Modeling and Thermal Conduction and Static Analysis of an IC Engine Piston using CATIA V5 Tool and ANSYS
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 12
Abstract
In now a days technology, diesel engine plays an important role in the transportation sector, agriculture pumping sets etc, where large amount of diesel consumed. But according to the ministry of petroleum, the petroleum fuels will last in few years. So, one must concentrate much on the diesel engine modifications so that the amount of fuel consumption and the environmental pollutions can be reduced. The temperature distribution in the piston is a crucial parameter which influences the thermal stress and deformations in the piston materials. So in the present work I tried thermal conductivity and static analysis on cast iron, aluminium and brass materials based pistons.
Authors and Affiliations
Sangeetham Sivakumar| Scholar of Master of Technology, Asst Professor, Assoc Professor Dept of Mechanical Engineering, Prasiddha College of Engg & Tech, Anathavaram, siva.s5246@gmail.com, Guru Murthy N| Scholar of Master of Technology, Asst Professor, Assoc Professor Dept of Mechanical Engineering, Prasiddha College of Engg & Tech, Anathavaram, murthy408@gmail.com, P. Satish Reddy | Scholar of Master of Technology, Asst Professor, Assoc Professor Dept of Mechanical Engineering, Prasiddha College of Engg & Tech, Anathavaram, satish2436@gmail.com
Distributed File System Supporting Parallel Access To Multiple Storage Devices
Our audit of the current Kerberos-based protocol demonstrates that it has various impediments: (i) a metadata server encouraging key trade between the customers and the storage devices has substantial workload that l...
A new Security approach for integrating wireless adhoc network using octant bit computation and routing test
Ad hoc networks are a kind of network that has no centralized body and in order to communicate with the nodes it has no fixed topology.In this paper we propose to use binary masking of octant bits and shared cryptogr...
A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based
the present a scheme that permits a more fine-grained trade-off. The intuition is that outsourced data may require different levels of the protection, depending on how to popular it is: content shared by many users,...
AODV with DSR Protocol Heirarchy For Packet Dropped Forgery Attacks
Far reaching scale sensor frameworks are sent in different application spaces, and the data they accumulate are used as a piece of essential initiative for fundamental structures. Data are spilled from different sour...
A Novel Three-Port Converters For Solar Power System
The conventional three-port power converters with bridge rectifiers are inefficient and may not be practical for the low-voltage micro generators. This paper presents an efficient ac-to-dc power converter that avoids...