Simulation for Designers - Fringe Display Stress Plots

As mentioned in the previous article, based on best practice, there is a need to analyse results at least three times, to check whether the stress results have converged. In most cases, hopefully, the difference in stress values will become minimal. But however, due to stress singularities, the stress values will not converge.

FIND OUT MORE INFORMATION ABOUT SIMULATION Read our blogs and case studies, or watch our short videos and on-demand webinars. FIND OUT MORE

In these scenarios, Nastran In-CAD's comprehensive set of post-processing tools can prove to be helpful. Since there are many post-processing tools available within Nastran In-CAD here will initially discuss Fringe Display plots.

The main benefit of using fringe results is that once we alter the maximum value of the legend bar any value higher than the new maximum will be displayed as grey. This can prove to be very useful as we can use this technique to isolate high stresses due to singularities and concentrate on the area of interest.


It is important to note that altering the maximum value is not about fiddling (non-technical term) with results but is merely about presenting results which are meaningful. Once we have a minimal grey area we can use the probe tool available within Nastran In-CAD to display the maximum value. The benefit of using a fringe display and probes like this is to help locate the maximum value location with ease in the area of interest within the model.

I hope you find this tool helpful, and continue with the next blog in this series 'Exploring corner stress plots'

Blog

ESSENTIAL SECURITY PRACTICES FOR REMOTE WORKERS

31 October 2024

Remote work has become increasingly common and has redefined the modern workplace. With this flexibility comes a new set of challenges - Cybersecurity threats. Implement these 12 practices to enhance security measures...

Learn more
Blog

ENHANCING YOUR EMAIL SECURITY

31 October 2024

Enhancing your email security is essential to protecting personal and sensitive information. Emails are a common target for phishing, malware and other cyber threats. Consider the following key practices to enhance your email security...

Learn more