Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1: The Power Method is a classic numerical algorithm for determining the largest eigenvalue and eigenvector associated with a matrix A. prepare a MATLAB function that returns the largest eigenvalue and eigenvector by using the Power Method (see Wikipedia) for a given matrix A. Construct the algorithm so that it always runs 100 iterations {you must not implement a stopping criteria. Don’t copy others codes. Test your algorithm on the matrix: A = [2.0, 0.2, 1.0; 0.2, 4.0, 1.3; 0.0, 1.3, 3.0] by using an initial eigenvector guess of b = [1; 1; 1].

problem 2: In class, we derived and resolved a model of a non-isothermal, insulated, CSTR with an exothermic reaction (model6.m). Want to derive and solve a very similar model of a system with only a single feed stream and the given properties:

1540_non isothermal.jpg

Simulate this system for 20 minutes with an initial concentration of CA(0) = 10 lbmol/oR and T(0) = 200oR or T(0) = 600oR. Compare and elucidate the steady-state result for the two different initial conditions. What is the significance of this result for implementing a process control scheme?

problem 3: Derive and resolve a model of an insulated water tank with a changing level (that is, changing tank volume). There is only one inflow stream with a flow rate of 1 kg/sec for t < 0 and 0.9 kg/sec for t ≥ 0.The out flow rate depends upon the level, H, within the tank and is given by mout = kv√H where kv = 0:8 kg/(m0.5s). The tank is fitted with an electric heater that inputs Q = 100kW (constant) and the cross-sectional area of the tank is 1.1m2. Derive both the mass and energy balances, determine the steady state conditions at t < 0, and determine via numerical simulation the impact of the changing in flow rate at t ≥ 0.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9532

Have any Question? 

Related Questions in Computer Engineering

Assumenbspthat the it department of a business has hired

Assume  that the IT department of a business has hired you, and your first task is to ensure the department is following essential information security practices. Write  a 2- to 3-page paper highlighting the most importa ...

The web server on the dmz web server system renames

The Web server on the DMZ Web server system renames temporary files used to record transactions. The name has the form trns followed by the integer representation of the date and time, followed by one or more digits. Why ...

1 what are the types of password attacks what can a systems

1. What are the types of password attacks? What can a systems administrator do to protect against them? 2. What is the difference between a denial-of-service attack and a distributed denial-of-service attack? Which is mo ...

1 what is the size of the key space if all 8 characters are

1. What is the size of the key space if all 8 characters are randomly chosen 8-bit ASCII characters? How long does an average key search take with a single PC? 2. How many key bits are used, if the 8 characters are rando ...

Matlabs fft command computes the dft of a vector x assuming

MATLAB's fft command computes the DFT of a vector x assuming that the first sample occurs at time n = 0. Given that X = fft(x) has already been computed, derive a method to correct X to reflect an arbitrary starting time ...

Develop an algorithm that uses a random number generator

Develop an algorithm that uses a random number generator which always generates random numbers in the range lower. . . . upper. In each instance the random number generated should take on the role of middle in the above ...

Create an array of 1000 integers sorted in reverse

Create an array of 1,000 integers sorted in reverse numerical order. Write a program that runs each sorting algorithm with this array, timing each algorithm, and compare the times.

Color images can also be stored using three separate color

Color images can also be stored using three separate color channels in which the values of each color component is stored in a separate data structure. Implement a new version of the Color Image ADT using three 1-D array ...

1 discuss the basic components of cryptography2 discuss the

1. Discuss the basic components of cryptography. 2. Discuss the weaknesses of symmetric encryption. 3. Discuss the weaknesses of public-key encryption. 4. Why is a hybrid cryptosystem preferred over symmetric and public- ...

1 add a function to the binarysearchtree class that counts

1. Add a function to the BinarySearchTree class that counts the number of edges in a tree. 2. Rewrite Exercise 1 so that it stores the words from a text file. Display all the words in the file and the number of times the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro