Slope deflection equations, Computer Engineering

Assignment Help:

Slope Deflection Equations for a Member:

In this section, we will develop a few general equations needed for further discussion in the moment distribution context.

2368_Slope Deflection Equations.png

Figure 5(a) shows a beam hinged at the end A and fixed at B. A clockwise moment MA at A produces a clockwise rotation θA at end A, the moment at end B is assumed MB while the slope at the fixed end B is zero. The vertical reactions at VA and VB are equal in magnitude but their directions will be opposite as shown in the diagram producing an anticlockwise couple to balance the couple due to the end moments MA and MB.

i.e.       - VA = VB   =   MA+MB/L

To find out MA and MB we shall apply the moment area method. The bending moment (÷ EI) diagram is shown in Figure. At the left hand end clockwise MA is positive (sagging) BM while at the right hand end clockwise MB is a negative (sagging) BM.


Related Discussions:- Slope deflection equations

Gui status in a program from the object browser, Can we create a gui status...

Can we create a gui status in a program from the object browser? Yes.  You can make a GUI STATUS in a program using SET PF-STATUS.

Determine the simulation factor- weather, Determine the simulation factor- ...

Determine the simulation factor- Weather Illustration of simulation is predicting weather (i.e. a weather forecaster). In this case we will consider what/how data is collected,

What is called network, Network with point-to-point link is known as (...

Network with point-to-point link is known as (A) Fully Connected Network        (B)  Half Connected Network (C)  Duplex Connected Network    (D)  None of these Ans:

Estimate the size of the state space, 1. The missionaries and cannibals pro...

1. The missionaries and cannibals problem. Three missionaries and three cannibals are on the left river bank, with a boat that can hold one or two people. If on either side of the

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data. In May 2002 year, the Norton Anti-Virus software for Windows operating systems detected around 61000 malicious programs. Several of them a

Data parallel model - parallel programming model, In the data parallel mode...

In the data parallel model, many of the parallel work focus on performing operations on a data set. The data set is usually organized into a common structure, such as an array or a

Define functionality of application layer in tcp/ip protocol, Define the fu...

Define the functionality of application layer in TCP/IP protocol stack? Function of Application Layer: The top layer within the Internet reference model is the applicatio

Address fields and phone fields , Make a nested struct to store a person's ...

Make a nested struct to store a person's name, address, and phone numbers.  The struct should have 3 fields for the name, address, and phone. The address fields and phone fields wi

Single instruction and single data stream (sisd), Single Instruction and Si...

Single Instruction and Single Data stream (SISD) In this organisation, sequential implementation of instructions is executed by one CPU having a single processing element (PE

Explain direct or indirect communication, Explain Direct or Indirect Comm...

Explain Direct or Indirect Communication in Inter-process communication. Several types of message passing system in Direct or Indirect Communication are given below:

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd