Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem 1: The Power Method is a classic numerical algorithm for determining the largest eigenvalue and eigenvector associated with a matrix A. prepare a MATLAB function that returns the largest eigenvalue and eigenvector by using the Power Method (see Wikipedia) for a given matrix A. Construct the algorithm so that it always runs 100 iterations {you must not implement a stopping criteria. Don’t copy others codes. Test your algorithm on the matrix: A = [2.0, 0.2, 1.0; 0.2, 4.0, 1.3; 0.0, 1.3, 3.0] by using an initial eigenvector guess of b = [1; 1; 1].

problem 2: In class, we derived and resolved a model of a non-isothermal, insulated, CSTR with an exothermic reaction (model6.m). Want to derive and solve a very similar model of a system with only a single feed stream and the given properties:

1540_non isothermal.jpg

Simulate this system for 20 minutes with an initial concentration of CA(0) = 10 lbmol/oR and T(0) = 200oR or T(0) = 600oR. Compare and elucidate the steady-state result for the two different initial conditions. What is the significance of this result for implementing a process control scheme?

problem 3: Derive and resolve a model of an insulated water tank with a changing level (that is, changing tank volume). There is only one inflow stream with a flow rate of 1 kg/sec for t < 0 and 0.9 kg/sec for t ≥ 0.The out flow rate depends upon the level, H, within the tank and is given by mout = kv√H where kv = 0:8 kg/(m0.5s). The tank is fitted with an electric heater that inputs Q = 100kW (constant) and the cross-sectional area of the tank is 1.1m2. Derive both the mass and energy balances, determine the steady state conditions at t < 0, and determine via numerical simulation the impact of the changing in flow rate at t ≥ 0.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9532

Have any Question? 


Related Questions in Computer Engineering

In ssltls protocol what kind of authentication is supported

In SSL/TLS protocol, what kind of authentication is supported when you establish a secure session between a client and a server? A) Only server authentication (optional). B) Server authentication (mandatory) and client a ...

What factors should a firm consider when evaluating a move

What factors should a firm consider when evaluating a move from a client/server system to a cloud computing environment? Answer in about two paragraphs with reference. Must be 200-400 words and show an understanding and ...

Design a combination generation algorithm that accepts as

Design a combination generation algorithm that accepts as input a set of n characters and produces as output all combinations of size r of these characters.

1 does the recursive implementation of the binary search

1. Does the recursive implementation of the binary search algorithm from Listing 2. exhibit tail recursion? If not, why not? 3. Determine the worst case run time of the recursive exponential function exp(). 4. Determine ...

Design an algorithm that accepts as input a given

Design an algorithm that accepts as input a given permutation of the ten digits and returns as output the next permutation in the set in lexical order. As an example, if we have: Current permutation is: 7 9 0 1 6 3 8 5 4 ...

1 what is the most effective biometric authorization

1. What is the most effective biometric authorization technology? Why do you think this technology is deemed to be most effective by security professionals?

1 what does a typical mdm solution include2 list and

1. What does a typical MDM solution include? 2. List and discuss vendors of MDM 3. Discuss the Windows Mobile security model, authentication services, Credential Manager, cryptography, and LASS application development an ...

Compare and contrast traditional outsourcing with the

Compare and contrast traditional outsourcing with the Software as a Service. Under what conditions do you think a company should choose SaaS over traditional outsourcing? Explain your views and discuss them with your pee ...

We used the terms passive open and active open in

We used the terms passive open and active open in discussing a connectionoriented communication using TCP. Assume there is a telephone conversation between Alice and Bob. Since a telephone conversation is an example of a ...

1 what is a discontiguous subnet why do some enterprise

1. What is a discontiguous subnet? Why do some enterprise networks have discontiguous subnets? Why don't classful routing protocols support discontiguous subnets? 2. Discuss the configuration of IP addresses. When manual ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen