Friday, March 21, 2014

what do you need to do to produce a scale drawing of a watch part.?




Quintarius





Answer
dynamics in rendering as actual part or components of watch mechanism as drafted, or virtual rendering as digital cad drawing to technical scale,

would you be designing watch gear, or redrawing to replace or make paper or digital copy,

the small finite detailing on paper could be drawn out, and machined with precision tools,

a piece to be replaced could now be scanned in 3d, and 3d Printed as solid object to make mold replica,

as digital you could use 3D or vector tools as cad ware to design or redesign piece work,

Gemvision
http://gemvision.com/global/

Canvas 14
http://www.acdsee.com/en/products/canvas-14

Autodesk Inventor
http://www.autodesk.com/products/autodesk-inventor-family/overview

Geomagic Sensable /Capture
http://geomagic.com/en/
Fuel3D scanner,
http://www.fuel-3d.com/
NextEngine
http://www.nextengine.com/

3dsystems 3d-printers
http://www.3dsystems.com/3d-printers/personal/overview
_________

http://grabcad.com/library/tag/watch
..

what are some reverse engineering techniques?




Kevin7





Answer
Reverse engineering of machines
As computer-aided design (CAD) has become more popular, reverse engineering has become a viable method to create a 3D virtual model of an existing physical part for use in 3D CAD, CAM, CAE or other software. The reverse-engineering process involves measuring an object and then reconstructing it as a 3D model. The physical object can be measured using 3D scanning technologies like CMMs, laser scanners, structured light digitizers or computed tomography. The measured data alone, usually represented as a point cloud, lacks topological information and is therefore often processed and modeled into a more usable format such as a triangular-faced mesh, a set of NURBS surfaces or a CAD model.
Reverse engineering is also used by businesses to bring existing physical geometry into digital product development environments, to make a digital 3D record of their own products or to assess competitors' products. It is used to analyse, for instance, how a product works, what it does, and what components it consists of, estimate costs, and identify potential patent infringement, etc. Value engineering is a related activity also used by businesses. It involves de-constructing and analysing products, but the objective is to find opportunities for cost cutting.

Reverse engineering of software
The three main groups of software reverse engineering are
1. Analysis through observation of information exchange, most prevalent in protocol reverse engineering, which involves using bus analyzers and packet sniffers, for example, for accessing a computer bus or computer network connection and revealing the traffic data thereon. Bus or network behaviour can then be analyzed to produce a stand-alone implementation that mimics that behaviour. This is especially useful for reverse engineering device drivers. Sometimes, reverse engineering on embedded systems is greatly assisted by tools deliberately introduced by the manufacturer, such as JTAG ports or other debugging means. In Microsoft Windows, low-level debuggers such as SoftICE are popular.
2. Disassembly using a disassembler, meaning the raw machine language of the program is read and understood in its own terms, only with the aid of machine-language mnemonics. This works on any computer program but can take quite some time, especially for someone not used to machine code. The Interactive Disassembler is a particularly popular tool.
3. Decompilation using a decompiler, a process that tries, with varying results, to recreate the source code in some high-level language for a program only available in machine code or bytecode.

Reverse engineering of integrated circuits/smart cards
Reverse engineering is an invasive and destructive form of analyzing a smart card. The attacker grinds away layer by layer of the smart card and takes pictures with an electron microscope. With this technique, it is possible to reveal the complete hardware and software part of the smart card. The major problem for the attacker is to bring everything into the right order to find out how everything works. Engineers try to hide keys and operations by mixing up memory positions, for example, busscrambling. In some cases, it is even possible to attach a probe to measure voltages while the smart card is still operational. Engineers employ sensors to detect and prevent this attack. This attack is not very common because it requires a large investment in effort and special equipment that is generally only available to large chip manufacturers. Furthermore, the payoff from this attack is low since other security techniques are often employed such as shadow accounts.
http://en.wikipedia.org/wiki/Reverse_engineering




Powered by Yahoo! Answers

Title Post: what do you need to do to produce a scale drawing of a watch part.?
Rating: 100% based on 99998 ratings. 5 user reviews.
Author: Yukie

Thanks For Coming To My Blog

No comments:

Post a Comment