SlideShare a Scribd company logo
1 of 22
Simulation of 1-d Stefan Problem using XFEM V. S. S. Srinivas
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Stefan problem T=T 0 0 °C Initial Temperature = 0°C h(t) Governing equations Initial and boundary conditions
Analytical solution Solve the transcendental equation, get  Transcendental equation:  Temperature profile:  Interface position:
Conventional method ,[object Object],[object Object],T=T 0 T=T 0 T=T 0 t=0 t=t 1 t=t 2 0<t 1 <t 2 T=0
XFEM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],T=T 0 T=T 0 T=T 0 t=0 t=t 1 t=t 2 0<t 1 <t 2
Enriched shape function Level set function in 1d: Interface position: x b ,  Element length: l e =1 X b =0.5 X b =0.3
Contd.. X b =0.5 X b =0.3
Implementation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Initial values determination-A case study ,[object Object],[object Object],[object Object],T=T 0 t=t 1 T=0 Interface conditions: 1. T=T m 2. Discontinuity in the gradient of temperature T 5 T 6 T 1 T 2 T 4 T 3 ,[object Object],[object Object],[object Object],Consider 2D case…
Contd.. ,[object Object],[object Object],[object Object]
Important features of XFEM ,[object Object],[object Object],[object Object],[object Object],[object Object]
A peep into the matrices  Governing equation after applying weighted residuals Discretized equation: Unsymmetric Symmetric
Validation:  Numerical against Analytical
Convergence check
T versus x at different times
Issues-1D ,[object Object],[object Object],[object Object],[object Object]
Challenges XFEM-2D ,[object Object],[object Object],[object Object]
Pros and Cons ,[object Object],[object Object],[object Object]
Discussion ,[object Object],[object Object],[object Object],[object Object]
Future directions ,[object Object],[object Object],[object Object],[object Object]
Thank you

More Related Content

What's hot

A brief introduction to finite difference method
A brief introduction to finite difference methodA brief introduction to finite difference method
A brief introduction to finite difference methodPrateek Jha
 
Numerical Analysis (Solution of Non-Linear Equations) part 2
Numerical Analysis (Solution of Non-Linear Equations) part 2Numerical Analysis (Solution of Non-Linear Equations) part 2
Numerical Analysis (Solution of Non-Linear Equations) part 2Asad Ali
 
Numerical differentiation integration
Numerical differentiation integrationNumerical differentiation integration
Numerical differentiation integrationTarun Gehlot
 
the fourier series
the fourier seriesthe fourier series
the fourier seriessafi al amu
 
Luận văn: Các công thức tích phân và ứng dụng trong lý thuyết hàm nguyên
Luận văn: Các công thức tích phân và ứng dụng trong lý thuyết hàm nguyênLuận văn: Các công thức tích phân và ứng dụng trong lý thuyết hàm nguyên
Luận văn: Các công thức tích phân và ứng dụng trong lý thuyết hàm nguyênViết thuê trọn gói ZALO 0934573149
 
Bộ sách về phương trình hàm
Bộ sách về phương trình hàmBộ sách về phương trình hàm
Bộ sách về phương trình hàmThế Giới Tinh Hoa
 
Phương pháp số và lập trình - Giải phương trình phi tuyến
Phương pháp số và lập trình - Giải phương trình phi tuyếnPhương pháp số và lập trình - Giải phương trình phi tuyến
Phương pháp số và lập trình - Giải phương trình phi tuyếnHajunior9x
 
Numerical Solution of Ordinary Differential Equations
Numerical Solution of Ordinary Differential EquationsNumerical Solution of Ordinary Differential Equations
Numerical Solution of Ordinary Differential EquationsMeenakshisundaram N
 
Partial Differential Equations, 3 simple examples
Partial Differential Equations, 3 simple examplesPartial Differential Equations, 3 simple examples
Partial Differential Equations, 3 simple examplesEnrique Valderrama
 
Tính toán khoa học - Chương 6: Bài toán giá trị ban đầu với phương trình vi p...
Tính toán khoa học - Chương 6: Bài toán giá trị ban đầu với phương trình vi p...Tính toán khoa học - Chương 6: Bài toán giá trị ban đầu với phương trình vi p...
Tính toán khoa học - Chương 6: Bài toán giá trị ban đầu với phương trình vi p...Chien Dang
 
