+1-415-315-9853

info@mywordsolution.com

## Engineering

 Civil Engineering Chemical Engineering Electrical & Electronics Mechanical Engineering Computer Engineering Engineering Mathematics MATLAB Other Engineering Digital Electronics Biochemical & Biotechnology

Problem1:

Make a computer code to simulate following solidification situation throughout a casting process:

The material is a well-known polymer named as PEEK (polyetheretherketone).  The properties of this material are as follows:

Suppose that Tinitial = 650 K everywhere (the pouring temperature) and that at time = 0 the wall temperatures on walls AB, BC, AD, and DC are set to Twall = 290 K (the mold temperature).  Study this solidification problem numerically, and hand in following:

• A copy of your source code
• Plots of T centre versus time and Tp versus time
• The total solidification time and final point of solidification within the product.
• Contour plots of solidus and liquidus interfaces for a certain time.
• A plot showing the temporal progression of solidus interface fronts during the casting process.
Run your code several times with a deceasing mesh cell size.  For each of these mesh cell sizes, report on the following:
• The total solidification time and final point of solidification within the product.

From this mesh size sensitivity analysis suggest an optimal mesh size to address this type of problem.

δ^2*T/δx^2
Δ/Δx * ΔT/Δx

Computer Engineering, Engineering

• Category:- Computer Engineering
• Reference No.:- M91315

Have any Question?

## Related Questions in Computer Engineering

### Phase transitions and tipping points phase transitions and

Phase transitions and tipping points Phase transitions and the related idea of tipping points occur in many different systems, where a small change in one parameter causes a large change in an output variable. The Fire S ...

### Assignmentsection 1 algorithm analysisto do well before

Assignment SECTION 1. Algorithm Analysis TO DO WELL: Before you work on this section, write down what W(N) means, and the F(N)s of sorting and searching. 1) What is the purpose of using asymptotic notation such as O, Ome ...

### 1 write a procedure to get a color to spread from patch to

1. Write a procedure to get a color to spread from patch to patch. (There are many ways to do this. Pick one you like.) Create a button to launch this procedure. 2. Write a procedure that makes the turtles chase after th ...

### 1 there is a small bug in the heroes and cowards model can

1. There is a small bug in the Heroes and Cowards model. Can you find and fix it? 2. Another model that uses similar rules to Heroes and Cowards is the Follower model in the Art section of the NetLogo models library. How ...

### Commercial matching service scenariowwwbuycomputercom is a

Commercial Matching Service Scenario www.buycomputer.com is a fictitious website to match consumers who wish to purchase computers with businesses who are able to supply them. It works as follows: 1- Consumers can visit ...

### 1 write a regular expression that finds all the words in a

1. Write a regular expression that finds all the words in a string that contain double letters, such as "deep" and "book". 2. Write a regular expression that finds all the header tags (, , etc.) in a Web page. 3. Write a ...

### Given alpha 0 b 1 and c 1 are the first three numbers of

Given α = 0, b = 1, and c =1 are the first three numbers of some sequence. All other numbers in the sequence are generated from the sum of their three most recent predecessors. Design an algorithm to generate this sequen ...

### A 2 gb ie 2 230nbspbyte memory system with 32-bit

A 2 GB (i.e., 2 * 2 30  byte) memory system with 32-bit addresses is used with a 4-way set associative cache that contains a total of 65536 lines (each line is 512 bytes in size).  How many different memory blocks could ...

### Describe two types of variables or methods that can be used

Describe two types of variables or methods that can be used to exchange data between web pages and give example code of both types.

### A noted computer security expert has said that without

A noted computer security expert has said that without integrity, no system can provide confidentiality. a. Do you agree? Justify your answer. b. Can a system provide integrity without confidentiality? Again, justify you ...

• 13,132 Experts

## Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

### Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

### Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

### Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

### Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

### Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen