Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: The Power Method is a classic numerical algorithm for determining the largest eigenvalue and eigenvector associated with a matrix A. prepare a MATLAB function that returns the largest eigenvalue and eigenvector by using the Power Method (see Wikipedia) for a given matrix A. Construct the algorithm so that it always runs 100 iterations {you must not implement a stopping criteria. Don’t copy others codes. Test your algorithm on the matrix: A = [2.0, 0.2, 1.0; 0.2, 4.0, 1.3; 0.0, 1.3, 3.0] by using an initial eigenvector guess of b = [1; 1; 1].

problem 2: In class, we derived and resolved a model of a non-isothermal, insulated, CSTR with an exothermic reaction (model6.m). Want to derive and solve a very similar model of a system with only a single feed stream and the given properties:

1540_non isothermal.jpg

Simulate this system for 20 minutes with an initial concentration of CA(0) = 10 lbmol/oR and T(0) = 200oR or T(0) = 600oR. Compare and elucidate the steady-state result for the two different initial conditions. What is the significance of this result for implementing a process control scheme?

problem 3: Derive and resolve a model of an insulated water tank with a changing level (that is, changing tank volume). There is only one inflow stream with a flow rate of 1 kg/sec for t < 0 and 0.9 kg/sec for t ≥ 0.The out flow rate depends upon the level, H, within the tank and is given by mout = kv√H where kv = 0:8 kg/(m0.5s). The tank is fitted with an electric heater that inputs Q = 100kW (constant) and the cross-sectional area of the tank is 1.1m2. Derive both the mass and energy balances, determine the steady state conditions at t < 0, and determine via numerical simulation the impact of the changing in flow rate at t ≥ 0.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9532

Have any Question? 


Related Questions in Computer Engineering

1 list as many of the emergency agencies in your community2

1. List as many of the emergency agencies in your community. 2. Of these listed in (1) above, which are dealing with information security? 3. We pointed out that the development of a good disaster recovery plan requires ...

Technical paper programming for the health care industryits

Technical Paper: Programming for the Health Care Industry It's common knowledge that using computers in the health care industry can improve the quality and effectiveness of care while reducing costs. However, the adopti ...

1 does an snmp manager run a client snmp program or a

1. Does an SNMP manager run a client SNMP program or a server SNMP program? 2. Show how the textual name "iso.org.dod" is numerically encoded in SMI. 3. Is it possible to have a textual name in SMI as "iso.org.internet"? ...

1 evaluate the worst case time-complexity of the sparse

1. Evaluate the worst case time-complexity of the Sparse Matrix ADT implemented in Programming Project 9.7. 2. Provide the code to implement the four basic operations - traversal, search, insertion, deletion - for an uns ...

Below is a single node of an idef0 diagram decompose node

Below is a single node of an IDEF0 diagram. Decompose node A33 into three functions of Calculate Sales Tax, and Calculate Shipping, and Calculate Order Total. Make sure the ICOM objects remain consistent in the decomposi ...

1 assume a private internet uses a protocol suite totally

1. Assume a private internet uses a protocol suite totally different from the TCP/ IP protocol suite. Can this internet still use the services of UDP or TCP as an end-to-end vehicle of message communication? 2. Can you e ...

1 what is a mantrap when should it be used2 what is the

1. What is a mantrap? When should it be used? 2. What is the most common form of alarm? What does it detect? What types of sensors are commonly used in this type of alarm system?

As is so often true in cryptography it is easy to weaken a

As is so often true in cryptography, it is easy to weaken a seemingly strong scheme by small modifications. Assume a variant of the OFB mode by which we only feed back the 8 most significant bits of the cipher output. We ...

Umldiscuss the balance between absolute truth and using

¨Discuss the balance between absolute truth and using data to reach a particular goal?

Go to a popular online electronic commerce site like

Go to a popular online electronic commerce site like Amazon.com. Place several items in your shopping cart, and then go to check out. When you reach the screen that asks for your credit card number, right-click on the We ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro