Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
On the Moodle site just below the assignment you will find data from a slow sine sweep test conducted on a car on a "four-post" road simulator for the frequency range 0 to 20 Hz in the EXCEL spreadsheet "Ride_Comfort_Data". The response has been measured vertically on the seat rail of the driver's seat while the front two actuators moved up and down in phase and the rear actuators remained at rest. The amplitude of the actuator motion was such that the velocity amplitude was constant throughout the frequency sweep at 100 mm/s. The response amplitude at the seat rail is measured in g.
(a) Obtain the transmissibility between the input motion of the actuators as a single input and the motion of the seat rail. Provide a graph from EXCEL showing the transmissibility.
(b) The transmissibility in (a) does not tend to 1 at low frequency as might be expected for an ideal one degree of freedom system. Explain this.
(c) Estimate the natural frequency and damping factor for the sprung mass mode involving motion of the body on the front suspension.
(d) If the diameter of the front tyres of the car is 0.6 m estimate the car speed in kph which would cause an "engine shake" problem in the car. (This will require you to identify the frequency for the engine shake mode from your graph.)
(e) In road tests on a relatively flat test track surface at 80 kph with one front wheel deliberately unbalanced, the idle shake at the seat rail position, measured using an accelerometer, was 4.2 g rms. The other three wheels were in almost perfect balance. What displacement amplitude and frequency of the front two actuators of the road simulator would be necessary to achieve the same seat rail motion in the laboratory?
Which technique is an encryption technique? Ans. Block cipher technique and also Steam cipher technique is an encryption technique.
Explain the CCITT hierarchical structure of routing using block schematic. In right-through routing the originating exchange finds the whole route from source to destination. N
Question: (a) What are the main challenges for Mobile Computing? (b) What is the ISM band and what is particular about this frequency band? Name two wireless technologies
what is boundary filling explain with example
Sometime you may have to reset your computer (i.e., Reboot DOS) when it is still running because DOS does not work accurately. To reset your computer you have two choices: 1. P
If two base classes have no overlapping methods or data they are said to be independent of, or orthogonal to each other. Orthogonal in the sense means that two classes function in
Clarify the operation of IRET instruction. What memory locations comprise the vector for an INT 34 instruction? Interrupt return (IRET) instruction is used only with hardware
Q. Explain list directive in assembly language? A list directive causes assembler to generate an annotated listing on printer, video screen, disk drive or any combination of th
Knowledge Representation: To recap, we now have some characterizations of "AI", that when an "AI" problem arises, you will be able to put all into context exactly, find the co
Q. Calculate Print Speed of printers? Speed at which a printer prints is generally an important issue. Though the printer has to take a certain time to print. Printing time ris
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd