The elastic modulus and tensile strength of the poly (methyl methacrylate) from the stress strain data given in Figure 15.3 at room temperature

Answer to Problem 1QAP
The calculated elastic modulus of the poly (methyl methacrylate) is slightly greater than the maximum value of elastic modulus given in the Table 15.2 that is
The tensile strength (stress) found from the Figure 15.3 (
Explanation of Solution
Write the relation between elastic modulus, tensile strength and strain.
Here,
Conclusion:
Refer to Figure 15.3. “The influence of temperature on the stress strain characteristics of poly (methyl methacrylate)”.
The stress and strain corresponding to the temperature curve of
From Figure 1.
Let, the initial stress and strain corresponding to the temperature curve of
Let, the final stress and strain corresponding to the temperature curve of
Calculate the elastic modulus.
Substitute
Thus, the elastic modulus of poly (methyl methacrylate) is
Refer to Table 15.2, “Room-Temperature
The elastic modulus corresponding to poly (methyl methacrylate) is
Hence, the calculated elastic modulus of the poly (methyl methacrylate) is slightly greater than the maximum value of elastic modulus given in the Table 15.2 that is
From Figure 1.
The tensile strength (stress) at the end of the curve corresponding to the temperature curve of
Refer to Table 15.2, “Room-Temperature mechanical characteristics of some of the more common polymers”.
The tensile strength (stress) corresponding to poly (methyl methacrylate) is
Hence, the tensile strength (stress) found from the Figure 15.3 (
Want to see more full solutions like this?
Chapter 15 Solutions
MAT.SCIENCE+ENGIN.(PERUSALL ACCESS)
- 6.76 A wind turbine is operating in a 12 m/s wind that has a den- sity of 1.2 kg/m³. The diameter of the turbine silhouette is 4 m. The constant-pressure (atmospheric) streamline has a diameter of 3 m upstream of the windmill and 4.5 m downstream. Assume that the velocity distributions are uniform and the air is incom- pressible. Determine the force on the wind turbine. m P = Patm 4 Vz 4m 4 m Fx. Problem 6.76arrow_forwardDetermine the largest torque T that can be applied to each of the twoaluminium bars shown in Figure 5 below, and the corresponding angle of twistat B, knowing that allow = 50 MPa and G = 26 GPa. [10]Figure 5 : Aluminium Bars(Source: Mechanics of Materials Beer, Johnston, DeWolf & Mazurek 6Ed p204)arrow_forwardPlease draw logic circuitarrow_forward
- A 220-volt, 20-horsepower compound motor (long shunt, Figure 21–16A) has an armature resistance of 0.25 ohm, series field resistance of 0.19 ohm, and shunt field resistance of 33 ohms. a. Calculate the current taken by the motor at the instant of starting if it is con-nected directly to the 220-volt line. b. Calculate the current when the motor is running if the armature is developing 184 volts counter-emf.arrow_forwardFor the position shown in the figure the spring is unstretched. The spring constant k, is designed such that after the system is released from rest, the speed of the mass is zero just as the 0.6 slug mass touches the floor. Find the spring constant, k and the maximum speed of block A and the location (distance above floor) where this occurs.arrow_forwardInformation Security Risk and Vulnerability Assessment 1- Which TCP/IP protocol is used to convert the IP address to the Mac address? Explain 2-What popular switch feature allows you to create communication boundaries between systems connected to the switch3- what types of vulnerability directly related to the programmer of the software?4- Who ensures the entity implements appropriate security controls to protect an asset? Please do not use AI and add refrencearrow_forward
- Design a modulo-11 ripple (asynchronous) up-counter with negative edge-triggered T flip-flops and draw the corresponding logic circuit. (I)Build the state diagram and extract the state table (II)Draw the logic circuit (III)What is the maximum modulus of the counter?arrow_forwardInformation Security Risk and Vulnerability Assessment 1- Which TCP/IP protocol is used to convert the IP address to the Mac address? Explain 2-What popular switch feature allows you to create communication boundaries between systems connected to the switch3- what types of vulnerability directly related to the programmer of the software?4- Who ensures the entity implements appropriate security controls to protect an asset? Please do not use AI and add refrencearrow_forward1- Which TCP/IP protocol is used to convert the IP address to the Mac address? Explain 2-What popular switch feature allows you to create communication boundaries between systems connected to the switch3- what types of vulnerability directly related to the programmer of the software? 4- Who ensures the entity implements appropriate security controls to protect an asset? please do not use AI of any kind. please refrencearrow_forward
- the diagram show 4 motor connected to a k-35 controller. I would like detail explanation to know how the circuit work. Is the controller compatible with the motor? The motor shown is series, parallel or both?arrow_forwardplease draw logic diagram pleasearrow_forwardPlease draw the diagrams please thank youarrow_forward
- MATLAB: An Introduction with ApplicationsEngineeringISBN:9781119256830Author:Amos GilatPublisher:John Wiley & Sons IncEssentials Of Materials Science And EngineeringEngineeringISBN:9781337385497Author:WRIGHT, Wendelin J.Publisher:Cengage,Industrial Motor ControlEngineeringISBN:9781133691808Author:Stephen HermanPublisher:Cengage Learning
- Basics Of Engineering EconomyEngineeringISBN:9780073376356Author:Leland Blank, Anthony TarquinPublisher:MCGRAW-HILL HIGHER EDUCATIONStructural Steel Design (6th Edition)EngineeringISBN:9780134589657Author:Jack C. McCormac, Stephen F. CsernakPublisher:PEARSONFundamentals of Materials Science and Engineering...EngineeringISBN:9781119175483Author:William D. Callister Jr., David G. RethwischPublisher:WILEY





