Structural Software for Education

In: Science

Submitted By z953ss
Words 3990
Pages 16
1.0 Introduction
In this era of information technology, civil engineers rely heavily on software to perform their design tasks. Unfortunately, most commercial structural analysis packages are closed-source, which means that the operations that the program performs cannot be inspected by the user.
Moreover, such software packages are invariably very pricey, and, hence, are generally not affordable for students and smaller engineering firms.
The objective of this design project was to design a structural analysis program that would be free of charge and available to all. This computer program was to be open source and well commented, so that its users could comprehend the operations performed in the analysis of a given structure.
To accomplish these objectives, the generalized stiffness method of structural analysis was implemented into a computer algorithm. This algorithm, called “TrussT Structural Analysis”, is a collection of visual basic modules embedded in a Microsoft Excel document using Visual Basic for Applications (VBA). This design report outlines the theory behind TrussT Structural
Analysis, as well as the methods by which that theory was implemented into computer algorithms. The first two sections of this report present the theory of the generalized stiffness method of structural analysis and its implementation into a computer algorithm. The following sections present the procedures by which the stiffness method was modified to incorporate the analysis of structure with special characteristics such as member applied loads, member releases or support settlements. A computer implementation of the Euler method of analysis is described to account for the geometric non-linearity of structures. Finally, algorithms that can generate member force diagrams and moment diagrams are presented.
2.0 Generalized Stiffness Method
The term stiffness…...

Similar Documents

Structural Collapse

...Structural Collapse Fire fighters and other emergency rescue workers (first responders) have to contend with a variety of natural events causing collapsed structures such as earthquakes, fire, heavy snow accumulations, hurricanes, tornadoes, and landslides. Today, emergency responders face the added threat of entering buildings that have collapsed as a result of a terrorist attack. For example, the first terrorist attack on the World Trade Center in 1993, the Alfred P. Murray Federal Building bombing in Oklahoma City in 1995, the second terrorist attack on the World Trade Center on 9-11-01 as well as the Pentagon. Not only do these emergency responders face the expected dangers upon entering a collapsed building such as natural gas leaks, fire, exposure to live electrical wiring, secondary collapse and insufficient oxygen, they may now have to face the unexpected hazards of secondary explosive devices and residual contamination from CBRN. As a means of mitigating these types of major disasters first responders, particularly firefighters have been asked to take on additional responsibilities which include the management of hazardous materials, confined space, water rescue and structural collapse. The attacks that occurred on 9/11 and the hurricanes that struck the gulf coast revealed shortcomings in response capabilities and demonstrated the need for increased training and preparation to respond to acts of terrorism and large-scale manmade and natural disasters. Recent......

Words: 455 - Pages: 2

Software

...Five Models Of Software Engineering Nabil Mohammed Ali Munassar1 and A. Govardhan2 1 Ph.D Student of Computer Science & Engineering Jawahrlal Nehru Technological University Kuktapally, Hyderabad- 500 085, Andhra Pradesh, India Professor of Computer Science & Engineering Principal JNTUH of Engineering College, Jagityal, Karimnagar (Dt), A.P., India 2 Abstract This research deals with a vital and important issue in computer world. It is concerned with the software management processes that examine the area of software development through the development models, which are known as software development life cycle. It represents five of the development models namely, waterfall, Iteration, V-shaped, spiral and Extreme programming. These models have advantages and disadvantages as well. Therefore, the main objective of this research is to represent different models of software development and make a comparison between them to show the features and defects of each model. Keywords: Software Management Processes, Software Development, Development Models, Software Development Life Cycle, Comparison between five models of Software Engineering. increased recently which results in the difficulty of enumerating such companies. During the previous four decades, software has been developed from a tool used for analyzing information or solving a problem to a product in itself. However, the early programming stages have created a number of problems turning software an obstacle......

Words: 3810 - Pages: 16

Structural Analysis

... Structural Engineer’s Pocket Book This Page Intentionally Left Blank Structural Engineer’s Pocket Book Fiona Cobb AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Elsevier Butterworth-Heinemann Linacre House, Jordan Hill, Oxford OX2 8DP 200 Wheeler Rd, Burlington, MA 01803 First published 2004 Copyright ª 2004, Fiona Cobb. All rights reserved The right of Fiona Cobb to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988 No part of this publication may be reproduced in any material form (including photocopying or storing in any medium by electronic means and whether or not transiently or incidentally to some other use of this publication) without the written permission of the copyright holder except in accordance with the provisions of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London, England W1T 4LP. Applications for the copyright holder’s written permission to reproduce any part of this publication should be addressed to the publisher Permissions may be sought directly from Elsevier’s Science and Technology Rights Department in Oxford, UK: phone: (þ44) (0) 1865 843830; fax: (þ44) (0) 1865 853333; e-mail: permissions@elsevier.co.uk. You may also complete your request on-line via the Elsevier homepage (http://www.elsevier.com), by......

