171 |
Putting animals on display : geographies of taxidermy practicePatchett, Merle Marshall January 2010 (has links)
Taxidermy specimens and displays have become increasingly liminal features in contemporary society. Viewed variously as historical curios, obsolete relics or more malignantly as ‘monstrosities’, they can be a source of discomfort for many. Taxidermy objects have become uncomfortable reminders of past scientific and colonial practices which have sought to capture, order and control animated life and as such have become increasingly problematic items for their owners. As a result many taxidermy displays have been dismantled and mounts relegated to ‘backstores’ to gather dust. The paradox is that taxidermy as a practice is a quest for ‘liveness’, to impute life back into the dead. Much like the taxidermist, my goal in this thesis is to revive and restore: to renew interest in and reassert the value of taxidermy collections by recovering what I shall term as the ‘biogeographies’ of their making and continued maintenance. Considerable academic attention has been paid to the ‘finished’ form and display of taxidermy specimens inside cabinets, behind glass – in other words, to their representation. By way of contrast, this thesis recovers the relationships, practices and geographies that brought specimens to their state of enclosure, inertness and seeming fixity. These efforts are aligned with work in cultural geography seeking to counteract ‘deadening effects’ in an active world through a prioritisation of practice (Dewsbury and Thrift 2000), and elsewhere draw on research arguments and approaches originating in historical geography, and the history of science. The thesis firstly investigates historical developments in the scientific and craft practice of taxidermy through the close study of period manuals, combined with ethnographic observations of a practicing taxidermist. Critical attention to practice then facilitates the recovery of the lifeworlds of past taxidermy workshops and the globally sited biogeographies behind the making of individual specimens and collections. The thesis required the purposeful assemblage and rehabilitation of diffuse zoological and historical remains to form unconventional archives, enabling a series of critical reflections on the scientific, creative and political potentials of taxidermy.
|
172 |
The role of creative art in community education : art education and art therapyWightmore, Ada January 1979 (has links)
The thesis looks firstly at creativity and the creative process, approaching the subject from a whole range of different viewpoints, such as the psychological, philosophical, biographical and anthropological angles. Following from this there is an exploration of the ways in which creativity way be awakened and unfolded. Special attention is given to the conditions and situations that are likely to encourage creative development and to the blocks and difficulties that inhibit its expression. Particular reference is made, on the one hand, to art education and to the art, leisure, and teaching student, and on the other hand, to art therapy and the psychiatric patient. The themes of the individual and the community are explored in a complementary way in the final two chapters. The thesis emphasizes the viewpoint of the student and the patient, but since these people do not exist in a vacuum, this involves looking also at the teacher, the therapist and society. With reference to the psychiatric field, other specific questions arise, for example: How may creative opportunities assist the healing process? What are the reciprocal influences of art and mental illness? Throughout the thesis the term 'art' is used in the visual sense, but references are made to creativity in other fields where parallel conclusions apply. The emphasis has been placed on the adult, but the subject of 'Creativity and the Teaching Student' involves some references to child art and 'Creativity and the Community' involves all ages.
|
173 |
Performing Shakespeare in contemporary TaiwanHuang, Ya-hui January 2012 (has links)
Since the 1980s, Taiwan has been subjected to heavy foreign and global influences, leading to a marked erosion of its traditional cultural forms. Indigenous traditions have had to struggle to hold their own and to strike out into new territory, adopt or adapt to Western models. For most theatres in Taiwan, Shakespeare has inevitably served as a model to be imitated and a touchstone of quality. Such Taiwanese Shakespeare performances prove to be much more than merely a combination of Shakespeare and Taiwan, constituting a new fusion which shows Taiwan as hospitable to foreign influences and unafraid to modify them for its own purposes. Nonetheless, Shakespeare performances in contemporary Taiwan are not only a demonstration of hybridity of Westernisation but also Sinification influences. Since the 1945 Kuomintang (Chinese Nationalist Party, or KMT) takeover of Taiwan, the KMT’s one-party state has established Chinese identity over a Taiwan identity by imposing cultural assimilation through such practices as the Mandarin-only policy during the Chinese Cultural Renaissance in Taiwan. Both Taiwan and Mainland China are on the margin of a “metropolitan bank of Shakespeare knowledge” (Orkin, 2005, p. 1), but it is this negotiation of identity that makes the Taiwanese interpretation of Shakespeare much different from that of a Mainlanders’ approach, while they share certain commonalities that inextricably link them. This study thus examines the interrelation between Taiwan and Mainland China operatic cultural forms and how negotiation of their different identities constitutes a singular different Taiwanese Shakespeare from Chinese Shakespeare. In recognising this, the core of this thesis rests on how Shakespeare plays speak insightfully to Taiwan society across historical, geographical, and cultural boundaries. Many Shakespeare plays powerfully echo the political turmoil of contemporary Taiwan society, but it is the negotiation of the political and cultural dependency that constitutes a distinct Taiwanese Shakespeare identity that is different from Chinese Shakespeare. This study therefore focuses on Shakespeare performances in contemporary Taiwan between 1986 and 2003, emphasising political context as key factor in adaptation, as Taiwan society transited from a military age to post-millennium democracy after martial law was lifted in 1987.
|
174 |
Process And Participation In The Legal Regulation Of Urban Regeneration: The Case Of Zeytinburnu, IstanbulCicek, Huseyin 01 December 2005 (has links) (PDF)
High risks imposed by natural hazards, and changes in economic, socio-cultural and
technological conditions compel Turkey to transform its cities rather than promote growth. In
this respect, urban regeneration became a significant concern demanding a comprehensive
and integrated vision and action.
Turkey will have to focus on regenerating the built environment in the near feature, rather
than follow conventional trends of city-extension development. As scope and methods of
urban regeneration planning differ from that of development-planning, a special legal
framework and process for urban regeneration is required. The development of
comprehensive urban regeneration policies to coordinate physical, social and environmental
issues, together with relevant procedural steps, all accommodated within a legal framework
are today the most challenging problem in urban planning.
To identify the needs in detail, procedural and legal aspects of Zeytinburnu Urban
Regeneration Project one of the current urban regeneration projects, related laws and draft
laws, and experience abroad are comparatively reviewed here. The main finding is that the
procedural steps and legal arrangements of recent regulations represent single-minded
understandings of the scope of urban regeneration. There are tendencies of centralizing the
powers of implementation, relying only on physical regeneration as a linear process,
discouraging all forms of participation. The recent regulatory attempts in special laws
concerning regeneration, as well as in laws of & / #8216 / development& / #8217 / , & / #8216 / local administrations& / #8217 / and
& / #8216 / municipalities& / #8217 / need to be modified in their procedural and legal provisions.
Local authorities can be charged to designate regeneration areas at 1/5000 city master plans
which could be coordinated by changing an article within Development Law (3194). Tasks
and responsibilities for comprehensive regeneration could be provided with the Law of
Municipalities (5272), and the Law of Provincial Administration (5302). These laws could also
equip local authorities with prerogatives of implementing regeneration projects.
A second procedural requirement concerns the preparation of plans. This demands steps for
participatory interventions as well as a versatile structure to allow feedback and returns to
former stages of planning. This could be introduced by means of a regulation regarding
preparation of regeneration projects. This resembles the regulation on technical
specifications for the preparation of development plans of Law 3194. This can enforce the
participation of local citizens and stakeholders to the process. Changing the article 13 of the
Municipality Law would suffice for the realization of participation processes. The article (24n)
of the Greatercity Municipalities Law that enable partnerships between public, private bodies
and NGOs can be further introduced to the Municipality Law for the very necessary
synergies in regeneration projects.
|
175 |
Unravelling the musical in art : Matisse, his music and his textilesAtkinson, Victoria January 2017 (has links)
From flamenco guitarists to parlour pianists, Matisse’s images of music-making often appear within decorative scenes of gleaming carpets, multi-coloured costumes and lavishly embroidered wall hangings. All of these textiles and more comprised what he called ‘ma bibliothèque de travail’, a working library of inspiration that he maintained throughout his career. ‘I am made up of everything I have seen,’ he remarked, to which he might have added, ‘and heard.’ Practising, performing, listening and concert-going: music, like textiles, was a lifelong pursuit. But his passion for them is not simply of anecdotal significance, nor does it explain their mere co-existence as the subject-matter of his art. Rather, just as music and textiles are interwoven at every stage of his life, so too is their structural and conceptual significance in his work. In a series of case studies, a single textile from his working library is paired with the art it inspired: the kasāya robe and 'The Song of the Nightingale'; the Moghan rug and the Symphonic Interiors; and the Bakuba velours and 'Jazz'. In each case, visual form is found to have musical counterpart, both in the textiles themselves and as represented by Matisse. This opens up new, more imaginative possibilities of interpreting his visual musicality, which is found to be metaphysical, modal and motivic in concept. Finally, these separate strands are drawn together in a single synoptic analysis of the Chapel of the Rosary, the artist’s self-proclaimed masterpiece and ‘total’ work of art. This thesis explores the expansive musical space created by the reduced visual form of textiles. Considered together for the first time, these enduring and inseparable continuities of Matisse’s art – music and textiles – suggest not only a means of unravelling his own visual musicality, but point towards a much-needed methodology for interpreting this notion more broadly.
|
176 |
The dispersal of the Hamilton Palace collectionMaxwell, Christopher Luke January 2014 (has links)
By the penultimate decade of the nineteenth century, the Dukes of Hamilton, premier peers of Scotland, had amassed a superb collection of fine and decorative art. This outstanding collection was dispersed in two series of sales in 1882 and 1919, and the family’s principal seat, Hamilton Palace, ten miles south of Glasgow, was demolished in the 1920s and ′30s. Many of the most significant items are now in the great museums, galleries and libraries of the world or in important private collections. This study will begin by identifying the causes of the 12th Duke of Hamilton’s financial difficulties and the chain of events leading to the dispersal of the collection, with a comparative analysis on the backgrounds of the earlier enforced sales of Fonthill Abbey (1822), Wanstead House (1822), Strawberry Hill (1842), and Stowe (1848). It will continue with a thorough investigation of selected principal beneficiaries, what they acquired and why. These will include Christopher Beckett Denison; various members of the Rothschild family; William Dodge James; the 5th Earl of Rosebery; Sir Michael Shaw-Stewart; and the 5th Earl of Carysfort. A survey of the records of certain national museums and galleries will establish the involvement of the museum sector in the dispersal of the collection, with a review of these institutions’ acquisitions. Finally, this study will consider the extent to which North American collectors benefited from the sales through the international art trade between 1880 and 1930, culminating in an account of the purchase of the Hamilton Palace interiors by the New York dealers, French & Co., and their subsequent acquisition by the newspaper magnate and collector William Randolph Hearst. This research will add a new perspective to the understanding of the break-up of this renowned collection, and of the loss to Scotland’s material culture and heritage. It will contribute to current scholarship on nineteenth-century house sales and increase current knowledge of the socio-economic causes and effects of such events. The question of who benefited from the Hamilton Palace sales will be a new and original area of research within History of Collecting studies, contributing to a fuller appreciation of British collecting between 1880 and 1930 and of the international art trade and market from 1880 to the present day.
|
177 |
Cyber-security protection techniques to mitigate memory errors exploitationMarco Gisbert, Héctor 04 November 2016 (has links)
[EN] Practical experience in software engineering has demonstrated that the goal of
building totally fault-free software systems, although desirable, is impossible
to achieve. Therefore, it is necessary to incorporate mitigation techniques in
the deployed software, in order to reduce the impact of latent faults.
This thesis makes contributions to three memory corruption mitigation
techniques: the stack smashing protector (SSP), address space layout
randomisation (ASLR) and automatic software diversification.
The SSP is a very effective protection technique used against stack buffer
overflows, but it is prone to brute force attacks, particularly the dangerous
byte-for-byte attack. A novel modification, named RenewSSP, has been proposed
which eliminates brute force attacks, can be used in a completely transparent
way with existing software and has negligible overheads. There are two
different kinds of application for which RenewSSP is especially beneficial:
networking servers (tested in Apache) and application launchers (tested on
Android).
ASLR is a generic concept with multiple designs and implementations. In this
thesis, the two most relevant ASLR implementations of Linux have been analysed
(Vanilla Linux and PaX patch), and several weaknesses have been found. Taking
into account technological improvements in execution support (compilers and
libraries), a new ASLR design has been proposed, named ASLR-NG, which
maximises entropy, effectively addresses the fragmentation issue and removes a
number of identified weaknesses. Furthermore, ASLR-NG is transparent to
applications, in that it preserves binary code compatibility and does not add
overheads. ASLR-NG has been implemented as a patch to the Linux kernel 4.1.
Software diversification is a technique that covers a wide range of faults,
including memory errors. The main problem is how to create variants,
i.e. programs which have identical behaviours on normal inputs but
where faults manifest differently. A novel form of automatic variant
generation has been proposed, using multiple cross-compiler suites and
processor emulators.
One of the main goals of this thesis is to create applicable results.
Therefore, I have placed particular emphasis on the development of real
prototypes in parallel with the theoretical study. The results of this thesis
are directly applicable to real systems; in fact, some of the results have
already been included in real-world products. / [ES] La creación de software supone uno de los retos más complejos para el
ser humano ya que requiere un alto grado de abstracción. Aunque se ha
avanzado mucho en las metodologías para la prevención de los fallos
software, es patente que el software resultante dista mucho de ser
confiable, y debemos asumir que el software que se produce no está
libre de fallos. Dada la imposibilidad de diseñar o implementar
sistemas libres de fallos, es necesario incorporar técnicas de
mitigación de errores para mejorar la seguridad.
La presente tesis realiza aportaciones en tres de las principales
técnicas de mitigación de errores de corrupción de memoria: Stack
Smashing Protector (SSP), Address Space Layout Randomisation (ASLR) y
Automatic Software Diversification.
SSP es una técnica de protección muy efectiva contra
ataques de desbordamiento de buffer en pila, pero es sensible a ataques de
fuerza bruta, en particular al peligroso ataque denominado byte-for-byte.
Se ha propuesto una novedosa modificación del SSP, llamada RenewSSP,
la cual elimina los ataques de fuerza bruta. Puede ser usada
de manera completamente transparente con los programas existentes sin
introducir sobrecarga. El RenewSSP es especialmente beneficioso en dos áreas de
aplicación: Servidores de red (probado en Apache) y
lanzadores de aplicaciones eficientes (probado en Android).
ASLR es un concepto genérico, del cual hay multitud de diseños e
implementaciones. Se han analizado las dos implementaciones más
relevantes de Linux (Vanilla Linux y PaX patch), encontrándose en
ambas tanto debilidades como elementos mejorables. Teniendo en cuenta
las mejoras tecnológicas en el soporte a la ejecución (compiladores y
librerías), se ha propuesto un nuevo diseño del ASLR, llamado
ASLR-NG, el cual: maximiza la entropía, soluciona el problema de la
fragmentación y elimina las debilidades encontradas. Al igual que la
solución propuesta para el SSP, la nueva propuesta de ASLR es
transparente para las aplicaciones y compatible a nivel
binario sin introducir sobrecarga. ASLR-NG ha sido implementado como
un parche del núcleo de Linux para la versión 4.1.
La diversificación software es una técnica que cubre una amplia gama
de fallos, incluidos los errores de memoria. La principal dificultad
para aplicar esta técnica radica en la generación de las
"variantes", que son programas que tienen un comportamiento idéntico
entre ellos ante entradas normales, pero tienen un comportamiento
diferenciado en presencia de entradas anormales. Se ha propuesto una
novedosa forma de generar variantes de forma automática a partir de un
mismo código fuente, empleando la emulación de sistemas.
