Premium Essay

Technology Design Reflection

In: Other Topics

Submitted By harronyan
Words 494
Pages 2
1. What was the result? Did you meet your design brief? If yes, refer to your design brief and explain specifically what you did that made you successful. If not, explain in detail, why you didn’t meet it.

The result was half way. We didn’t reach the area. Our onager was using weight, and the first time, our pillar was not strong enough, so it broke the first time, so we changed our design brief, to add more wood on the pillar, and we tested it, it was strong enough to handle our long stick, but the problem after we change our pillar will be it can’t shoot far. The problem is the stick was too long and it need really heavy weigh in order to shoot far, but if we use too much weigh to shoot it far, then we will be not able to stop the stick at an angle in order to not let it just shoot the ball to the ground, if the stick is too long, we won’t be able to stop it at an angle, if it is too short, it won’t able to shoot far, I think this will be the main reason our or onager was not successful.

2. What worked well for you during this project? What would you do differently next time if given the chance?

The stiffness of our onager will be the best worked I have done, after we tested the first time, I added many nails at all the important palaces, after, our onager won’t even break if we throw it. Also the base was very strong, never breaks. The things I will do differently next time will be I will chose to use rope instead of weight, weight is very hard to stop at an angle in order to shoot far, and if I only can choose weight, I will make my stick shorter, because the main reason of our onager not shooting far I think will be our stick is too long and too heavy, it needs too much weigh to move it, so if I got a chance to do it again, I will defiantly change the length of my stick.

3. Looking at your Oblique Drawing, did you make any changes to your...

Similar Documents

Free Essay

The Study on Stealth Design Technology

...The Study on Stealth Design Technology Abstract—In this report we study some basic ideas on stealth technology. Loosely speaking, the stealth technology can be divided into two categories: the study on target shape design and the study on radar absorbing materials. In this report, we explain the basic principles of these two categories, and give some simulations by CST Microwave Studio and Feko to show the effects of stealth technology. I. I NTRODUCTION The purpose of stealth design is to protect the target from being detected by the enemy’s radar and to increase the target survivability. Ideally, for an object to be ”stealth”, it needs to have a low optical visibility in addition to being low observable in the infrared spectrum and at all radar frequency bands, also the emission of acoustic noise should be low. However, this goal is difficult to achieve, and the recent research is mainly focus on the low observability in a certain radar bandwidth. In some degree, the term ”stealth design” is equivalent to the technology of reducing target’s the Radar Cross Section (RCS). RCS is the parameter to characterize the strength of backward scattering of the target, the formal definition is σ = lim 4πR2 R−>∞ Fig. 1: B-2 stealth bomber |Es |2 , |Ei |2 (1) Fig. 2: F117 stealth fighter plane where, R is the distance from target to radar, |Es | is the scattered electric field intensity and |Ei | is the incident electric field intensity. Radar equation can be used to......

Words: 1551 - Pages: 7

Premium Essay

Business Educations

...BEIT 337 Business Education Professional Development Paper (40 Points) Reflection Paper and Lesson Plan Information technology and web design are key components of middle and high school business curriculum. In this assignment, you will reflect on your own learning experience in BEIT 337 and design two lesson plan outlines. The assignment is due Friday May 8 11:59 PM. Requirements 1. Complete the following reading assignments a. In preparation for your business teaching career, familiarize yourself with Indiana Department of Education (IDoE) Academic Standards Course Framework for (1) Information Communication and Technology and (2) Web Design. b. While your knowledge of information technology and web design is key, you also need to know how to teach them. This NBEA Yearbook chapter covers information and web technologies teaching strategies and practical tips 2. Reflect on your own spreadsheet, database, HTML, and web design learning experience in this class (e.g., concepts and skills that were easy or challenging to you; instructional and learning activities as well as study / work habits that were most helpful to you). Prepare a two-page, double-spaced reflection paper. 3. Create two lesson plan outlines. Select one IDoE academic standard on spreadsheet (e.g., ICT-3.4) or database (e.g., ICT-5.1) software and one academic standard on web design (e.g., WD-2.6). Design a lesson plan for each standard. You must reference instructional......

Words: 498 - Pages: 2

Free Essay

Test

...s:1332 tcl ew Vi r at ar i es ew el ed tcl Cii ar i es:6 Vi cii ar i es tng tcl ew tng t cl Ful Ter s & Condii l m tons ofaccess and use can be f ound at ht p: / w w .andf i com / i j t /w t onlne. acton/ournalnf m aton?j nal I or i our Code=cj 20 em D ow nl oad by:[ i esex U ni siy] M ddl ver t D at 02 Febr e: uary 2016,At 11: : 17 Learning, Media and Technology Vol. 36, No. 2, June 2011, 169–188 A learning design for student-generated digital storytelling Matthew Kearney* Faculty of Arts and Social Sciences, University of Technology, Sydney, New South Wales, Australia (Received 16 December 2010; accepted 7 January 2011) CJEM_A_553623.sgm Taylor and Francis Downloaded by [Middlesex University] at 11:17 02 February 2016 shirleya@uow.edu.au Dr 0 3000002011 36 ShirleyAgostinho Taylor 2011 & (print)/1743-9892 (online) Original Article 1743-9884Media Learning,Francisand Technology 10.1080/17439884.2011.553623 The literature on digital video in education emphasises the use of prefabricated, instructional-style video assets. Learning designs for supporting the use of these expert-generated video products...

Words: 7272 - Pages: 30

Free Essay

Dddgg

...Problems Happen ........................................................................................................ 3 14.2.3. SI In Electronic Packaging.......................................................................................................... 4 14.3. SI Analysis.......................................................................................................................................... 5 14.3.1. SI Analysis in the Design Flow................................................................................................... 5 14.3.2. Principles of SI Analysis............................................................................................................. 7 14.4. SI Issues in Design.............................................................................................................................. 9 14.4.1. Rise Time and SI......................................................................................................................... 9 14.4.2. Transmission Lines, Reflection, Crosstalk.................................................................................. 9 14.4.3. Power/Ground Noise................................................................................................................. 10 14.5. Modeling and...

Words: 8259 - Pages: 34

Premium Essay

Toch Screen Technology

...HISTORY • COMPONENTS OF TOUCH SCREEN TECHNOLOGY • TYPES OF TOUCH SCREEN TECHNOLOGY • RESISITIVE TOUCHSCREEN (INC. PROS AND CON S.) • CAPACITIVE TOUCH SCREEN (INC. PROS AND CON S.) • SURFACE ACOUCTIC WAVE TOUCHSCREEN TECHNOLYGY (INC. PROS AND CONS.) • INFRARED TOUCH SCREEN TECHNOLGY (INC. PROS AND CON S.) • MUTLI TOUCH TECHNOLGY ( the plural technology) • THE FUTURE OF TOUCHSCREEN TOUCHSCREEN CONSUMERS • REFERENCES ABSTRACT In today’s society, the way in which we physically interact with electronic devices is changing how we focus our technological research. This change has led to many great advances, including the development of touch screen technology. Through the use of touch screen technology, the operator is given an alternative method of how he or she can interact with a device. This technology operates in four distinct ways: Resistive systems, capacitive systems, surface acoustic wave and infrared systems. This paper will investigate, discuss, and compare these different technologies, focusing on the differences in application, aspects of sustainability, as well as the positive and negative qualities. In addition to which this paper will also include the components of touch screen and the science behind it. This paper will also throw light on history of this technology and the successful future......

Words: 4039 - Pages: 17

Free Essay

An Activity-Oriented Design Framework for Mobile Learning Experience

...International Conference on Wireless, Mobile, and Ubiquitous Technology in Education An Activity-Oriented Design Framework for Mobile Learning Experience Huanglingzi Liu Nokia Research Center, Beijing Linda.2.liu@nokia.com Jyri Salomaa Nokia Research Center, Beijing Jyri.p.salomaa@nokia.com Ronghuai Huang Beijing Normal University huangrh@bnu.edu.cn Ding Ma Beijing Normal University mading70@126.com Abstract This paper proposes a conceptual design framework for mobile learning (mLearning) mainly based on the reflection and action research results of Nokia Mobiledu project, which was recently launched in China and is targeted especially for learning English. The framework involves five stages: mLearning activity design, requirement and constraint analysis, mLearning scenario design, mLearning technology environment design and mobile learner support services design, in which mLearning activity design plays a key role in a systematic design procedure for mLearning experience. 1. Background In China, there are more than 600 million mobile phone users and people are spending more time on the road or commuting. There is a big growth potential for mobile learning in China. Nokia recently set up China’s first interactive mobile learning service Mobiledu (www.mobiledu.cn), with the aim to enrich people’s learning experiences anytime anywhere in a most convenient way with their mobile phones. Reflecting on the design and development process of Mobiledu and other mobile......

Words: 1648 - Pages: 7

Premium Essay

Powerpoint Presentation

...(Connor and Wong, 2004; Bartsch and Cobern, 2003), few studies have systematically investigated its impact on student learning and attitudes. Rebele et al. (1998) note that little research exists regarding integration of technology in the accounting curriculum, and suggest that accounting researchers should examine whether technology improves learning. One study that has examined the relationship between multimedia and student learning and attitudes was conducted by Butler and Mautz (1996). In a laboratory experiment conducted during a 30-minute time period, they found that multimedia did not affect student recall in all situations. Butler and Mautz did find an interaction between the effects of the multimedia presentation and the student’s preferred class representation style (i.e., whether the student was considered a “verbal” or “imaginal” learner). To improve the quality of learning in our schools using multimedia is very effective in the teaching learning situation. It benefits the students to grasp information easily, to understand as much information as possible, to retain information longer and to gain knowledge that is observable and measured. Literally, multimedia refers to the process of conveying message using different means. In today's age of technology, it refers to all types of analogs or digital information conveyed through audio-visual presentation. Multimedia machine supports all types of presentation that caters to a small group of students or people......

Words: 726 - Pages: 3

Free Essay

Stealth Technology

...IMPACT OF STEALTH TECHNOLOGY ON AIR DEFENCE “Stealth refers to a wide range of steps that can be taken to make aircraft harder to detect. There is a payoff and a price.” - Jay H Goldberg [i] CHAPTER I INTRODUCTION 1. The latest trends in military aircraft manufacturing are towards development and incorporation of technology which can provide with means to avoid detection. This enhances its survivability by reducing its radar signature and hence reducing the possibility of being detected by enemy radars. The degree to which this is achieved differs from aircraft to aircraft. Certain aircraft like the B-2 and F-117 have been manufactured with this technology as the basis and are thus referred to as Stealth Aircraft. In other aircraft, stealth is achieved to a lesser degree but it nevertheless helps them in enhancing their survivability against enemy air defence. The day is not far when this technology is likely to find wide spread use in the field of aviation. 2. The dictionary defines stealth as "evasion of notice". Applied to Aerial Warfare, it implies the ability of an aircraft, or platform, to carry out its mission without being detected. Other terms such as "LO" - low observables, or "RO"- reduced observables, have also been used which imply the same thing. The very concept of 'Stealth' conjures up an image of something moving in secretly without being detected. 'Stealth' technology actually is all about the art of making aircraft, missiles and...

