Determination of Heat Transfer Cooling Rates in an Mixing Vessel Using Kanthal Heating Element
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2012, Vol 3, Issue 2
Abstract
Experimental Overall heat transfer rates have been evaluated using heat balance energy equations for each experimental flow rates from cooling data observations in a mixing vessel using helical coil centrally submerged in the vessel . Using modified Wilson Plot method ,the individual heat transfer coefficients have been calculated for four different Sodium Carboxymethal Cellulose test solutions with two different lengths of helical coil pipe L=2.82m and L=2.362m respectively. .A kanthal heating element equipment was design for conducting experiments
Authors and Affiliations
*Ashok Reddy K 2 Bhagvanth Rao M 3 Ram Reddy P
Improved Transformerless Inverter for PV Grid Connected Power System by using ISPWM Technique
This paper presents an improved transformerless inverter with common mode leakage current elimination for a photovoltaic grid connected power system by using inverse sine carrier pulse width modulation (ISPWM). To...
A Survey Based on Region Based Segmentation
Image segmentation is one of the most significant steps leading to the study the processed image data. This paper delivers a survey of achievements, complications being encountered, and the open issues in the investigati...
Zigbee Based Wireless Air Pollution Monitoring System Using Low Cost and Energy Efficient Sensors
Air pollution is a major environmental health problem affecting the developing and the developed countries alike. The effects of air pollution on health are very complex as there are many different sources and their indi...
Wireless Communication Systems For Underground Mines – A Critical Appraisal
This paper presents an overview of wireless communication systems for underground mines including voice and data commmunication. Development of Wired , semi – wireless and wireless communication syetms ar...
Multipair Public Key Cryptosystem
Cryptography mainly deals with security provided to the data access the network. Asymmetric key cryptography, also called as Public Key cryptography, uses two different keys (which forms a key pair),one key is used for e...