Una de las máximas de esta investigación ha sido la aplicabilidad de
los resultados, por lo que se ha hecho especial hincapié en el
desarrollo de prototipos sobre sistemas reales a la par que se llevaba
a cabo el estudio teórico. Como resultado, las propuestas de esta
tesis son directamente aplicables a sistemas reales, algunas de ellas
ya están siendo explotadas en la práctica. / [CAT] La creació de programari suposa un dels reptes més complexos per al ser humà ja
que requerix un alt grau d'abstracció. Encara que s'ha avançat molt en les
metodologies per a la prevenció de les fallades de programari, és palès que el
programari resultant dista molt de ser confiable, i hem d'assumir que el
programari que es produïx no està lliure de fallades. Donada la impossibilitat
de dissenyar o implementar sistemes lliures de fallades, és necessari
incorporar tècniques de mitigació d'errors per a millorar la seguretat.
La present tesi realitza aportacions en tres de les principals tècniques de
mitigació d'errors de corrupció de memòria: Stack Smashing Protector (SSP),
Address Space Layout Randomisation (ASLR) i Automatic Software
Diversification.
SSP és una tècnica de protecció molt efectiva contra atacs de desbordament de
buffer en pila, però és sensible a atacs de força bruta, en particular al
perillós atac denominat byte-for-byte.
S'ha proposat una nova modificació del SSP, RenewSSP, la qual elimina els atacs
de força bruta. Pot ser usada de manera completament transparent amb els
programes existents sense introduir sobrecàrrega. El RenewSSP és especialment
beneficiós en dos àrees d'aplicació: servidors de xarxa (provat en Apache) i
llançadors d'aplicacions eficients (provat en Android).
ASLR és un concepte genèric, del qual hi ha multitud de dissenys i
implementacions. S'han analitzat les dos implementacions més rellevants de
Linux (Vanilla Linux i PaX patch), trobant-se en ambdues tant debilitats com
elements millorables. Tenint en compte les millores tecnològiques en el suport
a l'execució (compiladors i llibreries), s'ha proposat un nou disseny de
l'ASLR: ASLR-NG, el qual, maximitza l'entropia, soluciona el problema de
la fragmentació i elimina les debilitats trobades. Igual que la solució
proposada per al SSP, la nova proposta d'ASLR és transparent per a les
aplicacions i compatible a nivell binari sense introduir sobrecàrrega. ASLR-NG
ha sigut implementat com un pedaç del nucli de Linux per a la versió 4.1.
La diversificació de programari és una tècnica que cobrix una àmplia gamma de
fa\-llades, inclosos els errors de memòria. La principal dificultat per a aplicar
esta tècnica radica en la generació de les "variants", que són programes que
tenen un comportament idèntic entre ells davant d'entrades normals, però tenen
un comportament diferenciat en presència d'entrades anormals. S'ha proposat una
nova forma de generar variants de forma automàtica a partir d'un mateix codi
font, emprant l'emulació de sistemes.
Una de les màximes d'esta investigació ha sigut l'aplicabilitat dels resultats,
per la qual cosa s'ha fet especial insistència en el desenrotllament de
prototips sobre sistemes reals al mateix temps que es duia a terme l'estudi
teòric. Com a resultat, les propostes d'esta tesi són directament aplicables
a sistemes reals, algunes d'elles ja estan sent explotades en la pràctica. / Marco Gisbert, H. (2015). Cyber-security protection techniques to mitigate memory errors exploitation [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/57806 / TESIS
|
178 |
High-level, Product Type-specific Programmatic Operations for Streamlining Associative Computer-aided DesignScott, Nathan W. 12 August 2008 (has links) (PDF)
Research in the field of Computer Aided Design (CAD) has long focused on reducing the time and effort required of engineers to define three dimensional digital product models. Parametric, feature-based modeling with inter-part associativity allows complex assembly designs to be defined and re-defined while maintaining the vital part-to-part interface relationships. The top-down modeling method which uses assembly level control structures to drive child level geometry has proved valuable in maintaining these interfaces. Creating robust parametric models like these, however, is very time consuming especially since there can be hundreds of features and thousands of mathematical expressions to create. Even if combinations of low-level features, known as User-Defined Features (UDFs), are used, this process still involves inserting individual features into individual components and creating all of the inter-part associativities by hand. This thesis shows that programmatic operations designed for a specific product type can streamline the assembly and component-level design process much further because a single programmatic operation can create an unlimited number of low-level features, modify geometry in multiple components, create new components, establish inter-part expressions, and define inter-part geometry links. Results from user testing show that a set of high-level programmatic operations can offer savings in time and effort of over 90% and can be general enough to support user-specified interface layouts and component cross sections while leaving the majority of the primary design decisions open to the engineer.
