Survey of advanced applications, Computer Engineering

Assignment Help:

1. Conduct a literature survey of advanced applications of the finite element method for engineering design and analysis.

2. Identify at least one application, which interests you the most.

3. Submit a report on your findings; with technical scope and information on the application you have identified (at least three pages).

Notes:

A) Possible applications may include:

a. Stress analysis of complex structures, nonlinear materials, large deformations, structural stability (buckling), dynamic response, etc., - Computational Solid Mechanics (CSM).

b. Analysis of heat transfer problems involving solids, fluids convection, radiation, etc., - Computational Heat Transfer (CHT).

c. Analysis of fluid dynamics problems - Computational Fluid Dynamics (CFD).

d. Analysis of electromechanical and electromagnetic problems - Computational Electromagnetics (CEM).

e. Analysis of metal casting, plastics molding, phase change phenomena, etc.

f. Coupled problems, such as solid-fluid interactions, conjugate heat transfer, thermal stress, etc. 2

B) Applications may be in automotive, aerospace, materials processing, biomedical (biofluids, bioheat, biomechanics), chemical, pharmaceutical, and computer manufacturing, industries.

C) Good sources for investigation are various finite element and computational mechanics websites including:

a. www.ansys.com for Ansys

b. www.engr.iupui.edu/cfdlab for our department's Computational Fluid Dynamics Laboratory

c. www.engr.iupui.edu/me/courses/fproject.shtml for our department's sample undergraduate projects 

d. www.engr.iupui.edu/me/fpres.shtml for our department's sample graduate projects

e. any other appropriate Web sites you might discover

D) Your report should contain the following information:

a. Cover page

b. Description and significance of the problem

c. Application areas

d. Possible finite element modeling approaches

e. Your potential contributions

f. Source(s) of information (i.e., references)


Related Discussions:- Survey of advanced applications

Explain the relationship between translated & linked address, Explain the r...

Explain the relationship amongst Translated address and Linked address. Translated address: Address assigned through the translator Linked address: Address assigned

What is meant by the guest function, When  transferring  one  functio...

When  transferring  one  function  to  another,  what  is  meant  by  the  guest  function? A pointer to a function can be passed to another function as an argument. This allows

Array to be sorted is partitioned again and again, The sorting method where...

The sorting method where array to be sorted is partitioned again and again in such a way that all elements less than or equivalent to partitioning element appear before it and thos

Applications of linked list, What are the Applications of Linked List are ...

What are the Applications of Linked List are a) Fixed block storage allocation b) garbage collection

Discuss various enhanced services of stored program control, Discuss the va...

Discuss the various enhanced services that can be made available to the subscribers because of stored program control. One of the instant benefits of stored program control is

Difference b/w non-relocatable and relocatable programs, Differentiate bet...

Differentiate between non-relocatable and relocatable programs. A non-relocatable program is one which cannot be executed in any memory area other than the area starting at i

What is internal path length, Internal Path length It is described as t...

Internal Path length It is described as the number of node traversed while moving by one particular node to any other node in the tree.

Describe about full adder, Q. Describe about full adder? Let's take ful...

Q. Describe about full adder? Let's take full adder. For this other variable carry from previous bit addition is added let'us call it 'p'. Truth table and K-Map for this is dis

Program in c, addition c program for token separation

addition c program for token separation

Linux, Discuss the risks of having a single root user and how more limited ...

Discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd