3 resultados para test cases generator
Resumo:
The goal of this work is to present an efficient CAD-based adjoint process chain for calculating parametric sensitivities (derivatives of the objective function with respect to the CAD parameters) in timescales acceptable for industrial design processes. The idea is based on linking parametric design velocities (geometric sensitivities computed from the CAD model) with adjoint surface sensitivities. A CAD-based design velocity computation method has been implemented based on distances between discrete representations of perturbed geometries. This approach differs from other methods due to the fact that it works with existing commercial CAD packages (unlike most analytical approaches) and it can cope with the changes in CAD model topology and face labeling. Use of the proposed method allows computation of parametric sensitivities using adjoint data at a computational cost which scales with the number of objective functions being considered, while it is essentially independent of the number of design variables. The gradient computation is demonstrated on test cases for a Nozzle Guide Vane (NGV) model and a Turbine Rotor Blade model. The results are validated against finite difference values and good agreement is shown. This gradient information can be passed to an optimization algorithm, which will use it to update the CAD model parameters.
Resumo:
This paper presents an FEM analysis conducted for optimally designing end mill cutters through verifying the cutting tool forces and stresses for milling Titanium alloy Ti-6Al-4 V. Initially, the theoretical tool forces are calculated by considering the cutting edge on a cutting tool as the curve of an intersection over a spherical/flat surface based on the model developed by Lee & Altinas [1]. Considering the lowest tool forces the cutting tool parameters are taken and optimal design of end mill is decided for different sizes. Then the 3D CAD models of the end mills are developed and used for Finite Element Method to verify the cutting forces for milling Ti-6Al-4 V. The cutting tool forces, stress, strain concentration (s), tool wear, and temperature of the cutting tool with the different geometric shapes are simulated considering Ti-6Al-4 V as work piece material. Finally, the simulated and theoretical values are compared and the optimal design of cutting tool for different sizes are validated. The present approach considers to improve the quality of machining surface and tool life with effects of the various parameters concerning the oblique cutting process namely axial, radial and tangential forces. Various simulated test cases are presented to highlight the approach on optimally designing end mill cutters.
Resumo:
Stealthy attackers move patiently through computer networks - taking days, weeks or months to accomplish their objectives in order to avoid detection. As networks scale up in size and speed, monitoring for such attack attempts is increasingly a challenge. This paper presents an efficient monitoring technique for stealthy attacks. It investigates the feasibility of proposed method under number of different test cases and examines how design of the network affects the detection. A methodological way for tracing anonymous stealthy activities to their approximate sources is also presented. The Bayesian fusion along with traffic sampling is employed as a data reduction method. The proposed method has the ability to monitor stealthy activities using 10-20% size sampling rates without degrading the quality of detection.