COMSOL Help: 3D Electromagnetics Wave Propagation

  • Thread starter Thread starter rr00053
  • Start date Start date
  • Tags Tags
    Comsol
AI Thread Summary
The discussion centers on modeling wave propagation through different materials using COMSOL's 3D electromagnetics application mode. The original poster seeks guidance on simulating wave intensity attenuation in materials like silicon and nickel, specifically regarding boundary conditions and frequency settings. Participants provide helpful resources, including an attachment for boundary condition settings and a reference to Yang's paper for detailed model settings. The original poster expresses gratitude for the assistance received and encourages sharing finished work to benefit others in the community.
rr00053
Messages
37
Reaction score
0
COMSOL help- very URGENT

Hi there...
Can anyone help me to model the wave propogation through a block of material using the 3D electromagnetics application mode in comsol? I want to simulate the attunation in the intensity of wave when it travels through different materials like Si, Ni, etc...I would like to know about the boundry conditions we use and how we fix the frequency of the wave...
someone please do help me soon...
thankyou...
 
Technology news on Phys.org


Hello,

I think the attachment can help you a lot espeically for BC setting.

Cheers,

David
 

Attachments



Hi Davidleee...
thanku very much for the data...it helped me to get some useful information about the input and output conditions...i am looking out for the boundary conditions as well...anyway thanks for providing me this key data...it helped me to get started...
thankyou
 


Hello,

You can also check Yang's paper for detailed model setting.
Hope this can help as well.

David
 

Attachments



Dear David,
The following paper and presentation has helped me a lot...I thankyou very much fr the data you had given me..
 


Please post your finished work so that others can learn from it. Thanks. :)
 
Thread 'Is this public key encryption?'
I've tried to intuit public key encryption but never quite managed. But this seems to wrap it up in a bow. This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher. Is this how PKE works? No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
I tried a web search "the loss of programming ", and found an article saying that all aspects of writing, developing, and testing software programs will one day all be handled through artificial intelligence. One must wonder then, who is responsible. WHO is responsible for any problems, bugs, deficiencies, or whatever malfunctions which the programs make their users endure? Things may work wrong however the "wrong" happens. AI needs to fix the problems for the users. Any way to...
Back
Top