Secent method
Secent methodSecent method
Secent methodritu1806
 
Newton raphson method
Newton raphson methodNewton raphson method
Newton raphson methodJayesh Ranjan
 
ventajas y desventajas de los metodos secante,biseccion, newton-raphson
ventajas y desventajas de los metodos secante,biseccion, newton-raphsonventajas y desventajas de los metodos secante,biseccion, newton-raphson
ventajas y desventajas de los metodos secante,biseccion, newton-raphsonFer Echavarria
 
kỹ thuật giải phương trình hàm
kỹ thuật giải phương trình hàmkỹ thuật giải phương trình hàm
kỹ thuật giải phương trình hàmljmonking
 

What's hot (20)

Luận văn: Tính chất nghiệm của phương trình vi phân tuyến tính
Luận văn: Tính chất nghiệm của phương trình vi phân tuyến tínhLuận văn: Tính chất nghiệm của phương trình vi phân tuyến tính
Luận văn: Tính chất nghiệm của phương trình vi phân tuyến tính
 
Luận văn: Ước lượng gradient cho phương trình khuếch tán phi tuyến
Luận văn: Ước lượng gradient cho phương trình khuếch tán phi tuyếnLuận văn: Ước lượng gradient cho phương trình khuếch tán phi tuyến
Luận văn: Ước lượng gradient cho phương trình khuếch tán phi tuyến
 
A brief introduction to finite difference method
A brief introduction to finite difference methodA brief introduction to finite difference method
A brief introduction to finite difference method
 
Numerical Analysis (Solution of Non-Linear Equations) part 2
Numerical Analysis (Solution of Non-Linear Equations) part 2Numerical Analysis (Solution of Non-Linear Equations) part 2
Numerical Analysis (Solution of Non-Linear Equations) part 2
 
Numerical differentiation integration
Numerical differentiation integrationNumerical differentiation integration
Numerical differentiation integration
 
the fourier series
the fourier seriesthe fourier series
the fourier series
 
Luận văn: Các công thức tích phân và ứng dụng trong lý thuyết hàm nguyên
Luận văn: Các công thức tích phân và ứng dụng trong lý thuyết hàm nguyênLuận văn: Các công thức tích phân và ứng dụng trong lý thuyết hàm nguyên
Luận văn: Các công thức tích phân và ứng dụng trong lý thuyết hàm nguyên
 
Bộ sách về phương trình hàm
Bộ sách về phương trình hàmBộ sách về phương trình hàm
Bộ sách về phương trình hàm
 
Phương pháp số và lập trình - Giải phương trình phi tuyến
Phương pháp số và lập trình - Giải phương trình phi tuyếnPhương pháp số và lập trình - Giải phương trình phi tuyến
Phương pháp số và lập trình - Giải phương trình phi tuyến
 
Numerical Solution of Ordinary Differential Equations
Numerical Solution of Ordinary Differential EquationsNumerical Solution of Ordinary Differential Equations
Numerical Solution of Ordinary Differential Equations
 
Chuong02
Chuong02Chuong02
Chuong02
 
The method of frobenius
The method of frobeniusThe method of frobenius
The method of frobenius
 
Partial Differential Equations, 3 simple examples
Partial Differential Equations, 3 simple examplesPartial Differential Equations, 3 simple examples
Partial Differential Equations, 3 simple examples
 
Tính toán khoa học - Chương 6: Bài toán giá trị ban đầu với phương trình vi p...
Tính toán khoa học - Chương 6: Bài toán giá trị ban đầu với phương trình vi p...Tính toán khoa học - Chương 6: Bài toán giá trị ban đầu với phương trình vi p...
Tính toán khoa học - Chương 6: Bài toán giá trị ban đầu với phương trình vi p...
 
Power series
Power series Power series
Power series
 
Secent method
Secent methodSecent method
Secent method
 
Newton raphson method
Newton raphson methodNewton raphson method
Newton raphson method
 
ventajas y desventajas de los metodos secante,biseccion, newton-raphson
ventajas y desventajas de los metodos secante,biseccion, newton-raphsonventajas y desventajas de los metodos secante,biseccion, newton-raphson
ventajas y desventajas de los metodos secante,biseccion, newton-raphson
 
kỹ thuật giải phương trình hàm
kỹ thuật giải phương trình hàmkỹ thuật giải phương trình hàm
kỹ thuật giải phương trình hàm
 
Chuong04
Chuong04Chuong04
Chuong04
 

Similar to xfem using 1D stefan problem

SURF 2012 Final Report(1)
SURF 2012 Final Report(1)SURF 2012 Final Report(1)
SURF 2012 Final Report(1)Eric Zhang
 
Graphical methods for 2 d heat transfer
Graphical methods for 2 d heat transfer Graphical methods for 2 d heat transfer
Graphical methods for 2 d heat transfer Arun Sarasan
 
Numerical methods for 2 d heat transfer
Numerical methods for 2 d heat transferNumerical methods for 2 d heat transfer
Numerical methods for 2 d heat transferArun Sarasan
 
