-
MATLAB Codes for Finite Element Analysis
有限元分析的matlab代码- 结构
本书旨在为读者提供一些有限元的matlab代码。
在简短介绍MATLAB之后,这本书说明了有限元。
用简单的脚本和函数实现一些问题。
.离散系统,如弹簧和杆
.梁和框架在二维和三维中的弯曲
.平面应力问题
.弯曲板
.Timoshenko明德林梁和板的自由振动,包括叠层复合材料
.Timoshenko梁和明德林板的屈曲(MATLAB Codes for Finite Element Analysis- Solids and Structures
This book intend to supply readers with some MATLAB codes for finite element analysis of solids and structures.
After a short introduction to MATLAB, the book illustrates the finite element
implementation of some problems by simple scripts and functions.
The following problems are discussed:
.Discrete systems, such as springs and bars
.Beams and frames in bending in 2D and 3D
. Plane stress problems
.Plates in bending
.Free vibration of Timoshenko beams and Mindlin plates, including laminated composites
.Buckling of Timoshenko beams and Mindlin plates)
- 2020-12-08 09:39:20下载
- 积分:1
-
Sea_scatting_lunwen
讲述的是海面的各种散射情况的文章,包括经向散射,曼散射等(About the various scattering off the article, including by the scattering, scattering, etc. Man)
- 2011-10-21 12:01:37下载
- 积分:1
-
theArtOfDeception
美国著名黑客凯文出狱后的大作,本书介绍了各种入侵手法,和案例。(英文原著)(The United States after his release a well-known hacker Kevin s masterpiece, this book introduces all kinds of invasion of practices, and cases. (English original))
- 2007-12-31 06:02:50下载
- 积分:1
-
Asterisk05
51CTO下载-第05章用户设备配置.pdf(51CTO downloads- Chapter 05 user device configuration pdf.)
- 2014-06-23 22:22:43下载
- 积分:1
-
iam1hack
黑客技术教程,其实是一位黑客高手的随笔啊。(Hacking technology tutorials, is a master hacker of Suibi ah.)
- 2009-11-29 13:34:08下载
- 积分:1
-
j
说明: 基于数字全息和离散余弦变换的数字水印技术(Digital watermarking technology based on digital holography and discrete cosine transform)
- 2013-03-18 15:47:09下载
- 积分:1
-
asp100tip
asp常见100个问题解答。对于新手入门阶段学习帮助很多。(asp 100 tips.)
- 2010-01-21 17:29:15下载
- 积分:1
-
ecc
说明: This paper analyzes the cryptography scheme of the Trust Platform Model(TPM). The focus of the discussion would be the comparison of elliptic curve cryptography and the nowadays widely used 2048-bit RSA in evaluating which would be better suited to be used on TPM. A TPM implementation scheme based on ECC is proposed, which includes encryption and decryption schemes, signature and verification scheme, key agreement scheme. Corresponding examples of TPM commands would also be given.
- 2019-06-13 14:53:45下载
- 积分:1
-
ARMandc51
说明: ARM与51编写程序的区别
测试环境:KEIL ARM的空间统一编址,单片机的空间独立编址 ARM没有bool变量,单片机可采用bit变量(ARM write programs with 51 different test environment: KEIL ARM room for a unified addressing, single-chip ARM addressing space is not an independent bool variable, the variable bit microcontroller can be used)
- 2010-03-28 02:27:13下载
- 积分:1
-
ppt
PPT模板,非常经典,适合计算机答辩时候用的啊,上课的情况下也可以用的啊(PPT templates, very classic, suitable for computer time used to reply, ah, the case of school can also use the ah)
- 2009-05-24 09:37:29下载
- 积分:1