17,782 results on '"REVERSE engineering"'
Search Results
2. The 3D photogrammetry approach of tiny model using the rotative scanning
- Author
-
Fawzy, Hossam El-Din, Badawy, Maher, and Farhan, Magda
- Published
- 2024
- Full Text
- View/download PDF
3. The Neurostimulationist will see you now: prescribing direct electrical stimulation therapies for the human brain in epilepsy and beyond.
- Author
-
Hadar, Peter N., Zelmann, Rina, Salami, Pariya, Cash, Sydney S., and Paulk, Angelique C.
- Subjects
ELECTRIC stimulation ,PARKINSON'S disease ,OBSESSIVE-compulsive disorder ,REVERSE engineering ,NEURAL stimulation ,DEEP brain stimulation ,BRAIN stimulation - Abstract
As the pace of research in implantable neurotechnology increases, it is important to take a step back and see if the promise lives up to our intentions. While direct electrical stimulation applied intracranially has been used for the treatment of various neurological disorders, such as Parkinson's, epilepsy, clinical depression, and Obsessive-compulsive disorder, the effectiveness can be highly variable. One perspective is that the inability to consistently treat these neurological disorders in a standardized way is due to multiple, interlaced factors, including stimulation parameters, location, and differences in underlying network connectivity, leading to a trial-and-error stimulation approach in the clinic. An alternate view, based on a growing knowledge from neural data, is that variability in this input (stimulation) and output (brain response) relationship may be more predictable and amenable to standardization, personalization, and, ultimately, therapeutic implementation. In this review, we assert that the future of human brain neurostimulation, via direct electrical stimulation, rests on deploying standardized, constrained models for easier clinical implementation and informed by intracranial data sets, such that diverse, individualized therapeutic parameters can efficiently produce similar, robust, positive outcomes for many patients closer to a prescriptive model. We address the pathway needed to arrive at this future by addressing three questions, namely: (1) why aren't we already at this prescriptive future?; (2) how do we get there?; (3) how far are we from this Neurostimulationist prescriptive future? We first posit that there are limited and predictable ways, constrained by underlying networks, for direct electrical stimulation to induce changes in the brain based on past literature. We then address how identifying underlying individual structural and functional brain connectivity which shape these standard responses enable targeted and personalized neuromodulation, bolstered through large-scale efforts, including machine learning techniques, to map and reverse engineer these input-output relationships to produce a good outcome and better identify underlying mechanisms. This understanding will not only be a major advance in enabling intelligent and informed design of neuromodulatory therapeutic tools for a wide variety of neurological diseases, but a shift in how we can predictably, and therapeutically, prescribe stimulation treatments the human brain. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Holes position prediction and inverse design on complex surface in deep-drawing process with sand dies based on NURBS and deformation mathematical zoning.
- Author
-
Li, Yuanyuan, Wang, Hongyu, Liu, Menghan, Yang, Dehui, Sun, Jie, Zhang, Shunhu, and Ma, Xiangkun
- Abstract
Machining the holes on the widely used deep-drawing products requires significant time or equipment costs. Therefore, it is a feasible way to design the initial sheets by a reverse engineering method to guide the forming of the final products. However, since the combinations of both the highly precise fitting of the complex surfaces and the zoning supported by mold geometric parameters are difficult, the existing reverse engineering models are not available. So a novel reverse engineering method with NURBS considering mathematical zoning for deep-drawing with sand die is provided in this paper. Also based on the lower sand die, upper sand die, and only metal dies, three different groups with complex surfaces are named as LS, US, and R, respectively. To study the influences of complexities of both surfaces and hole shapes on the forming results of the deep-drawing products, the position prediction model established by the method is forward validated by five holes with different symmetries on three complex surfaces. The inverse model is used to design holes for three complex surfaces, and the error rates of the Group LS, the Group R, and the Group US are 1.07%, 1.38%, and 1.68%, respectively, which demonstrate the feasibility of the position prediction model. This method can provide prospective exploration for application of more complex initial sheets with holes in more widespread forming process. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Engineering Escherichia coli for utilization of PET degraded ethylene glycol as sole feedstock.
- Author
-
Chi, Junxi, Wang, Pengju, Ma, Yidan, Zhu, Xingmiao, Zhu, Leilei, Chen, Ming, Bi, Changhao, and Zhang, Xueli
- Subjects
- *
ETHYLENE glycol , *ESCHERICHIA coli , *BIOLOGICAL evolution , *REVERSE engineering , *POLYETHYLENE terephthalate - Abstract
From both economic and environmental perspectives, ethylene glycol, the principal constituent in the degradation of PET, emerges as an optimal feedstock for microbial cell factories. Traditional methods for constructing Escherichia coli chassis cells capable of utilizing ethylene glycol as a non-sugar feedstock typically involve overexpressing the genes fucO and aldA. However, these approaches have not succeeded in enabling the exclusive use of ethylene glycol as the sole source of carbon and energy for growth. Through ultraviolet radiation-induced mutagenesis and subsequent laboratory adaptive evolution, an EG02 strain emerged from E. coli MG1655 capable of utilizing ethylene glycol as its sole carbon and energy source, demonstrating an uptake rate of 8.1 ± 1.3 mmol/gDW h. Comparative transcriptome analysis guided reverse metabolic engineering, successfully enabling four wild-type E. coli strains to metabolize ethylene glycol exclusively. This was achieved through overexpression of the gcl, hyi, glxR, and glxK genes. Notably, the engineered E. coli chassis cells efficiently metabolized the 87 mM ethylene glycol found in PET enzymatic degradation products following 72 h of fermentation. This work presents a practical solution for recycling ethylene glycol from PET waste degradation products, demonstrating that simply adding M9 salts can effectively convert them into viable raw materials for E. coli cell factories. Our findings also emphasize the significant roles of genes associated with the glycolate and glyoxylate degradation I pathway in the metabolic utilization of ethylene glycol, an aspect frequently overlooked in previous research. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Brain-consistent architecture for imagination.
