analysis
Realistic behavior of deformable objects is essential for many applications in computer graphics, engineering, or medicine. Typical techniques are either based on mass-springdamper models, boundary element methods, finite difference methods, or finite element methods. These methods either lack accuracy or are computationally very expensive. If accuracy is required FEM computations use adaptive ...
متن کاملFinite Element Analysis of Safety Mechanism in a Mechanical Controller
In this study, dynamic behavior of safety mechanism of a mechanical controller is investigated using 3D-FE simulation. This paper is concentrated on controller of a high acceleration projectile. The controller is located in the top of the projectile. Safety mechanism is divided to deformable and rigid parts. Deformable and rigid parts are simulated in Abaqus and Adams commercial soft wares; res...
متن کاملfabrication of new ion sensitive field effect transistors (isfet) based on modification of junction-fet for analysis of hydronium, potassium and hydrazinium ions
a novel and ultra low cost isfet electrode and measurement system was designed for isfet application and detection of hydronium, hydrazinium and potassium ions. also, a measuring setup containing appropriate circuits, suitable analyzer (advantech board), de noise reduction elements, cooling system and pc was used for controlling the isfet electrode and various characteristic measurements. the t...
Electromagnetic field analysis of novel low cogging force, linear switched reluctance motor, based on 2-D finite element method
This paper deals with electromagnetic design and 2-D (two-dimensional) magnetic field analysis of novel low force ripple linear switched reluctance (LSR) motor. The configuration that has been presented here has a higher number of rotor poles than stator poles, and the purpose of this configuration is to improve the force ripple, which is the weak point of LSRMs. In order to illustrate the ...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Mechanical Engineering
سال: 2019
ISSN: 0577-6686
DOI: 10.3901/jme.2019.12.009