Words: 15633 - Pages: 63

Free Essay

Data Driven School

...presentation Presented by Md. Moshiur Rahman BSSE 0330 Institute of Information Technology, University Of Dhaka 3. Overview  About USA schools  Problems with existing systems  Effects of the problems on Students  Idea of Data Driven School  Implementation  Improved System  Case Study Question  DDS : Perspective of Bangladesh. 4. About USA Schools 5. Problems 6. How Data Driven Concept works 7. Idea of Data Driven School 8. DATA DRIVEN SCHOOL 9. Implementation 10. Data Acquisition Data Acquisition have included: Guidance information (student placement and behavioral records). Student demographics. Classroom grades. Data on, and observation of, teacher personnel. Community survey data. Budgetary information. Master schedule and calendar information. Curricular information. Technological capacity. 11. Data Reflection we have come to define the phase schools generally move into after Data Acquisition as Data Reflection. In this phase: stakeholders work to make sense of the data that has been collected in order to develop specific goals for improving teaching and learning. 12. Program Alignment , Program Design We define Program Alignment as the process of taking conclusions from the Data Reflection phase and setting students up for success by making sure that state and local standards, school curriculum, classroom teaching, and all testing are focused on the same results. Program Design to bridge the gaps that became evident in the process of pursuing......

Words: 841 - Pages: 4

Free Essay

Wireless

...security violations, a possible redesign of the network infrastructure is to be investigated. You have been hired as a consultant to propose security enhancements, and produce a report. The aim of the exercise is to present a possible solution to the problem at hand by creating a prototype of the new network security infrastructure. This new design should tackle the following components:  Provide best practice network egress and ingress filtering at the network perimeter.  Create a perimeter firewall, with an appropriate topology to provide the organisations services, including public web, and mail servers. The firewall should have a closed security stance, and provide public services in a secure way.  Provide secure access to all devices, from the security management subnet. Additionally, research should be carried out into increasingly common Advanced Persistent Threats (APT), and ways to defend against these using network defenses. This part of the coursework will be research only and be confined to a part of the Research Section. You will be required to analyze the new system requirements and design, implement and justify a prototype for each component of the proposed system. Your proposed system can be implemented on Cisco hardware deployed in the network lab, or on the virtual networking software (such as GNS3). The system should clearly demonstrate your mastery of the course material. Each component of the system should be......

Words: 607 - Pages: 3

Premium Essay

Visualizing Research

...blank Visualizing Research A Guide to the Research Process in Art and Design Carole Gray and Julian Malins © Carole Gray and Julian Malins 2004 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior permission of the publisher. Carole Gray and Julian Malins have asserted their right under the Copyright, Designs and Patents Act, 1988, to be identified as the authors of this work. Published by Ashgate Publishing Limited Gower House Croft Road Aldershot Hants GU11 3HR England Ashgate website: http://www.ashgate.com British Library Cataloguing in Publication Data Gray, Carole Visualizing research : a guide to the research process in art and design 1.Art – Research 2.Design – Research 3.Universities and colleges – Graduate work I.Title II.Malins, Julian 707.2 Library of Congress Cataloging-in-Publication Data Gray, Carole, 1957Visualizing research : a guide to the research process in art and design / by Carole Gray and Julian Malins. p. cm. Includes index. ISBN 0-7546-3577-5 1. Design--Research--Methodology--Handbooks, manuals, etc. 2. Art--Research--Methodology-Handbooks, manuals, etc. 3. Research--Methodology--Handbooks, manuals, etc. I. Malins, Julian. II. Title. NK1170.G68 2004 707’.2--dc22 ISBN 0 7546 3577 5 Typeset by Wileman Design Printed and bound in Great Britain by MPG Books Ltd, Bodmin,......

Words: 81106 - Pages: 325

Free Essay

Radar Cross Section

...Radar Cross Section (RCS) and the techniques to reduce RCS of a target By:- Namit Ohri - 12213010 Amit Vashisht – 12213004 Nikhil Harsoor – 12213011 Seemant Meena - 12116052 Introduction Definition Radar cross section(RCS) is the measure of a target's ability to reflect radar signals in the direction of the radar receiver, i.e. it is a measure of the ratio of backscatter power per steradian (unit solid angle) in the direction of the radar (from the target) to the power density that is intercepted by the target. Informally, the RCS of an object is the cross-sectional area of a perfectly reflecting sphere that would produce the same strength reflection as would the object in question.  A larger RCS indicates that an object is more easily detected. The conceptual definition of RCS includes the fact that not all of the radiated energy falls on the target. A target’s RCS (F) is most easily visualized as the product of three factors: F = Projected cross section x Reflectivity x Directivity Where, Reflectivity: The percent of intercepted power reradiated (scattered) by the target. Directivity: The ratio of the power scattered back in the radar's direction to the power that would have been backscattered had the scattering been uniform in all directions (i.e. isotropically). RCS depends upon Size, Material, Radar absorbent paint, Shape, directivity and orientation and surface of a target. For the case of an antenna the total RCS can be divided into two......

Words: 1638 - Pages: 7

Free Essay

Linux

...2 Adaptive and Reflective Middleware 2.1 Introduction Middleware platforms and related services form a vital cog in the construction of robust distributed systems. Middleware facilitates the development of large software systems by relieving the burden on the applications developer of writing a number of complex infrastructure services needed by the system; these services include persistence, distribution, transactions, load balancing, clustering, and so on. The demands of future computing environments will require a more flexible system infrastructure that can adapt to dynamic changes in application requirements and environmental conditions. Next-generation systems will require predictable behavior in areas such as throughput, scalability, dependability, and security. This increase in complexity of an already complex software development process will only add to the already high rates of project failure. Middleware platforms have traditionally been designed as monolithic static systems. The vigorous dynamic demands of future environments such as large-scale distribution or ubiquitous and pervasive computing will require extreme scaling into large, small, and mobile environments. In order to meet the challenges presented in such environments, next-generation middleware researchers are developing techniques to enable middleware platforms to obtain information concerning environmental conditions and adapt their behavior to better serve their current deployment. Such......

Words: 10610 - Pages: 43

Free Essay

Designing in the Tropics

...pleasurable, some horrible; none of them amazed me as much as the fact that they all existed at the same point, not superimposed, and not transparent. What my eyes saw was simultaneous. Jorge Luis Borges, El Aleph TRADITION AND AVANT-GARDE Traditional architecture and the avant-garde tendency are usually thought of as two opposed extremes. Because we are accustomed to defining tradition as something fixed, immovable, and the avant-garde position as what is progressive, we relate traditional architecture to a specific, pre-existing style and avant-garde architecture to the use of new technologies. When tradition plays a part in contemporary architecture it is most frequently as an aesthetic consideration in which the most obvious element is the use of some style from the past. At the other end of the spectrum is the avant-garde tendency, where the latest technology is the means architects use to achieve novel forms of expression. Both of these perceptions are limited. Not only are they presented to us as two extremes of one thing, opposed to one another, but also as excluding one another. An architecture that follows a given style cannot be avant-garde because it makes use of compositional rules derived from the past; it is backward-looking and dependent on various forms of counterfeit to create the look of a bygone era. It is this tendency which, starting in the 1970s, has gained momentum as an option and has now become the universally accepted norm,......

Words: 5561 - Pages: 23

Free Essay

Text Compression Using Ambigrams

...with consistency in the efficiency of the compression. Keywords Ambigrams, lossless compression, steganography, stego key, embedded algorithms, encryption. 1. Introduction When so many algorithms are available for compressing text, they hamper the readability of the text once compressed. Compressing the text using ambigrams also reduces the text to nearly 50% of its size. When most of the other compressing techniques depend on the nature of the text to be compressed, this technique is independent of the type of the text and requires only the corresponding data set. Hence, this method is consistent in performance. Ambigrams though known to many, has not found major applications in the field of technology. Probing further into this unravelled art form, it can be substantiated that ambigrams can be used to compress text. 1.1 Ambigram- Definition The word ambigram was coined by Douglas R. Hofstadter, a computer scientist who...

Words: 1801 - Pages: 8