|
179 |
From cultural heritage to cultural heritage informatics : critically investigating institutions, processes and artefactsInnocenti, Perla January 2013 (has links)
Background and rationale: Collecting is a basic human activity, a cultural phenomenon establishing cultural values, defining authenticity and creating new identities for collected objects and collectors. For more than a decade, I have studied cultural heritage collections from three key interwoven perspectives. These approaches are evident in the six publications selected for this submission: • Architectural and organisational perspective: at the Vatican Gallery (Innocenti 2001a), Uffizi (Innocenti 2003a) and Biblioteca Laurenziana (Innocenti 2002a) I investigated institutional collector and key stakeholder strategies for designing collection space and displays. I then applied this analysis to‘knowledge architecture’ for industrial design artefacts and processes (Innocenti 2004c). • Procedural and functional perspective: from Palladio drawings (Innocenti 2005a) to industrial design knowledge bases (Innocenti 2004a), I investigated how to digitize, archive, render and make accessible cultural heritage as an accurate iconic representation, interwoven with documentary and cultural contexts. The work further led me to study the authenticity of born-digital artworks (Innocenti 2012c). • Artefact perspective: I explored how artists and institutional collectors address the preservation of artworks, from the Renaissance desks of the Biblioteca Laurenziana (Innocenti 2002a) to digital artworks (Innocenti 2012c), and the historical and theoretical implications of their choices. In each of these areas, I contextualized the interrelations between cultural heritage discourse and the history of collecting cultural artefacts within given historical, social and cultural periods. My work began in Italy, where cultural heritage is deeply rooted and widespread, and moved on to encompass Europe and North America in tracing the evolution of cultural heritage collectors’ strategies. I adopted an interdisciplinary approach, engaging perspectives, methods and theoretical frameworks from art history, art theory, museography, museology, library and information science, information technology, social anthropology and engineering. Starting from this multi-focal vantage point my research has resulted in contributions to knowledge, methods and theory. These publications on one hand demonstrate the continuum of key issues in cultural heritage creation, preservation and access as manifested in the strategies of institutional collectors and artists. On the other hand, they highlight the new paradigms and transformations introduced by digital and communication technologies, the shaping of cultural heritage informatics to address these transformations and the theoretical and methodological implications underlying them. Through my scholarly research, I contributed to progressing the canonical historicisation of cultural heritage, museography and museology, and to exploring the new paradigms and transformations introduced by digital and communication technologies to the disruptive and exciting world of cultural heritage informatics. The portfolio: The portfolio is a selection from Perla Innocenti’s more than forty publications of research carried out since 2001 on cultural heritage and informatics with the Universitá degli Studi di Roma ‘La Sapienza’, Scuola Normale Superiore di Pisa, Istituto Nazionale di Archeologia e Storia dell’Arte in Rome, Pinacoteca Nazionale di Bologna, Italian Ministry of Cultural Heritage and Fondazione Andrea Palladio, Politecnico di Milano and EU-funded projects SHAMAN and MeLa. Six scientific publications are presented: two journal articles, a scholarly treatise, a published conference paper, key chapters from a monograph and one book chapter from an edited volume. The works have two key themes relevant to the critical analysis and understanding of heritage institutions’ evolution up to the digital age. The themes illustrate the contribution each publication has made to the