- Author
-
Hiroshi Yamakawa, Ayako Fukawa, Ikuko Eguchi Yairi, and Yutaka Matsuo
- Subjects
ARTIFICIAL intelligence ,REVERSE engineering ,BASAL ganglia ,PARTITION functions ,ENGINEERING design - Abstract
Background: Imagination represents a pivotal capability of human intelligence. To develop human-like artificial intelligence, uncovering the computational architecture pertinent to imaginative capabilities through reverse engineering the brain's computational functions is essential. The existing Structure-Constrained Interface Decomposition (SCID) method, leverages the anatomical structure of the brain to extract computational architecture. However, its efficacy is limited to narrow brain regions, making it unsuitable for realizing the function of imagination, which involves diverse brain areas such as the neocortex, basal ganglia, thalamus, and hippocampus. Objective: In this study, we proposed the Function-Oriented SCID method, an advancement over the existing SCIDmethod, comprising four steps designed for reverse engineering broader brain areas. This method was applied to the brain's imaginative capabilities to design a hypothetical computational architecture. The implementation began with defining the human imaginative ability that we aspire to simulate. Subsequently, six critical requirements necessary for actualizing the defined imagination were identified. Constraints were established considering the unique representational capacity and the singularity of the neocortex's modes, a distributed memory structure responsible for executing imaginative functions. In line with these constraints, we developed five distinct functions to fulfill the requirements. We allocated specific components for each function, followed by an architectural proposal aligning each component with a corresponding brain organ. Results: In the proposed architecture, the distributed memory component, associated with the neocortex, realizes the representation and execution function; the imaginary zone maker component, associated with the claustrum, accomplishes the dynamic-zone partitioning function; the routing conductor component, linked with the complex of thalamus and basal ganglia, performs the manipulation function; the mode memory component, related to the specific agranular neocortical area executes the mode maintenance function; and the recorder component, affiliated with the hippocampal formation, handles the history management function. Thus, we have provided a fundamental cognitive architecture of the brain that comprehensively covers the brain's imaginative capacities. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Hydraulic Fracture Closure Detection Techniques: A Comprehensive Review.
- Author
-
Gabry, Mohamed Adel, Eltaleb, Ibrahim, Ramadan, Amr, Rezaei, Ali, and Soliman, Mohamed Y.
- Subjects
- *
NEWTON-Raphson method , *FLUID flow , *HYDRAULIC fracturing , *REVERSE engineering , *WAVELET transforms - Abstract
This study reviews methods for detecting fracture closure pressure in both unconventional and conventional reservoirs using mathematical models and fluid flow equations. It evaluates techniques such as the Nolte method, tangent method, and compliance method. The investigation relies on observing changes in fluid flow regimes from preclosure to postclosure using fluid flow equations to examine the postclosure flow regime effect on the G function. Reverse calculations model pressure decline across synthesized flow regimes, facilitating a detailed investigation of the closure process. The analysis reveals that the tangent method is sensitive to postclosure fluid flow, while the compliance method is less effective in reservoirs with significant tortuosity or natural fractures. This paper recommends assessing natural fractures' characteristics and permeability to identify the source of leak-off before selecting a technique. It proposes integrating various methods to comprehensively understand subsurface formations, combining their strengths for accurate fracture closure identification and a better understanding of subsurface formations. The new proposed workflow employs the continuous wavelet transform (CWT) technique for fracture closure detection, avoiding physical model preassumptions or simplifications to confirm the results. This approach offers guidance on selecting appropriate methods by integrating different techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Simulation-based data reduction and data processing for sheet metal forming in the hybrid twin framework.
- Author
-
Maier, Lorenz, Ünver, Bogac, Volk, Wolfram, and Hartmann, Christoph
- Abstract
In sheet metal forming, the interaction between virtual models and the real world remains challenging. Process simulations can exhibit significant errors, and reliable measurements are often scarce during early production stages. This study presents a hybrid twin framework that systematically unifies computer-aided design, simulation, and measurement data in an adaptive manner. Central to this framework is a reverse engineering algorithm that reconstructs and transforms the geometry of deep-drawn components from optical scan data into B-spline surfaces. The algorithm demonstrated high precision, indicating its suitability for process control and geometric analysis. The hybrid twin framework integrates virtual data from simulations and real-world data, as evidenced by a sensor concept for inline surface measurement. The framework ensures robust and redundant measurement concepts by estimating complete geometries from a few systematically preselected measuring points. This adaptive approach permits continuous updates and extensions to the database, accommodating both sparse inline signals and offline inspection data. This framework provides a conceptual model for integrating direct feedback interactions between virtual and physical environments, thereby enhancing the precision of analytical and predictive models in sheet metal forming processes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. China's Arms Transfer to Iran: More Noise, Less Substance.
- Author
-
Kumar, Atul
- Subjects
ARMS transfers ,INTERNATIONAL relations ,CRUISE missiles - Abstract
China sees Iran as a crucial power with significant influence over the security landscape of the Middle East. Despite being sensitive to regional and global dynamics surrounding Iran, China cannot ignore Tehran's strategic significance. Yet, their bilateral relations are significantly influenced by the regional security environment. China has consistently prioritized its ties with the United States over Iran and has generally adhered to UN regulations concerning Iran. China's sensitivity to Arab and regional interests in the Middle East significantly impacts the China–Iran arms relationship. These concerns significantly restricted the flow of Chinese arms to Iran since 2005, with UN sanctions ultimately sealing the cessation of arms flow. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. 基于GAI的逆向工程教学思维在人机协作中的 应用研究 ————以编程教育为例.
- Author
-
翟雪松, 张丽洁, 夏亮亮, 徐 鑫, and 朱 强
- Abstract
Copyright of e-Education Research is the property of Northwest Normal University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
11. Finite Element Analysis of Relative Slip Between Tight Tops and the Human Body.
- Author
-
Bai, Yunfeng, Zhao, Jiahao, Ding, Hao, Li, Qiao, and Zhu, Shigen
- Subjects
CLOTHING & dress ,HUMAN body ,STRETCH (Physiology) ,REVERSE engineering ,FINITE element method - Abstract
To investigate the fabric performance of tight tops and the influence of clothing pressure on the relative slip between clothing and the human body, a simulation model based on finite element analysis is proposed. This model simulates the relative slip distance under dynamic conditions. Initially, a three-dimensional model for numerical simulation was established through reverse engineering. Subsequently, material properties and boundary conditions were defined. Finally, the model was analyzed using ANSYS Workbench, and the obtained results were compared with the stretch ratio of the skin on the human back. The results indicate that, under constant conditions, the Young's modulus of the fabric has a greater influence on the slip and shows a significant positive correlation, with correlation coefficients (R) all exceeding 0.99. The impact of clothing pressure on sliding is relatively small, and the sliding distance decreases with an increase in clothing pressure. In addition, it has been demonstrated that there is a significant correlation (p < 0.05) between the relative sliding distance of clothing and the stretch ratio of the skin. The study could provide a helpful guideline for the design of smart clothing, and it can provide valuable insights for various applications, such as sportswear and medical apparel. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Twin support vector regression for characterizing uncertainty in surface reconstruction.
- Author
-
Yu, ShiCheng, Miao, JiaQing, and Qin, FeiLong
- Subjects
- *
SURFACE reconstruction , *PETROLEUM prospecting , *REVERSE engineering , *NATURAL gas prospecting , *QUADRATIC programming , *GIBBERELLINS , *QUANTILE regression - Abstract
Surface reconstruction plays a pivotal role in various fields, including reverse engineering, and oil and gas exploration. However, errors in available data and insufficient surface morphology information often introduce uncertainty into the reconstruction. It is crucial to accurately characterize and visualize the uncertainty in surface reconstruction for risk analysis and planning further data collection. To this end, this paper proposes an uncertainty characterization method based on twin support vector regression. First, various modeling data are effectively integrated and the information contained in the high-confidence sample is efficiently utilized through the uncertainty interval generated by quantiles and upper/lower bound constraints. Second, well-path points are incorporated by imposing inequality constraints on the corresponding prediction points. Finally, in order to reduce computation time, the problem of uncertainty characterization is formulated as two smaller-scale quadratic programming. The results obtained from a real fault dataset and a synthetic dataset validate the effectiveness of the proposed method. When well data are available, the generated uncertainty envelopes are constrained by well data, which can partially mitigate reconstruction uncertainties. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Assessing the Health and Functionality of Linear Bearings: A Comparative Study Between Original and Replicated Models Using Time-Domain Statistical Techniques.