Words: 32006 - Pages: 129

Structural Functionalism

...Institutions are the main structures of our society and the basis of our social interactions. Sociology is the study of social behaviours of humans in a group; a society. Therefore the most important study of sociology is structural functionalism stating that a society is stable when all institutions meet the needs of its citizens. Structural functionalism places a large emphasis on how these structures are the main importance to social interactions and how they bring happiness to a community, creating a positive function in society. Think abou the last itme you met someone or just interacted with another human being outside of your home setting, it was most positively in a social institution such as a school, work or possibly a church. Without these structures, interactions with others would be at a minimum, maybe when you would have a brief conversation when passing someoe on the street but it is very rare you would socialize with a stranger unless you are put into a institutional setting. Emile Durkeim’s theories are what make up the base of structural functionalism. Durkeim created his theories on the belifes that society functions logically, protection the intrest of it’s members as well as looking at the forces that unite individuals in society. Obviously social interactions are extremely important to us because we define ourselves by our social interactions with others at home but more importantly at work, school and worship where you usually share similar views......

Words: 335 - Pages: 2

Structural Analysis

...Structural Analysis and Modeling Assignment – 1 2013 Answer all questions. 1. When the deflections of a statically determinant beam are calculated using singularity functions, it is necessary to know the values of 2 boundary conditions. For each of the beams below, what are the boundary conditions? 2. Calculate the reactions and draw the SFD and BMD for the cantilever beams below. Using singularity functions, calculate the deflection at 2 metres, the deflection at the tip, and sketch the deflected shape. The cross section of the beam is 300 mm deep by 200 mm wide, and it is made of concrete with a Young’s modulus of 30,000 MPa. 4. Using singularity functions, derive (in terms of P) the equation for the upwards deflection at midspan of the beam below. EI = 10 x 106 Nm2 5. Determine the location and value of the maximum deflection for the beam below. How far from the centre is the point of maximum deflection (expressed as a percentage of the span length)? EI = 10 x 106 Nm2 6. Calculate the reactions and draw the shear force and bending moment diagrams for the beam below. EI = 10 x 106 Nm2 (Note that this has four reactions, so the 3 equations of equilibrium do not give sufficient information to solve the problem – it is statically indeterminate. The answer requires you to use the results from questions 4 and 5). 7. For the beam below, use singularity functions to determine an equation for the deflected shape, expressed in terms of x (measured from......

Words: 350 - Pages: 2

Software

...object composition than class inheritance.as that happens,emphasis shifts away from hard-coding a fixed set of behaviors toword defining a smaller set of fundamental behaviours that can be composedinto any no. of more complex onces.thus creating objects with perticular behaviour requires more than simply instantiating a class. Design patterns “Each pattern describes a problem which occurs over and over again in our environment, and then describes the core of the solution to that problem, in such a way that you can use this solution a million times over, without ever doing it the same way twice.” [Christopher Alexander] Design patterns capture the best practices of experienced object-oriented software developers. Design patterns are solutions to general software development problems. A pattern has four essential elements * Pattern Name * Problem * Solution * Consequences Pattern Name: Is a handle we can use to describe a design problem, it’s solutions & consequences in a word or two. Naming a pattern immediately increases our design vocabulary. It lets us design at a higher level of abstraction. Problem: It describes when to apply the pattern. It explains the problems and it’s context. It might describe specific design problems such as how to represent algorithms as objects. It might describe class or object structures that are symptomatic of an inflexible design. Solution: Describes the elements that make up the......

Words: 1228 - Pages: 5

Structural Theories

...Structural theories One of the theories is Marxism who studies society on a macro perspective so they generate a lot of statistics. They concentrate a lot on class and believe there is conflict between two opposing classes’ bourgeoisie and working class. They have a similar view to the social action theory and that view is in society there is struggle between the powerful and the powerless. They also have a view on feminism and that is it’s not just men who exploit women but also capitalist. Their view is capitalism is the root of all exploitation which also creates competition between social classes. They have views on the role of the family and they believe family maintains capitalism. They have a very strong opinion on school and believe education reproduce a passive workforce for capitalism as in students are taught workers should accept their position and that causes less conflict for the capitalists. They also believe education creates class inequality as in upper class are meant to succeed whilst lower class are meant to fail. They believe school is just preparation for the work force as in the rules students are told follow. This creates ideological dominants by the school as they promote the rich stay rich and the poor stay poor. They also believe that education reproduces the public structure. The Marxist theory has been criticised by other theories which is typical in sociology. Functionalists believe they focus too much on class and need to look more at......