literature and explain the relationship between the works submitted, including developments which have occurred between one piece and another. Theme I: Evolution of museography, museology and heritage studies Three publications are presented under this theme, each of these presenting the critical analysis of cultural heritage institutions and their artefacts within the historical evolution of museums and libraries. Publication I presents the critical analysis of the museographic principles applied by Luca Beltrami to the design of the Vatican Gallery, investigated and contextualised within its museographical and cultural history (Innocenti 2001a). Publication II presents the critical analysis and findings of the museological and museographical principles applied by Corrado Ricci to the Uffizi Gallery in the 19th Century, compared with the contemporary principles in the Uffizi applied by the former Superintendent and Italian Ministry Antonio Paolucci (Innocenti 2003a). Publication III presents the analysis and original findings of Michelangelo’s ergonomic design of the Biblioteca Laurenziana fittings, within the historical evolution of libraries (Innocenti 2002a). Theme II: Creating, managing, disseminating and preserving digital cultural heritage The publications presented in this theme relate to methodologies and processes characterising diverse typologies of analogue and digital cultural heritage and the emerging field of cultural informatics. Publication IV presents the novel methodological approach defined and applied within a relevant digitization project of Andrea Palladio manuscripts and maps (Innocenti 2005a). Publication V presents the outcomes of my investigation defining and implementing an online knowledge-based system supporting research and teaching of industrial design, which is formally considered part of Italian cultural heritage (Innocenti 2004a). Publication VI discusses the repositioning of traditional conservation concepts of historicity, authenticity and versioning in relation to born-digital artworks, based on findings from my research on preservation of computer-based artefacts by public collectors (Innocenti 2012a).
|
180 |
Computergestützte Simulationsschnittstelle – Optimierte Systementwicklung in der Mechatronik / Computer Aided Simulation Interface – Optimized System Development in MechatronicsZekeyo, S. Jewoh, Nezhat, S., Schropp, C., Miller, S. 08 June 2017 (has links) (PDF)
Das Verbinden der Konstruktions- mit der Simulationsdisziplin für Mehrkörpersimulationen ermöglicht es, Produkte in der Konstruktionsumgebung zu gestalten und anschließend in der Simulationsumgebung unter gewünschten Einflüssen auszulegen. Disziplinübergreifende Kommunikation zwischen entsprechenden Softwareprodukten erfolgt meist indirekt, manuell und unter Integritätsverlusten. Zwischen verschiedenen CAD Systemen und MATLAB besteht keine direkte Verbindung, weshalb die SANEON GmbH zusammen mit dem Institut für Flugsystemdynamik der Technischen Universität München eine Schnittstelle zum automatischen, bidirektionalen und integritätsverlustfreien Austausch zwischen den Systemen entwickelt hat. So kann in MATLAB und Simscape Multibody (früher SimMechanics) vollautomatisiert ein Mehrkörpersimulationsmodell auf Basis eines CAD-Modells aufgebaut werden. Darüber hinaus können Daten zurück an die CAD-Umgebung gesendet werden und somit Daten bidirektional ausgetauscht werden. Das hieraus entstandene Alleinstellungsmerkmal des vollautomatisierten und bidirektionalen Austausches unserer Innovation ist ein Novum auf dem Markt.
Mit CASIN (Computer Aided Simulation INterface) stellen wir eine neuartige Plattform bereit, die Ihnen den domänenübergreifenden Transfer von CAD-Daten zwischen Konstruktions- und Simulationsumgebung erlaubt. So kann auf Bauteil- und Baugruppeninformationen per Knopfdruck unmittelbar in MATLAB zugegriffen werden. Benutzerdefinierte CAD-Parameter können aus MATLAB heraus modifiziert werden. Somit ist die Grundlage für einen iterativen Datenaustausch zwischen den Disziplinen geschaffen.
|
Page generated in 0.0206 seconds