- Author
-
Kumar, Punyapu Sai, Mishra, Paresh Kumar, and Chandravanshi, M. L.
- Subjects
- *
ROOT-mean-squares , *REVERSE engineering , *FAST Fourier transforms , *AUTOMATION , *CURRENT distribution - Abstract
The investigation involves a comparative analysis of linear bearings fabricated by two different manufacturers. One manufacturer is known for producing original, high-quality bearings that come with a higher price tag, while the other provides more affordable alternatives through reverse engineering of the original bearings. The primary aim is to understand the practical behavior of these replicated bearings compared to the original ones and determine whether the cost-effective replicated bearings can be chosen over the more expensive originals for specific applications. This requires assessing their performance under various operational conditions (speeds of 6000, 8000, and 10,000 mm/min, and loads of 500 and 1050 g) and evaluating the impact on functionality in real-world scenarios. Time-domain statistical techniques are incorporated to quantify the differences between these bearings. Statistical scalar indicators, such as root-mean-square value, crest factor, peak, skewness, and kurtosis, are used to characterize the health status of the bearings, with the monitored parameter being the vibration signal. It has been observed that these indicators are consistently higher for the replicated bearings compared to the original ones, the defects are introduced may be during the manufacturing process or utilization low-quality materials for production of replicated bearings. The analysis, therefore, highlights notable deviations and potential issues with the replicated bearings, reinforcing the superior performance and stability of the original bearings despite their higher cost. Thus, original bearings are better suited for applications. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Software-Defined Radio Implementation of a LoRa Transceiver.
- Author
-
de Omena Simas, João Pedro, Riviello, Daniel Gaetano, and Garello, Roberto
- Subjects
- *
SOFTWARE radio , *INTERNET radio , *ACCESS control , *REVERSE engineering , *INTERNET of things - Abstract
The number of applications of low-power wide-area networks (LPWANs) has been growing quite considerably in the past few years and so has the number of protocol stacks. Despite this fact, there is still no fully open LPWAN protocol stack available to the public, which limits the flexibility and ease of integration of the existing ones. The closest to being fully open is LoRa; however, only its medium access control (MAC) layer, known as LoRaWAN, is open and its physical and logical link control layers, also known as LoRa PHY, are still only partially understood. In this paper, the essential missing aspects of LoRa PHY are not only reverse engineered, but also, a new design of the transceiver and its sub-components are proposed and implemented in a modular and flexible way using GNU Radio. Finally, some examples of applications of both the transceiver and its components, which are made to be run in a simple setup by using cheap and widely available off-the-shelf hardware, are given to show how the library can be used and extended. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Reverse Engineering Orthognathic Surgery and Orthodontics in Individuals with Cleft Lip and/or Palate: A Case Report.
- Author
-
Ko, Jaemin, Urata, Mark M., Hammoudeh, Jeffrey A., Yamashita, Dennis-Duke, and Yen, Stephen L.-K.
- Subjects
- *
ORTHOGNATHIC surgery , *CLEFT lip , *ORTHODONTICS , *REVERSE engineering , *CORRECTIVE orthodontics , *FACIAL bones , *MENTAL foramen - Abstract
This case report presents a virtual treatment simulation of the orthodontic treatment and surgery-first orthognathic surgery employed to treat a patient with a repaired unilateral cleft lip and alveolus with Class III malocclusion and lower third facial asymmetry. The patient exhibited a negative overjet of 9 mm, a missing lower right second premolar, and a 5 mm gap between the upper right central and lateral incisors with midline discrepancy. The three-dimensional virtual planning began with virtual pre-surgical orthodontics, followed by the positioning of the facial bones and teeth in their ideal aesthetic and functional positions. The sequence of steps needed to achieve this outcome was then reverse-engineered and recorded using multiplatform Nemostudio software (Nemotec, Madrid, Spain), which facilitated both surgical and orthodontic planning. The treatment included a two-piece segmental maxillary osteotomy for dental space closure, a LeFort I maxillary advancement, and a mandibular setback with bilateral sagittal split osteotomy to correct the skeletal underbite and asymmetry. A novel approach was employed by pre-treating the patient for orthognathic surgeries at age 11, seven years prior to the surgery. This early phase of orthodontic treatment aligned the patient's teeth and established the dental arch form. The positions of the teeth were maintained with retainers, eliminating the need for pre-surgical orthodontics later. This early phase of treatment significantly reduced the treatment time. The use of software to predict all the necessary steps for surgery and post-surgical orthodontic tooth movements made this approach possible. Multi-step virtual planning can be a powerful tool for analyzing complex craniofacial problems that require multidisciplinary care, such as cleft lip and/or palate. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. How Algorithms Promote Self-Radicalization: Audit of TikTok's Algorithm Using a Reverse Engineering Method.
- Author
-
Shin, Donghee and Jitkajornwanich, Kulsawasd
- Subjects
- *
REVERSE engineering , *ARTIFICIAL intelligence , *METHODS engineering , *RADICALISM , *CRITICAL analysis , *SOCIAL media - Abstract
Algorithmic radicalization is the idea that algorithms used by social media platforms push people down digital "rabbit holes" by framing personal online activity. Algorithms control what people see and when they see it and learn from their past activities. As such, people gradually and subconsciously adopt the ideas presented to them by the rabbit hole down which they have been pushed. In this study, TikTok's role in fostering radicalized ideology is examined to offer a critical analysis of the state of radicalism and extremism on platforms. This study conducted an algorithm audit of the role of radicalizing information in social media by examining how TikTok's algorithms are being used to radicalize, polarize, and spread extremism and societal instability. The results revealed that the pathways through which users access far-right content are manifold and that a large portion of the content can be ascribed to platform recommendations through radicalization pipelines. Algorithms are not simple tools that offer personalized services but rather contributors to radicalism, societal violence, and polarization. Such personalization processes have been instrumental in how artificial intelligence (AI) has been deployed, designed, and used to the detrimental outcomes that it has generated. Thus, the generation and adoption of extreme content on TikTok are, by and large, not only a reflection of user inputs and interactions with the platform but also the platform's ability to slot users into specific categories and reinforce their ideas. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Evaluation Strength of Materials of the Compressor Wheel and Engine Power in the Turbocharger.
- Author
-
Tran Huu Danh, Le Hong Ky, Pham Hoang Anh, Dang Thanh Tam, and Nguyen Hoang Hiep
- Subjects
COMPRESSOR blades ,REVERSE engineering ,STRENGTH of materials ,NUMERICAL control of machine tools ,ALUMINUM alloys ,TURBOCHARGERS - Abstract
This paper presents the research results on the strength of materials and power of the Toyota 3C engine when changing the structure and number of blades of the compressor wheel in the turbocharger. 3D models of different compressor wheels were created using reverse engineering and then simulated in the ANSYS environment with turbine shaft rotation speeds of 10,000, 15,000, and 20,000 rpm, respectively, to examine the strength of the compression wheel materials. To evaluate engine power, compressor wheels were machined on a 5-axis CNC milling machine. The MP 100S specialized test bed was used to perform experiments and compare engine power when using the original and alternative compressor wheels of the CT9 turbocharger. The compressor wheels were made of aluminum alloy, with a structure and number of blades selected to ensure durability when working. The CT9 turbocharger has a four-pair blade compressor wheel that consistently delivers higher engine power than in other cases. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. FEM Structural Analysis for Ship's Beam Modification: A Case Study.
- Author
-
Popa, Adrian, Manea, Mihaela-Greti, and Ristea-Komornicki, Marian-Valentin
- Subjects
SHIPBUILDING ,FINITE element method ,STRUCTURAL panels ,REVERSE engineering ,METHODS engineering ,SHIPYARDS - Abstract
Classification is mandatory for all seagoing ships engaged in international trade worldwide, with regulations that require the strength of the hull construction to be confirmed. Upon completion of the ship's construction or during the execution of repair works in shipyards (reconversion works, modification of panels, replacement of equipment, etc.), the strength structure of the ship may be affected and the classification society must certify that it meets the requirements. Replacing old equipment sometimes implies some variations in overall dimensions, which may impose some changes (adjustments) on the layout of structural panel elements. This study applied the Finite Element Method (FEM) considering the von Mises theory in a case study of a beam modification with the support of the ANSYS software. This study used the reverse engineering method to investigate an already implemented solution. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. An Enhanced Framework to Mitigate Post Installation Cyber Attacks on Android Apps.
- Author
-
Koka, Vijay and Muppavaram, Kireet
- Subjects
CYBERTERRORISM ,REVERSE engineering ,MOBILE apps ,MALWARE ,SMARTPHONES - Abstract
The widespread use of smartphones worldwide has led to a corresponding rise in the number of mobile applications available for Android devices. These apps offer users convenient ways to perform various daily tasks, but their proliferation has also created an environment in which attackers can steal sensitive information. Insecure options employed by many app developers create vulnerabilities that can be exploited by attackers to gain access to most smartphones. While existing methods can detect malware during app installation, they do not sufficiently address post-installation attacks, such as those resulting from fake apps or Man-in-the-Disk (MitD) attacks. To address this issue, the current study conducted research on post-installation attacks, including data leakage, malware injection, repackaging, reverse engineering, privilege escalation, and UI spoofing. MitD attacks are particularly challenging to counter, so, to mitigate this risk, the Post-Installation App Detection Method is proposed to monitor and regulate sensitive information flow and prevent MitD attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Fabrication of transfemoral prosthesis utilizing additive manufacturing and reverse engineering: a scoping review.
- Author
-
Tyagi, Bobby, Raj, Abhishek, Chandrakar, Anand Swarup, Sharma, Gaurang Swarup, Raj, Tapish, Jain, Akash, Bhardwaj, Lakshya, Sahai, Ankit, and Sharma, Rahul Swarup
- Abstract
Prosthetic rehabilitation refers to the process of restoring or improving a patient's physical function, appearance, and quality of life through the use of prosthetic devices. Providing cost-effective prosthetic rehabilitation for transfemoral amputees remains a challenging task. Traditional prosthetic fabrication methods, such as casting and lamination, are expensive and prone to fitting errors. Moreover, these methods are time-consuming, labor-intensive, and lack data-driven precision, heavily relying on artisanal expertise for socket fitting. However, recent advancements in rapid prototyping technologies, in conjunction with Reverse Engineering through 3D scanners, offer a promising alternative. This scoping review explores the current state of knowledge in transfemoral prosthesis fabrication, with a focus on additive manufacturing (AM), RE, and computer-aided manufacturing (CAM) methods. A systematic database search on PubMed and LENS.ORG was conducted, followed by a thorough analysis of selected articles. The review highlights major research areas, including pressure/stress/strain distribution analysis at the socket-stump interface, gait cycle assessment, and developments in 3D printing of knee and ankle joints. Critical appraisals of each article provide valuable insights for future research and advancements in affordable prosthetic rehabilitation. In conclusion, the utilization of AM, RE, and CAM methods for TFP fabrication is in its infancy but holds immense potential for improving cost-effective solutions in this domain. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Reverse Engineering in Production and the Repair Complex Profile and Large-Sized Products.
- Author
-
Vityaz, P. A., Kheifetz, M. L., Gretsky, N. L., and Khilko, D. N.
- Abstract
Methods have been developed for monitoring and diagnosing the degree of wear and loss of the geometric shape of surfaces. A selection of technological routes was carried out for the complex restoration of working surfaces of large-sized products using electrophysical energy sources during surfacing of powders and wires. It has been shown that the cost of major repairs when restoring a screw shaft is, on average, two times lower than manufacturing a new one. It is important to monitor regularly the degree of wear of shaft turns and their local restoration using surfacing materials and technologies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning.
- Author
-
Ou, Weihan, Ding, Steven, Zulkernine, Mohammad, Li, Li Tao, and Labrosse, Sarah
- Subjects
CYBERTERRORISM ,ATTRIBUTION of authorship ,CYBER intelligence (Computer security) ,EVIDENCE gaps ,REVERSE engineering - Abstract
Malware attacks are posing a significant threat to national security, cooperate network, and public endpoint security. Identifying the Advanced Persistent Threat (APT) groups behind the attacks and grouping their activities into attack campaigns help security investigators trace their activities thus providing better security protections against future attacks. Existing Cyber Threat Intelligent (CTI) components mainly focus on malware family identification and behavior characterization, which cannot solve the APT tracking problem: while APT tracking needs one to link malware binaries of multiple families to a single threat actor, these behavior or function-based techniques are tightened up to a specific attack technique and would fail on connecting different families. Binary Authorship Attribution (AA) solutions could discriminate against threat actors based on their stylometric traits. However, AA solutions assume that the author of a binary is within a fixed candidate author set. However, real-world malware binaries may be created by a new unknown threat actor. To address this research gap, we propose VeriBin for the Binary Authorship Verification (BAV) problem. VeriBin is a novel adversarial neural network that extracts functionality-agnostic style representations from assembly code for the AV task. The extracted style representations can be visualized and are explainable with VeriBin's multi-head attention mechanism. We benchmark VeriBin with state-of-the-art coding style representations on a standard dataset and a recent malware-APT dataset. Given two anonymous binaries of out-of-sample authors, VeriBin can accurately determine whether they belong to the same author or not. VeriBin is resilient to compiler optimizations and robust against malware family variants. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Experimental Fitting of Efficiency Hill Chart for Kaplan Hydraulic Turbine.
