subject

The secret company project has been unveiled: a series of x springs which follow polynomial laws of force–displacement. as several constants are necessary to characterize these springs, you have been asked to evaluate the experimental data and provide the necessary calculations.

the x spring displacement is described by a polynomial extension of hooke's law,

f = -k x - q x^2 - r x^3

where k, q,r are the new x spring constants (note the order of coefficients and the again, the spring constants may be determined from the experimental data as the coefficients of the polynomial best fitting the displacement and force data. (keep the signs and order of coefficients and powers in mind! )

the data are recorded in the format [ m x ]; that is, the mass in the first column and the displacement observed in the second. units are unspecified in the experimental record.

quadratic x spring

10 2.152
20 8.880
40 38.53
80 137.7
160 528.3
320 2078.
640 8255.

cubic x spring

80 16.63
160 108.7
320 778.7
640 5989.

compose a function `fit_x_spring` which accepts an array of data in this format and returns the corresponding spring constants k, q,r. it should work the same for all orders of the polynomial behavior of the hyperelastic x spring.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 02:30
The cm is responsible for overseeing the actions of the crisis management team and coordinating all crisis management efforts in cooperation with disaster recovery and/or business continuity planning, on an as-needed basis
Answers: 1
question
Computers and Technology, 22.06.2019 14:40
You are working with a professional edition organization. they wish to install the expense tracker which requires the use of 4 custom tabs, 3 custom objects, and one custom app. if the company is already using 4 applications, 36 custom objects, and 7 custom tabs, what will happen when they try to install expense tracker?
Answers: 1
question
Computers and Technology, 22.06.2019 14:40
You begin your first day of responsibilities by examining the recent is security breach at gearup to get ideas for safeguards you will take. at gearup, criminals accessed the company's improperly-secured wireless system and stole customers' credit card information as well as employee social security numbers. what kind of computer crime did gearup face?
Answers: 3
question
Computers and Technology, 22.06.2019 16:20
Octothorpe is another name for what common computer keyboard symbol?
Answers: 1
You know the right answer?
The secret company project has been unveiled: a series of x springs which follow polynomial laws of...
Questions
question
Mathematics, 09.03.2021 20:00
question
Mathematics, 09.03.2021 20:00
question
Business, 09.03.2021 20:00
Questions on the website: 13722360