Words: 1710 - Pages: 7

Structural Approach

...Structural family therapy (SFT) is a method of psychotherapy developed by Salvador Minuchin which addresses problems in functioning within a family. Structural Family Therapists strive to enter, or "join", the family system in therapy in order to understand the invisible rules which govern its functioning, map the relationships between family members or between subsets of the family, and ultimately disrupt dysfunctional relationships within the family, causing it to stabilize into healthier patterns.[1] Minuchin contends that pathology rests not in the individual, but within the family system. SFT utilizes, not only a special systems terminology, but also a means of depicting key family parameters diagrammatically. Its focus is on the structure of the family, including its various substructures. In this regard, Minuchin is a follower of systems and communication theory, since his structures are defined by transactions among interrelated systems within the family. He subscribes to the systems notions of wholeness and equifinality, both of which are critical to his notion of change. An essential trait of SFT is that the therapist actually enters, or "joins", with the family system as a catalyst for positive change. Joining with a family is a goal of the therapist early on in his or her therapeutic relationship with the family. Structural and Strategic therapy are important therapeutic models to identify as many therapists use these models as the bases for treatment. Each......

Words: 1894 - Pages: 8

Structural

... Forgiveness therapy focuses on resentment, which can lead to depression, anxiety, and other negative psychological outcomes (). Based on the material that this writer has read, forgiveness is a decision to give up resentment and to be able to set aside selfishness, and to be able to acquire a sense of peace to move forward in their lives without reconciling with the person which abused them. There were 20 women ranging from 30 to 54 who had been psychologically abused, which participated in a research study. To be eligible to participate in this study, the woman had to have been emotionally abused, they had to be divorced or either separated permanently from their partner for at least 2 years. These woman ranged in race, ethnicity, education and work background. By participating in this study, Enright and Reed (2006) thought that if women used the forgiveness techniques they would see a decrease in depression, anxiety, and post-traumatic stress and an increase in her self-esteem and decision making process. Reflection...

Words: 272 - Pages: 2

Software

...HACKING SECRETS REVEALED Information and Instructional Guide HACKING SECRETS REVEALED Production of  S&C Enterprises T able of Contents Disclaimer Introduction i Trojans Joiners ICQ CHAPTER 1 1 Chapter 6 Access Granted CHAPTER 2 1 15 18 18 19 19 19 19 CHAPTER 7 42 43 44 45 49 55 59 Bank Account Information Email Pictures Resume Survellance Via Internet Connection 36 37 39 39 39 40 29 34 34 System Intrusion in 15 Seconds The Trojan Horse The Hack NewsGroups Grapevine Email Un-Safe Websites IRC ChatSites CHAPTER 3 20 20 Acceptable Files Readme & Text Files How To protect Yourself Firewalls Antivirus Software Tips & Tricks Protecting Shared Resources Disabling File and Printer Sharing Oh No My system's Infected Chapter 4 Who are Hackers Anarchist Hackers Hackers Crackers 24 24 25 26 Chapter 8 Every Systems Greatest Flaw Chapter 9 How to Report Hackers 65 60 Chapter 5 Tools of the Trade Portscanners 27 28 Chapter 10 Final Words 74 DISCLAIMER The authors of this manual will like to express our concerns about the misuse of the information contained in this manual. By purchasing this manual you agree to the following stipulations. Any actions and or activities related to the material contained within this manual is solely your responsibility. The misuse of the information in this manual can result in criminal charges brought against the persons in question. The authors will not be held responsible in the event any criminal charges be brought against any......

Words: 11585 - Pages: 47

Software

...Principle of Software Engineering Table of Contents Abstract 3 Introduction 4 Boehm's First Law 4 Boehm's Second law 5 Conway's law 5 Parnas Law 6 Corbató Law 7 Observation 8 Theory 9 Law 9 Question 3 10 Law 11 References 12 Abstract The purpose of the study is to show the capability to understand the set of laws that are the part of principles of the software engineering. In this paper, it is discussed that there are many laws related to the software engineering but only few of them are to be addressed. Boehm first and second law, Conway’s laws, Parnas laws & Corbato law were discussed with examples. There are two relationship processes that are also discussed, related to the software Engineering. Law method and tools which are depended on each other and they are performing the task with the help of principle and process by following the rules. Same scenario is followed in other relation too, where observation, law and theory are depended on each other. Observation is repeatable to law and law is explained by theory. Theory should be confirmed by the law and it predict by the observation before further proceeding. Introduction Question No 1 Boehm's First Law Errors are more regular in the middle of fundamentals and configuration exercises and are more abundant when they are displaced. In this law, some basic configuration errors do outnumber code blunders. However, cost stays......

Words: 1641 - Pages: 7

Software

...Identify two periodical publications that focus on software architecture (either solely or partly). Submit the following information: publication name, URL, publisher name, & the year it was first published. IEEE Potentials, First Publication Year: 1982 URL : http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=45 Publisher Name: IEEE Xplore Msdn magazine First Publication Year: 2001 URL: http://msdn.microsoft.com/en-us/magazine/dn973005.aspx Publisher Name: The Microsoft journal for developers Write a half-page short essay comparing and contrasting software architects and software engineers. Software architect has responsibility for guaranteeing coherence of all aspects of the project as an integrated system. Architect answerable for overall technical quality, developer for lower implementation selections. The architect holds the futuristic views and proactively sees the system before it\'s designed, being the holder of the vision. Software architect focuses on money and also the disposition and drive to guide individuals. a leader who will apply/share their broad framework. Pragmatic handling of the technical solution and act with the business in addition as the techies, marketing the vision to each. A software architect has the vision to own the most effective style ideas. Architects will see each micro and macro (inwards and outward) whereas engineers see small and outwards and want to be carried by the architect to examine macro/outwards. Maintaining...

Words: 892 - Pages: 4

Structural Policies

...BACK TO BASICS What Are Structural Policies? Monetary and fiscal policies deal with short-term economic fluctuations, but an economy’s problems often go deeper Khaled Abdel-Kader E CONOMIES can get out of whack for a variety of reasons. Policymakers, in turn, have a number of ways to try to fix them, depending on what is wrong. For example, when prices are rising too fast and consumers and businesses are buying at a rate that exceeds an economy’s underlying ability to produce goods and services—that is, overall demand is growing too fast—policymakers can take steps to reduce demand. Similarly, during economic downturns, when businesses and consumers close their wallets—aggregate demand is shrinking—governments can take steps to encourage them to open their pocketbooks or substitute government spending for diminished private spending. Such government actions are called demand management or stabilization policies. Sometimes an economy’s problems are deeper and longer lasting than excessive or inadequate demand, usually as a result of government policies or private practices that impede efficient and fair production of goods and services—that is, supply. Fixing such problems can require changes to the fabric of the economy, called structural policies. Stabilization policies are important in the short run, because it is easier to alter the various components of overall demand for a short time than it is to make a country’s resources more productive.......

Words: 1617 - Pages: 7

Software

...processor, RISC and CISC instruction set. UNIT II Memory devices; Semiconductor and ferrite core memory, main memory, cache memory, associative memory organization; concept of virtual memory; memory organization and mapping; partitioning, demand paging, segmentation; magnetic disk organization, introduction to magnetic tape and CDROM. UNIT III IO Devices, Programmed IO, interrupt driver IO, DMA IO modules, IO addressing; IO channel, IO Processor, DOT matrix printer, ink jet printer, laser printer. Advanced concepts; Horizontal and vertical instruction format, microprogramming, microinstruction sequencing and control; instruction pipeline; parallel processing; problems in parallel processing; data hazard, control hazard. UNIT IV ILP software approach-complier techniques-static branch protection-VLIW approach-H.W support for more ILP at compile time-H.W verses S.W solutions Multiprocessors and thread level parallelism-symmetric shared memory architectures-distributed shared memory-Synchronization-multi threading. UNIT V Storage System-Types-Buses-RAID-errors and failures-bench marking a storage device designing a I/O system. Inter connection networks and clusters-interconnection network media – practical issues in interconnecting networks-examples-clusters-designing a cluster Text Books: 1. “Computer organization and architecture”, Williams Stallings, PHI of India, 1998. 2. Computer organization, Carl Hamachar, Zvonko Vranesic and Safwat Zaky, McGraw Hill......

Words: 3183 - Pages: 13

Relationship of Centralization to Other Structural

...Relationship of Centralization to Other Structural Properties Paper citation: Jerald Hage and Michael Aiken, “Administrative Science Quarterly” Vol. 12, No. 1 (Jun., 1967), pp. 72-92 Group AC2: Ankit Kumar Baranwal (14F506) Ashish Girdhar Gyanchandani (14F513) Charu Pandey (14F516) Natesh Bhardwaj H S (14F535) Surya Bakshi (14F550) 1 Overview In the article titled “Relationship of Centralization to Other Structural Properties”, Jerald Hage and Michael Aiken talk about two different ways of measuring distribution of power. They collect data by conducting survey in 16 hospitals and welfare organizations of which 10 are private and 6 are public. The purpose of this article is to explore the relationship between centralization of power and two critical aspect of organizational social structure, namely; the degree of formalization and the degree of complexity. Here, Hage and Aiken measure the degree of complexity using three factors, namely; the number of occupational specialties, the amount of professional training and professional activity while on the other hand the degree of formalization is being measured in terms of degree of job codification and the amount of rule observation. The author Jerald Hage is a Professor Emeritus and Co-Director of Center for Innovation, University of Maryland. He completed his Bachelor of Business Administration (B.B.A.), marketing from University of Wisconsin and Doctor of Philosophy (PhD) in sociology......

Words: 2055 - Pages: 9