• Aucun résultat trouvé

Operator TO COPY Code_Aster

N/A
N/A
Protected

Academic year: 2022

Partager "Operator TO COPY Code_Aster"

Copied!
3
0
0

Texte intégral

(1)

Code_Aster Version default

Titre : Opérateur COPIER Date : 22/01/2013 Page : 1/3

Responsable : Jacques PELLET Clé : U4.14.02 Révision : 10318

Operator TO COPY

1 Goal

Duplicating a concept user under another name.

This command is seldom useful and it presents the disadvantage of doubling space “disc” of the concept in the global database of the user. The product concept can be destroyed (command TO DESTROY) to recover the disk space.

Only certain types of concepts are accepted.

Warning : The translation process used on this website is a "Machine Translation". It may be imprecise and inaccurate in whole or in part and is provided as a convenience.

Licensed under the terms of the GNU FDL (http://www.gnu.org/copyleft/fdl.html)

(2)

Code_Aster Version default

Titre : Opérateur COPIER Date : 22/01/2013 Page : 2/3

Responsable : Jacques PELLET Clé : U4.14.02 Révision : 10318

2 Syntax

CO2 = TO COPY ( ♦ CONCEPT = co1, [concept]

◊INFO = 1,

/2, )

3 Operands

3.1 Key word CONCEPT

♦CONCEPT = co1

Name of the concept which one wants to duplicate.

Result of the command is of the same type as the duplicated concept.

3.2 Types of CONCEPT authorized

One cannot duplicate all the types of concepts.

Only are currently treated:

cabl_precont, listr8_sdaster, listis_sdaster, fonction_sdaster, nappe_sdaster, table_sdaster, maillage_sdaster, modele_sdaster, evol_elas, evol_noli, evol_ther,

If the type of the concept that you want to duplicate does not appear in this list, it is necessary to emit a request for evolution.

3.3 Remarks

the need to duplicate a concept is rare because it is a priori useless to have the same object under two different names.

The product concept (CO2) corresponds to a “deep” copy of the initial concept (co1), i.e. that one duplicated TOUS the JEVEUX objects of co1.

The “volume” of CO2 in the global database is identical to that of co1.

The use of the command thus led always to a loss in the disk space.

3.4 Operand INFO

◊INFO = information

Warning : The translation process used on this website is a "Machine Translation". It may be imprecise and inaccurate in whole or in part and is provided as a convenience.

Licensed under the terms of the GNU FDL (http://www.gnu.org/copyleft/fdl.html)

(3)

Code_Aster Version default

Titre : Opérateur COPIER Date : 22/01/2013 Page : 3/3

Responsable : Jacques PELLET Clé : U4.14.02 Révision : 10318

This key word does not have any influence.

4 Example

Lr1 =DEFI_LISTE_REEL ( … ) Lr2 =COPIER (CONCEPT = Lr1)

Warning : The translation process used on this website is a "Machine Translation". It may be imprecise and inaccurate in whole or in part and is provided as a convenience.

Licensed under the terms of the GNU FDL (http://www.gnu.org/copyleft/fdl.html)

Références

Documents relatifs

Dans ces situations, la r ealisation d’une pr e-coupe papillaire pr ecoce, l’utilisation d’un fil guide pancr eatique ou d’une proth ese pancr eatique peuvent faciliter la

We consider locally C-flat embeddings in codimension one in three categories C : TOP (continuous maps), LQC (locally quasiconformal maps), and LIP (locally Lipschitz

Suppose R is a right noetherian, left P-injective, and left min-CS ring such that every nonzero complement left ideal is not small (or not singular).. Then R

S everal years ago, at the urging of some nonmedical friends, a small group of physicians and our spouses created a new board game called “Diagnosis.” Each player was a

Our research showed that an estimated quarter of a million people in Glasgow (84 000 homes) and a very conservative estimate of 10 million people nation- wide, shared our

Considering that during the discussion on the report of the Regional Director reference has been made to the health problems created by refugees from the Portuguese colonies

This order is seldom useful and it presents the disadvantage of doubling space “disc” of the concept in the total base of the user.. The produced concept can be destroyed (order

PSEUDONYMS: Pseudonyms can be used in Confer II conferences for items, responses, and messages, and participants can register in the conference under a