- Author
-
Capata, Roberto, Calabria, Alfonso, Baralis, Gian Marco, and Piras, Giuseppe
- Subjects
REVERSE engineering ,HYDRAULIC turbines ,FLOW coefficient ,METHODS engineering ,MACHINERY testing ,IMPELLERS - Abstract
The development of hydroelectric technology and much of the "knowledge" on hydraulic phenomena derive from scale modeling and "bench" tests to improve machinery efficiency. The result of these experimental tests is mapping the so-called "hill chart", representing the "DNA" of a turbine model. Identifying the efficiency values as a function of the specific parameters of the flow and energy coefficient (which both identify the operating point) allows us to represent the complete behavior of a turbine in hydraulic similarity with the original model developed in the laboratory. The present work carries out a "reverse engineering" operation that leads to the definition of "an innovative research model" that is relatively simple to use in every field. Thus, from the experimental survey of the degree of efficiency of several prototypes of machines deriving from the same starting model, the hill chart of the hydraulic profile used is reconstructed. The "mapping" of all the characteristic quantities of the machine, together with the physical parameters of the regulating organs of a four-blade Kaplan turbine model, also made it possible to complete the process, allowing to identify not only the iso-efficiency regions but also the curves relating to the trend of the angle of the impeller blades, the specific opening of the distributor, and the identification of critical areas of cavitation. The development of the hill chart was made possible by investigating the behavior of 33 actual prototypes and 46 characteristic curves derived from the same reference model based on practical experiments for finding the optimal blade distributor "setup curve". To complete this, theoretical characteristic curves of "not physically realized" prototypes were also mapped, allowing us to complete the regions comprising the diagram. The study of the unified hill charts found in previous documentation of the most famous manufacturers was of great help. Finally, the validation of the "proposed procedure" was obtained through the experimental survey of the actual efficiency of the new prototype based on the theoretical values defined in the design phase on the chart obtained with the method described. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords.
- Author
-
Saadi, Zena Mohammad, Sadiq, Ahmed T., Akif, Omar Z., and Farhan, Alaa K.
- Subjects
SOCIAL engineering (Fraud) ,LITERATURE reviews ,COMPUTER vision ,CYBERTERRORISM ,REVERSE engineering ,COMPUTER passwords - Abstract
As technology advances and develops, the need for strong and simple authentication mechanisms that can help protect data intensifies. The contemporary approach to giving access control is through graphical passwords comprising images, patterns, or graphical items. The objective of this review was to determine the documented security risks that are related to the use of graphical passwords, together with the measures that have been taken to prevent them. The review was intended to present an extensive literature review of the subject matter on graphical password protection and to point toward potential future research directions. Many attacks, such as shoulder surfing attacks, SQL injection attacks, and spyware attacks, can easily exploit the graphical password scheme, which is one of the most widely used. To counter these security threats, several measures have been suggested, but none of the security attacks can be completely overcome. Each of the proposed measures has its pros and cons. This study begins by elucidating some of the graphical password schemes studied between 2012 and 2023, delving into potential threats and defense mechanisms associated with these schemes. Following a thorough identification and selection process, five of the reviewed papers explain the threat of shoulder surfing and spyware attacks on graphical password schemes, while two explain the threat of brute force attacks. One paper focuses on dictionary attacks, while four other papers address social engineering, SQL injection attacks, and guessing attacks as potential threats to graphical password schemes. In addition, the papers recognize other forms of attacks, such as video recording attacks, filtering attacks, reverse engineering attacks, multiple observation attacks, key/mouse logger attacks, insider attacks, computer vision attacks, image gallery attacks, sonar attacks, reply attacks, data interception attacks, and histogram manipulation attacks. These attacks are examined in three, three, eight, one, four, one, one, one, one, one, one, and one papers, respectively. Moreover, out of all such countermeasures, most of them are based on three categories—randomization, obfuscation, and password space complexity—which are the most commonly employed strategies for improving graphical password schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. Analysis of the improved mechanism of Rhodobacter sphaeroides VK-2-3 coenzyme Q10 by reverse metabolic engineering.
- Author
-
Long Zhang, Le-yi Wang, Yi-jun Han, Yan-xin Liu, Yong-li Li, Jian-hua Hu, Zhi-jie Tian, and Zhan-ying Liu
- Subjects
RHODOBACTER sphaeroides ,REVERSE engineering ,GENE rearrangement ,UBIQUINONES ,ION beams ,HEAVY ions ,NAD (Coenzyme) - Abstract
Coenzyme Q10 (CoQ10) is an essential medicinal ingredient. In this study, we obtained a high-yielding mutant strain of CoQ10, VK-2-3, by subjecting R. sphaeroides V-0 (V-0) to a
12 C6+ heavy ion beam and high-voltage prick electric field treatment. To investigate the mutation mechanism, the complete genomes of VK-2-3 and V-0 were sequenced. Collinearity analysis revealed that the nicotinamide adenine dinucleotide-dependent dehydrogenase (NAD) gene underwent rearrangement in the VK-2-3 genome. The NAD gene was overexpressed and silenced in V-0, and this construct was named RS.NAD and RS.ΔNAD. The results showed that the titers of CoQ10 in the RS.NAD and RS.ΔNAD increased and decreased by 16.00 and 33.92%, respectively, compared to those in V-0, and these differences were significant. Our results revealed the mechanism by which the VK-2-3 CoQ10 yield increases through reverse metabolic engineering, providing insights for genetic breeding and mechanistic analysis. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
26. A New Automatic Process Based on Generative Design for CAD Modeling and Manufacturing of Customized Orthosis.
- Author
-
Cirello, Antonino, Ingrassia, Tommaso, Marannano, Giuseppe, Mirulla, Agostino Igor, Nigrelli, Vincenzo, Petrucci, Giovanni, and Ricotta, Vito
- Subjects
INDIVIDUALIZED medicine ,REVERSE engineering ,THREE-dimensional printing ,ORTHOPEDIC apparatus ,ENGINEERING design ,RAPID prototyping - Abstract
As is widely recognized, advancements in new design and rapid prototyping techniques such as CAD modeling and 3D printing are pioneering individualized medicine, facilitating the implementation of new methodologies for creating customized orthoses. The aim of this paper is to develop a new automatic technique for producing personalized orthoses in a straightforward manner, eliminating the necessity for doctors to collaborate directly with technicians. A novel design method for creating customized wrist orthoses has been implemented, notably featuring a generative algorithm for the parametric modeling of the orthosis. To assess the efficacy of the developed algorithm, a case study was conducted involving the design and rapid prototyping of a wrist orthosis using Fused Deposition Modeling (FDM) technology. Subsequently, the developed algorithm was tested by clinicians and patients. The results obtained indicate that the implemented algorithm is user-friendly and could potentially enable non-expert users to design customized orthoses. These results introduce innovative elements of originality within the CAD modeling, offering promising solutions to the challenges associated with the design and production of customized orthoses. Future developments could consist of a better investigation regarding the parameters that influence the accuracy of the scanning and of the printing processes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Evaluating the Accuracy of the Reverse Engineering Process of Worn, Non-Standard Spur Gears—Pilot Studies.
