Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Deep drawing is a manufacturing process that can create a complex shape out of a simply shaped plate (blank). The deep-drawing configuration is shown in the figure, which is composed of a blank, punch, die, and blank holder. The thickness of the initial blank is 0.78 mm. The die is fixed throughout the entire process, while the punch moves down by 30 mm to shape the blank. The holder controls the slip of the blank by applying friction force. The fillet radii of both punch and die are 5 mm. After the maximum downstroke of the punch, both the punch and holder are removed. Then, the blank will experience elastic springback. The objective of this project is to simulate the final geometry of the blank after springback.

Model the process using an axisymmetric problem. You many use CAX4R elements. The whole simulation is divided by three steps.

(1) The blank holder is pushed (displacement control) to provide about 100 kN of holding force.

(2) While the blank holder is fixed at the location of step (1), the punch is moved down by 30 mm.

(3) Punch, die, and blank holder are removed so that the blank is elastically deformed by springback. It is possible to change processes.

The following results need to be submitted:

(1) deformed shape plots of five different steps,

(2) graph of radial position vs. radial strain, and

(3) graph of radial position vs. thickness change,

(4) graph of punch displacement vs. punch force, and

(5) comparison of deformed shapes at the maximum stroke and after springback.

1907_Deep Drawing problem.jpg

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92059008

Have any Question?


Related Questions in Management Information System

Designing a network topologyplease respond to the

"Designing a Network Topology" Please respond to the following: Present real-world examples that describe the significance of designing modular, redundant, and secure network architectures. Defend your answer from a tech ...

Linux is the best-known and most-utilized open source

Linux is the best-known and most-utilized open source operating framework. As an operating framework, Linux is programming that sits underneath the greater part of the other programming on a PC, getting demands from thos ...

Question what is information securityhow does the proper

Question : What is Information Security? How does the proper application of Information Security can reduce risk? Format your assignment consistent with APA guidelines.

Assessment instructionsfor this assessment you will

Assessment Instructions For this assessment, you will complete your perimeter security strategy. Each organization or company would need to show how their data, assets, and networks are protected. In this assessment, you ...

The main project in this project you are either work on the

The main project: In this project, you are either work on the hypothetical company or an existing company. In either case, you are supposed to develop a Business Intelligence Development Plan for a local corporation. In ...

Answer the following question why is it important for hr

Answer the following Question : Why is it important for HR management to transform from being primarily administrative and operational to a more strategic contributor? Your discussion is to be submitted in 12-point Times ...

Assignment capabilities proposal you are a 10 million

Assignment : Capabilities Proposal You are a $10 million consulting company responding to a Capabilities Proposal for a prospective client. The client seeks an analysis of its existing network in anticipation of a large ...

Question provide an explanation of ifwherehow does active

Question : Provide an explanation of if/where/how does Active Directory support network security,14 pages (2,000-2,500) in APA format. Include abstract and conclusion. Do not include wikis, message boards, support forums ...

Team assignment team and team performance evaluation300

Team Assignment : Team and Team Performance Evaluation. 300 Words per each Topic and 2 references per topic 1) Present a discussion of what team is. What type(s) of team do you have in your organization? 2) What is meant ...

Assignmentas a member of the information security team at a

Assignment As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As