Modelling Of Gas Turbine Rotor Blade with Internal Cooling Passages
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
Gas turbines are extensively used for land-based power generation, aircraft propulsion and industrial applications. The turbine blade temperature plays a critical role in developing the thermal efficiency and power output and lifetime of gas turbines. The rotor inlet temperature should be below the melting point of the turbine blade material. So the gas turbine blade needs “cooling technologies” to overcome the problem. This paper deals with the modelling and analysis of gas turbine rotor blade with internal cooling passages. The blade coordinate data is imported through the GSD_ExcelSplineLOft excel sheet to the CATIAV5 and modelled. FEA analysis and meshing both are done by using ANSYS. Internal cooling passages provided on blade tip, which passes through the axial length of the turbine blade. The coolant flows through these cooling passages to reduce the temperature distribution on the blade surface. Structural and thermal analyses have to be done to find out the temperature distribution over the surface of the turbine blade after applying coolant.
Authors and Affiliations
Ganesh Cheemanapalle, S Praveen Kumar, Sreenivasulu Bezawada
An improved micropartitioning mechanism for map reduce using evaluation of cost functions
Due to the massive improvement in the usage of data’s in the real world, it becomes more burdens to handle and process it effectively. The Map reduce is the one of the more developed technology which is used to handle a...
Safety Belt Operated Pneumatic Handbrake
In this Paper we studied that in a ground vehicle, mechanical parking brake (Hand brake) unit is a mechanism that used to hold the vehicle motionless either on the even or gradient road. It consists of a directly linked...
Clustering For Research Based Projects Using Ontological Text Mining
This paper describes the software infrastructure (or product) which provides an overall description of research project being selection for government and private research funding agencies is an important task. When a l...
A Review on Novel SAT KAMAN protocol to prevent DOS attacks in MANET
The Kerberos assisted authentication protocol is the efficient protocol that have been used for this identity validation. Kaman is the extension of Kerberos protocol with the use of Kaman nodes in the ad hoc network are...
Comparative Study of Slosh Suppression Devices and Techniques for Liquid and Hybrid Rocket Propellant Tanks
The present study reviews and discusses about the undesirable phenomenon of propellant sloshing in propellant tanks of liquid and hybrid rocket engines. The occurrence of unexpected sloshing in propellant tanks usually...