Algorithm Design and Complexity - Course 3
Algorithm Design and Complexity - Course 3Algorithm Design and Complexity - Course 3
Algorithm Design and Complexity - Course 3Traian Rebedea
 
Sienna 4 divideandconquer
Sienna 4 divideandconquerSienna 4 divideandconquer
Sienna 4 divideandconquerchidabdu
 
lecture01.ppt
lecture01.pptlecture01.ppt
lecture01.pptwafahop
 
Ch 05 MATLAB Applications in Chemical Engineering_陳奇中教授教學投影片
Ch 05 MATLAB Applications in Chemical Engineering_陳奇中教授教學投影片Ch 05 MATLAB Applications in Chemical Engineering_陳奇中教授教學投影片
Ch 05 MATLAB Applications in Chemical Engineering_陳奇中教授教學投影片Chyi-Tsong Chen
 
from_data_to_differential_equations.ppt
from_data_to_differential_equations.pptfrom_data_to_differential_equations.ppt
from_data_to_differential_equations.pptashutoshvb1
 
FINITE DIFFERENCE using numerical method.ppt
FINITE DIFFERENCE using numerical method.pptFINITE DIFFERENCE using numerical method.ppt
FINITE DIFFERENCE using numerical method.ppt21bec114
 
FINITE DIFFERENCE.ppt slides for students
FINITE DIFFERENCE.ppt slides for studentsFINITE DIFFERENCE.ppt slides for students
FINITE DIFFERENCE.ppt slides for studentsMoneebMughal
 
Algorithm review
Algorithm reviewAlgorithm review
Algorithm reviewchidabdu
 

Similar to xfem using 1D stefan problem (20)

Linear regression
Linear regressionLinear regression
Linear regression
 
SURF 2012 Final Report(1)
SURF 2012 Final Report(1)SURF 2012 Final Report(1)
SURF 2012 Final Report(1)
 
Graphical methods for 2 d heat transfer
Graphical methods for 2 d heat transfer Graphical methods for 2 d heat transfer
Graphical methods for 2 d heat transfer
 
Intro to modelling_wur
Intro to modelling_wurIntro to modelling_wur
Intro to modelling_wur
 
Numerical methods for 2 d heat transfer
Numerical methods for 2 d heat transferNumerical methods for 2 d heat transfer
Numerical methods for 2 d heat transfer
 
Computer Network Assignment Help
Computer Network Assignment HelpComputer Network Assignment Help
Computer Network Assignment Help
 
Introduction to Finite Elements
Introduction to Finite ElementsIntroduction to Finite Elements
Introduction to Finite Elements
 
Algorithm Design and Complexity - Course 3
Algorithm Design and Complexity - Course 3Algorithm Design and Complexity - Course 3
Algorithm Design and Complexity - Course 3
 
Sienna 4 divideandconquer
Sienna 4 divideandconquerSienna 4 divideandconquer
Sienna 4 divideandconquer
 
lecture01.ppt
lecture01.pptlecture01.ppt
lecture01.ppt
 
Es272 ch5b
Es272 ch5bEs272 ch5b
Es272 ch5b
 
Ch 05 MATLAB Applications in Chemical Engineering_陳奇中教授教學投影片
Ch 05 MATLAB Applications in Chemical Engineering_陳奇中教授教學投影片Ch 05 MATLAB Applications in Chemical Engineering_陳奇中教授教學投影片
Ch 05 MATLAB Applications in Chemical Engineering_陳奇中教授教學投影片
 
from_data_to_differential_equations.ppt
from_data_to_differential_equations.pptfrom_data_to_differential_equations.ppt
from_data_to_differential_equations.ppt
 
numerical.ppt
numerical.pptnumerical.ppt
numerical.ppt
 
FINITE DIFFERENCE using numerical method.ppt
FINITE DIFFERENCE using numerical method.pptFINITE DIFFERENCE using numerical method.ppt
FINITE DIFFERENCE using numerical method.ppt
 
FINITE DIFFERENCE.ppt slides for students
FINITE DIFFERENCE.ppt slides for studentsFINITE DIFFERENCE.ppt slides for students
FINITE DIFFERENCE.ppt slides for students
 
Algorithm review
Algorithm reviewAlgorithm review
Algorithm review
 
Algo complexity
Algo complexityAlgo complexity
Algo complexity
 
algo_vc_lecture8.ppt
algo_vc_lecture8.pptalgo_vc_lecture8.ppt
algo_vc_lecture8.ppt
 
Data structures
Data structuresData structures
Data structures
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

xfem using 1D stefan problem