- Author
-
Konecki, Karol, Wojtkowiak, Dominik, and Talaśka, Krzysztof
- Subjects
SPARE parts ,SPUR gearing ,FACTORIES ,REVERSE engineering ,SCIENCE databases - Abstract
For years, gears have been self-made by many industrial plants as substitutes (custom spare parts) for original parts from the manufacturer. This common practice uses a process called reverse engineering (RE). However, in the available scientific database, it is difficult to find articles about the accuracy of such a process. And while it is obvious that in order to obtain the most accurate quality of such a process, modern measurement techniques (coordinate, optical) should be used, most companies cannot afford to purchase such equipment. Reproducing gear geometry is difficult. But the issue of RE of non-standard gears seems to be even more difficult. This is why the authors undertook pilot studies to assess the accuracy of the RE process of worn, non-standard spur gears using conventional techniques and measuring instruments. Eight gears were tested, the module of which ranges from 1.020 to 4.98 mm. The key parameter was selected to estimate the accuracy of the process—the base pitch. The goal is to determine the value of the profile angle. Eleven models were proposed to estimate the nominal tolerance field, using various types of random data distribution. The tested gears were made in IT grade: 6, 7, 8, and 9 according to DIN 3961. Vernier disk micrometers were used for research. It has been shown that the nominal module does not have to be treated as a random variable in the population. Equation of identity was developed, allowing conversion of any gear with specific values of geometric parameters into an identical gear with alternative values of these parameters. The most effective estimating model was selected taking into account the symmetric Student–Fisher distribution with a confidence level of 60%. However, it is not possible to correctly reproduce the geometry of the gear wheel in that way. The following aspects should be taken into account: type and degree of mode of failure, number of load cycles, rotational speed, direction of rotation, material, type of thermochemical treatment, and torque. A simulation using FEM should be performed to determine the fatigue plastic deformations and diagnose their impact on the geometric dimensions of the gear wheel. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. A Genetic Algorithm for Three-Dimensional Discrete Tomography.
- Author
-
Toscano, Elena and Valenti, Cesare
- Subjects
- *
COMPUTED tomography , *REVERSE engineering , *COMPUTER vision , *GENETIC algorithms , *INDUSTRIAL engineering - Abstract
Discrete tomography is a specific case of computerized tomography that deals with the reconstruction of objects made of a few density values on a discrete lattice of points (integer valued coordinates). In the general case of computerized tomography, several hundreds of projections are required to obtain a single high-resolution slice of the object; in the case of discrete tomography, projections of an object made by just one homogeneous material are sums along very few angles of the pixel values, which can be thought to be 0's or 1's without loss of generality. Genetic algorithms are global optimization techniques with an underlying random approach and, therefore, their convergence to a solution is provided in a probabilistic sense. We present here a genetic algorithm able to straightforwardly reconstruct binary objects in the three-dimensional space. To the best of our knowledge, our methodology is the first to require no model of the shape (e.g., periodicity, convexity or symmetry) to reconstruct. Experiments were carried out to test our new approach in terms of computational time and correctness of the solutions. Over the years, discrete tomography has been studied for many interesting applications to computer vision, non-destructive reverse engineering and industrial quality control, electron microscopy, X-rays crystallography, biplane angiography, data coding and compression. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Management of High-Tech Companies in Conditions of Import Substitution.
- Author
-
Pyatovsky, S. E., Efimova, N. S., and Surkova, E. V.
- Abstract
The article analyzes the development of high-tech sectors of the Russian economy in the context of import substitution. Features of managing priority project portfolios are considered. Issues of creating a unified information space for aviation industry enterprises are studied in the context of introduction of a modified OLAP technology of management decision support. Investment attractiveness of high-tech sectors of the Russian economy is estimated based on the coefficient of gross value added of project products. Investment-overheated industries are identified, and recommendations on market correction and returning project assets to a balanced state are given. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Rate Lifting for Stochastic Process Algebra by Transition Context Augmentation.
- Author
-
SOLTANIEH, AMIN and SIEGLE, MARKUS
- Subjects
STOCHASTIC processes ,ALGEBRA ,NONLINEAR equations ,ENGINEERING models ,REVERSE engineering - Abstract
This article presents an algorithm for determining the unknown rates in the sequential processes of a Stochastic Process Algebra (SPA) model, provided that the rates in the combined flat model are given. Such a rate lifting is useful for model reverse engineering and model repair. Technically, the algorithm works by solving systems of nonlinear equations and—if necessary—adjusting the model's synchronisation structure, without changing its transition system. The adjustments cause an augmentation of a transition's context and thus enable additional control over the transition rate. The complete pseudo-code of the rate lifting algorithm is included and discussed in the article, and its practical usefulness is demonstrated by two case studies. The approach taken by the algorithm exploits some structural and behavioural properties of SPA systems, which are formulated here for the first time and could be very beneficial also in other contexts, such as compositional system verification. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. A New Envelope Computational Method for Meshing Heliacal Gears Profiling Applied to Air Compressor Screw Pair.
- Author
-
Long Hoang
- Subjects
SCREW compressors ,AIR compressors ,GEARING machinery ,SCREWS ,REVERSE engineering ,MECHANICAL engineering - Abstract
The theory of enveloping, which determines the envelope to a family of surfaces, the meshing equations of kinematics pairs, including pinion and gear, cutting toll and gear, is widely used in Mechanical Engineering. This paper presents a new envelope computational method for profiling the meshing gear pair. It uses the normal projection of the instantaneous relative rotation axis of the kinematic pair onto the pinion surface to generate the contact line and then automatically computes geometric data of this contact line to create the gear tooth surface. As the profile complexity, the reverse engineering of compressor screw pair was a typical proper example to verify and clarify the proposed method. The method can generate the meshing surface pair with high accuracy: the 3D comparison average error of the surfaces generated by the proposed method and the Boolean method is 0.004 mm, and their RMS error is 0.01 mm. The novel idea of the proposed method is that the contact line, which is used to calculate gear surface, is created easier than solving complex meshing equations, which most previous work used. The proposed method in detail with an algorithm can be used as well for reverse engineering of air compressor screw pair as for parallel axixes heliacal gear pair. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. Reverse engineering the last-minute on-line pricing practices: an application to hotels.
- Author
-
Guizzardi, Andrea, Ballestra, Luca Vincenzo, and D'Innocenzo, Enzo
- Subjects
REVERSE engineering ,PRICES ,TIME series analysis ,HOTELS ,INTERNET marketing ,HOTEL rooms - Abstract
We suggest a nonlinear time series methodology to model the (last-minute) price adjustments that hotels active in the online market make to adapt their early-booking rates in response to unpredictable fluctuations in demand. We use this approach to reverse-engineer the pricing strategies of six hotels in Milan, Italy, each with different features and services. The results reveal that the hotels' ability to align last-minute adjustments with early-booking decisions and account for stochastic demand seasonality varies depending on factors such as size, star rating, and brand affiliation. As a primary empirical finding, we show that the autocorrelations of the first four moments of the last-minute price adjustment can be used to gain crucial insights into the hoteliers' pricing strategies. Scaling up this approach has the potential to equip policymakers in smart destinations with a reliable and transparent tool for the real-time monitoring of demand dynamics. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Reverse engineering of steam turbines for national manufacturing industry independence.
- Author
-
Febriansyah, D., Harmadi, R., Herbandono, K., Faisal, Faisal, and Nandar, C. S. A.
- Subjects
- *
STEAM-turbines , *STEAM engineering , *REVERSE engineering , *MANUFACTURING industries , *NEW product development , *STEAM flow - Abstract
Indonesia uses a lot of steam turbines, so there is a lot of demand for this equipment. Indonesia's current need for steam turbines is still met by imports. It is anticipated that less reliance on imports will result from the development of a domestic steam turbine. The Indonesian government is conducting reverse engineering in accordance with the degree of the local manufacturing industry's competence to expedite the construction of national steam turbines. Reverse engineering process comprises the phases of digitization, reconstruction, and production. The purpose of the study is to provide details on the successes and challenges faced by BRIN in the development of the national steam turbine. Several small-scale (450 HP back pressure, 3 MW direct condensing, 3 MW geothermal direct condensing, and 4 MW back pressure) steam turbine prototypes of various types and powers are the product of the development efforts. Reverse engineering is the best method for transferring steam turbine technology in Indonesia In order to strengthen regional industries and decrease steam turbine imports. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Design and manufacturing of 3D scanner for surface reconstruction of an object using meshlab.
- Author
-
Hussein, Elaf A. and Hamdan, Wisam K.
- Subjects
- *
SURFACE reconstruction , *REVERSE engineering , *SCANNING systems , *OPTICAL scanners , *DEFORMATION of surfaces , *ALGORITHMS - Abstract
Reverse engineering (RE) is an advanced science that entails the creation of many devices that help perform various tasks. Another concept of this science was introduced by modern technologies, the most important of which is the scanner. However, we are faced with several issues, including whether the piece has surface deformations or is expendable and whether it is related to engineering, medicine, or archaeology. This study will show how to use digital data generated by a device designed to measure product dimensions and display it on a computer using Arduino UNO techniques and several software programs without using complex algorithms. It was found that the data efficiency results through processing by MeshLab and MATLAB programs reached 89.15%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Reverse engineering methodology applied for the design of a light aircraft composite wheel cover. Numerical simulations for aerodynamic and structural analysis.
- Author
-
Fournier, Axel, Guenni, Malek, Morell-Moratal, Carles, Raiu, Nicolae-Emmanuel, Andrei, Irina-Carmen, Ştefan, Adriana, Pelin, Cristina, Stoica, Gina Florica, Crişan, Nicoleta, Prisecaru, Delia, Stoica, Cristian, Greculescu, Anca, Boşcoianu, Corina-Elena, and Costea, Emil
- Subjects
- *
REVERSE engineering , *COMPUTER simulation , *AEROSPACE industry research , *LIGHT aircraft , *THREE-dimensional printing , *RESEARCH institutes , *COMPOSITE construction - Abstract
This paper presents the results of the research stage focused on applications of composite materials in aviation, carried on by an international team of European Project Semester students at the National Institute for Aerospace Research "Elie Carafoli" – INCAS, as Research Partner of the University POLTEHNICA of Bucharest, as Organizer and EUROPEAN PROJECT SEMESTER Provider. The study case is a light aircraft wheel cover. The objectives are set to the determination of the body geometry by reverse engineering techniques, modeling and numerical simulations for aerodynamics and structural analysis. A scale reduced demonstrator was obtained through 3D printing. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. Analysing shrinkage compensation in additive manufacturing: a comparative study of reverse engineering and gauge-based methods.
- Author
-
Zanini, Alessio, Marconi, Marco, and Rubino, Gianluca
- Subjects
THREE-dimensional printing ,REVERSE engineering ,GAGES ,MANUFACTURING industries ,WAGES - Abstract
Additive Manufacturing has transformed modern manufacturing with its well-known advantages. However, shrinkage remains a critical challenge, causing dimensional inaccuracies that should be properly compensated to assure geometric fidelity. This study aims to assess the reliability of a Reverse Engineering (RE) technique for dimensional compensation. A gauge-based measurement approach has been used to validate the RE method. Results confirm that the RE method is promising, while highlighting the intrinsic errors of the RE technique, and suggesting ways to evaluate and prevent them. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. An approach for reverse engineering and redesign of additive manufactured spare parts.
- Author
-
Rešetar, Marija, Valjak, Filip, Grabar Branilović, Marina, Šercer, Mario, and Bojčetić, Nenad
- Subjects
REVERSE engineering ,THREE-dimensional printing ,FUNCTIONAL analysis ,SPARE parts ,MAINTENANCE equipment - Abstract
The spare parts play a vital role in sustaining the operation and longevity of products and systems, but their unavailability can lead to prolonged downtime or expensive replacements. The integration of 3D scanning and Additive Manufacturing (AM) presents a promising path for spare part production. However, to utilise the full potential of AM, sometimes, redesign of the original part is needed. This paper investigates and proposes a new approach that integrates reverse engineering and redesign of an original part based on functional analysis to support the manufacturing of AM spare parts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. New methodology for the characterization of 3D model reconstructions to meet conditions of input data and requirements of downstream application.
- Author
-
Joost, Robert, Mönchinger, Stephan, and Lindow, Kai
- Subjects
COMPUTER-aided design ,DECISION making ,METHODOLOGY ,REVERSE engineering ,EVALUATION - Abstract
In the field of 3D model reconstruction, manifold methods have been developed that derive CAD models from 3D scan data. Opposed to classical CAD modelling, where surface and solid modelling exist, a further diversification of modelling techniques is observed, caused by different methods to build up the geometry. This research introduces a new classification, the so-called Level of Complexities. It can be applied to the complete Reverse Engineering process chain and lays the foundation for further research on how to match requirements arising from all process steps and downstream applications. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Digitization for reverse engineering: Associated issues and proposed solutions with case studies.
- Author
-
Gandhi, Shivam A., Trivedi, Snehal, Patel, Dhaval, and Pandya, Jignesh
- Subjects
- *
REVERSE engineering , *LITERATURE reviews , *ENGINEERING design , *DIGITIZATION , *MECHANICAL engineering - Abstract
To find out knowledge about a design that has disappeared, become outdated, or been concealed, reverse engineering is required. Techniques have advanced from manual measurements to making use of 3D scanning technologies. In order to ascertain the benefits and drawbacks of techniques and technologies that use 3D scanning for reverse engineering, this study conducts a literature review. In the branch of the mechanical engineering design and manufacturing-based sectors, reverse engineering is essential. This method's importance to the process of product design is generally acknowledged. In a typical computerized manufacturing setting, the machine activity that turns the raw materials into the finished product is typically last, while the product design frequently comes first. When original drawings or documentation are unavailable, it is frequently necessary to reconstruct a CAD model of the current part using any digitalization techniques. This model is then analyzed and modified in order to create a better product design. Characterizing geometric models and associated surface representations, data segmenting and proper surface fitting fundaments a crucial task in reverse engineering are all crucial tasks in the reverse engineering process. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. A study on anisotropic hardening of 7075 aluminum alloy based on non-associated flow rules
- Author
-
Xiaodong Wu, Zhen Zhang, and Wenkang Zhang
- Subjects
Isotropic hardening ,Numerical modeling ,Reverse engineering ,Cup convex ,Mining engineering. Metallurgy ,TN1-997 - Abstract
The accurate description of anisotropic plastic deformation is key to accurately predicting the stamping forming of metal sheets. The anisotropic yield criterion, when based on the assumption of isotropic hardening, often leads to significant inaccuracies. To address this issue, this paper observes the anisotropic hardening phenomenon through non-associated flow rules and evaluates the anisotropy of 7075-O aluminum alloy. Through a series of tensile tests, we determined the mechanical properties of 7075-O aluminum alloy in three distinct orientations. To describe the metal hardening behavior, we employed the Swift-Voce hardening criterion. From the hardening curves in three different directions, it was found that AA7075-O exhibits plastic anisotropy. Based on the VUMAT subroutine, finite element simulation of AA7075-O tensile tests was conducted through Abaqus. Compared with the Hill48 model, it was found that the simulated values of the S–Y2009 anisotropic hardening model have a higher degree of agreement with the experimental curves. The S–Y2009 anisotropic hardening model was adopted to predict the earing behavior of AA7075-O during circular cup deep drawing. The root mean square error between the predicted values of the S–Y2009 model and the experimental values was only 0.1795, which is far smaller than that of the Hill48 yield model. Therefore, the SY2009 model has important guiding significance for the stamping forming of metal sheets.
- Published
- 2024
- Full Text
- View/download PDF
41. Cyber Security Investigation of GPS-Spoofing Attack in Military UAV Networks
- Author
-
Vanitha, N., Rakshun Selvaa, S. K., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, E. Balas, Valentina, editor, Prakash, Kolla Bhanu, editor, and Varma, G. P. Saradhi, editor
- Published
- 2024
- Full Text
- View/download PDF
42. Automated Architecture Recovery for Embedded Software Systems: An Industrial Case Study
- Author
-
Amalfitano, Domenico, De Luca, Marco, De Angelis, Domenico Francesco, Fasolino, Anna Rita, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Galster, Matthias, editor, Scandurra, Patrizia, editor, Mikkonen, Tommi, editor, Oliveira Antonino, Pablo, editor, Nakagawa, Elisa Yumi, editor, and Navarro, Elena, editor
- Published
- 2024
- Full Text
- View/download PDF
43. Modeling and Simulation of Normal, Pathological or Post-surgical Situations of Human Anatomical Systems
- Author
-
Buciu, Gabriel, Popa, Dragos-Laurentiu, Vintila, Daniela Doina, Berceanu, Mihaela Corina, Calin, Daniel Cosmin, Magjarević, Ratko, Series Editor, Ładyżyński, Piotr, Associate Editor, Ibrahim, Fatimah, Associate Editor, Lackovic, Igor, Associate Editor, Rock, Emilio Sacristan, Associate Editor, Costin, Hariton-Nicolae, editor, and Petroiu, Gladiola Gabriela, editor
- Published
- 2024
- Full Text
- View/download PDF
44. Reverse Engineering of a Historic Motorcycle Cylinder Head Through 3D Scanning and Printing
- Author
-
Kudrna, Lukáš, Pravda, Štěpán, Navrátil, Tomáš, Hrabec, Ladislav, Fojtík, František, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Pagac, Marek, editor, Hajnys, Jiri, editor, Kozior, Tomasz, editor, Nguyen, Hoang-Sy, editor, Nguyen, Van Dung, editor, and Nag, Akash, editor
- Published
- 2024
- Full Text
- View/download PDF
45. Design and Prototyping of Personalised In-Ear Headphones with Advanced Digital Methodologies
- Author
-
Haro, Fernando Blaya, Corredor, Juan Ortega, D’Amato, Roberto, Méndez, Juan Antonio Juanes, Huang, Ronghuai, Series Editor, Kinshuk, Series Editor, Jemni, Mohamed, Series Editor, Chen, Nian-Shing, Series Editor, Spector, J. Michael, Series Editor, Gonçalves, José Alexandre de Carvalho, editor, Lima, José Luís Sousa de Magalhães, editor, Coelho, João Paulo, editor, García-Peñalvo, Francisco José, editor, and García-Holgado, Alicia, editor
- Published
- 2024
- Full Text
- View/download PDF
46. Dynamic Analysis of Window’s Based Malware Using Reverse Engineering: A Case Study of Exmatter
- Author
-
Surange, Geetanjali, Khatri, Pallavi, Hazra, Shubhankar, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Abraham, Ajith, editor, Pllana, Sabri, editor, Hanne, Thomas, editor, and Siarry, Patrick, editor
- Published
- 2024
- Full Text
- View/download PDF
47. Rethinking Hardware Watermark
- Author
-
Tehranipoor, Mark, Zamiri Azar, Kimia, Asadizanjani, Navid, Rahman, Fahim, Mardani Kamali, Hadi, Farahmandi, Farimah, Tehranipoor, Mark, Zamiri Azar, Kimia, Asadizanjani, Navid, Rahman, Fahim, Mardani Kamali, Hadi, and Farahmandi, Farimah
- Published
- 2024
- Full Text
- View/download PDF
48. Advances in Logic Locking
- Author
-
Tehranipoor, Mark, Zamiri Azar, Kimia, Asadizanjani, Navid, Rahman, Fahim, Mardani Kamali, Hadi, Farahmandi, Farimah, Tehranipoor, Mark, Zamiri Azar, Kimia, Asadizanjani, Navid, Rahman, Fahim, Mardani Kamali, Hadi, and Farahmandi, Farimah
- Published
- 2024
- Full Text
- View/download PDF
49. Algorithm for Selecting the Optimal Technology for Rapid Manufacturing and/or Repair of Parts
- Author
-
Sikulskyi, Valeriy, Maiorova, Kateryna, Shypul, Olga, Nikichanov, Viacheslav, Tryfonov, Oleg, Voronko, Iryna, Kapinus, Oleksandra, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Nechyporuk, Mykola, editor, Pavlikov, Volodymir, editor, and Krytskyi, Dmytro, editor
- Published
- 2024
- Full Text
- View/download PDF
50. The Valuation of Artificial Intelligence-Driven Know-How and Patents
- Author
-
Moro-Visconti, Roberto and Moro-Visconti, Roberto
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.