Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: The Power Method is a classic numerical algorithm for determining the largest eigenvalue and eigenvector associated with a matrix A. prepare a MATLAB function that returns the largest eigenvalue and eigenvector by using the Power Method (see Wikipedia) for a given matrix A. Construct the algorithm so that it always runs 100 iterations {you must not implement a stopping criteria. Don’t copy others codes. Test your algorithm on the matrix: A = [2.0, 0.2, 1.0; 0.2, 4.0, 1.3; 0.0, 1.3, 3.0] by using an initial eigenvector guess of b = [1; 1; 1].

problem 2: In class, we derived and resolved a model of a non-isothermal, insulated, CSTR with an exothermic reaction (model6.m). Want to derive and solve a very similar model of a system with only a single feed stream and the given properties:

1540_non isothermal.jpg

Simulate this system for 20 minutes with an initial concentration of CA(0) = 10 lbmol/oR and T(0) = 200oR or T(0) = 600oR. Compare and elucidate the steady-state result for the two different initial conditions. What is the significance of this result for implementing a process control scheme?

problem 3: Derive and resolve a model of an insulated water tank with a changing level (that is, changing tank volume). There is only one inflow stream with a flow rate of 1 kg/sec for t < 0 and 0.9 kg/sec for t ≥ 0.The out flow rate depends upon the level, H, within the tank and is given by mout = kv√H where kv = 0:8 kg/(m0.5s). The tank is fitted with an electric heater that inputs Q = 100kW (constant) and the cross-sectional area of the tank is 1.1m2. Derive both the mass and energy balances, determine the steady state conditions at t < 0, and determine via numerical simulation the impact of the changing in flow rate at t ≥ 0.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9532

Have any Question? 


Related Questions in Computer Engineering

1 is creating a timeline more important for the design of

1. Is creating a Timeline more important for the design of the project then for actually coding it? How so? 2. Is it possible to translate a feature, like Panorama, that uses multiple screens in a desktop environment, to ...

Explain why it is important for the safety professional to

Explain why it is important for the safety professional to become knowledgeable and skilled in system safety concepts. Your response must be at least 75 words in length.

Write a program that generates a sequence of 20 random die

Write a program that generates a sequence of 20 random die tosses and that prints the die values, marking only the longest run, like this: If there is more than one run of maximum length, mark the first one.

From the weekly readings and e-activity analyze the key

From the weekly readings and e-Activity, analyze the key influences that the theoretical and practical aspects of public leadership may exert upon a public leader's performance. Provide two (2) examples of these influenc ...

Phase transitions and tipping points phase transitions and

Phase transitions and tipping points Phase transitions and the related idea of tipping points occur in many different systems, where a small change in one parameter causes a large change in an output variable. The Fire S ...

Design and implement an algorithm that inserts items on the

Design and implement an algorithm that inserts items on the end of a list. Your algorithm should not have to search the list to perform the insertion.

1 what are electromycycles most important assets that must

1. What are ElectroMyCycle's most important assets that must be protected with security mechanisms? 2. What are the biggest security risks that ElectroMyCycle faces? 3. Design a high-level security policy for ElectroMyCy ...

1 a network consists of n hosts assuming that cryptographic

1. A network consists of n hosts. Assuming that cryptographic keys are distributed on a per-hostpair basis, compute how many different keys are required. 2. One cryptographic checksum is computed by applying the DES in C ...

Design and implement the bstbuild function which takes a

Design and implement the bstBuild() function, which takes a sequence of keys and builds a new search tree from those keys. For example, the function could be used to build the binary search tree in Figure 14.5.

1 what is cloud computing2 discuss the software models

1. What is cloud computing? 2. Discuss the software models predating cloud computing. 3. Discuss the major models in cloud computing. 4. What are the bene fits of cloud computing over software as a service (SaaS)?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen