scispace - formally typeset
Search or ask a question
Journal Article

Thermal analysis of gas turbine rotor blade using finite element analysis

TL;DR: In this paper, the first stage rotor leaf sword of a two-stage gas turbine has been analyzed for steady state thermal using ANSYS 16.2, and the analysis of different diam of hole also investigated.
Abstract: In the mechanical design constituent, numerical simulations method is mostly used for design instauration (or modification) and design optimisation. In the nowadays aim of work the first stage rotor leaf sword of a two-stage gas turbine has been analyzed for steady state thermal using ANSYS 16.2 an attempt has been investigated the effect of temperature on the turbine blade. A steady state thermal analysis has been carried out to investigate the focal point of the temperature flow rate which is been develops due to the thermal loading. An attempt is also made to suggest the best material for a turbine blade by comparing the results obtained for three different stuff such as Copper, Titanium and Nickel that has been considered for the analysis. The blade is modelled with SolidWorks 2015. The geometric model of the blade profile is generated with mathematically and extruded to get a solid model. In this work after finding the suitable materials, the analysis of different diam of hole also investigated. For different hole diameter, it has been pointed out that if the diameter of the hole is increased gradually with the constant number of holes, then the maximum temperature value and the total heat flux distribution decreases, then it grows again. Therefore, this present work the suitable diameter of hole also has been suggested for better performance in future.

Content maybe subject to copyright    Report

Citations
More filters
01 Jan 2016
TL;DR: Optimized and hybrid based robust digital video watermarking scheme has been proposed and the optimization is performed in the proposed system with the help of genetic algorithm.
Abstract: Now a day's large amount of digital information such as video, audio or image is spread over the internet. So it should be a great challenge for all researchers to provide security to such a type of digital data. Also the piracy and copyright is emerging issue when digital information in the form of video, audio & image is transmitted over the transmission media. So to prevent the problem of piracy and security of digital data such as video, video watermarking techniques has been introduced. There are various watermarking schemes to give the security to videos but they were unable to provide the quality in terms of robustness and security. In this paper optimized and hybrid based robust digital video watermarking scheme has been proposed. The optimization is performed in the proposed system with the help of genetic algorithm. The quality of the proposed watermarking scheme is measured in terms of PSNR and NC values. The PSNR calculated using our approach is off 50.48 db which is far better than existing approaches.

6 citations

Proceedings ArticleDOI
01 Oct 2016
TL;DR: The aim is to propose a system based on encryption of compressed video bit streams and hiding privacy information to protect videos during transmission using H.264/AVC, and the methods used provide better performance interms of computation efficiency, high data security and video quality after decryption.
Abstract: The aim is to propose a system based on encryption of compressed video bit streams and hiding privacy information to protect videos during transmission using H.264/AVC. To maintain security and privacy video needs to be stored and processed in an encrypted format. Here, data hiding is done directly in the encrypted version of H.264/AVC which includes the following three parts i.e, H.264/AVC video encryption, data embedding and data extraction. choas encryption is used to encrypt/decrypt the secret data before/after data embedding/extraction. The simulated results shows that the methods used provide better performance interms of computation efficiency, high data security and video quality after decryption. The parameters such as mean square error, peak signal to noise ratio, correlation and structure similarity index are evaluated to measure its efficiency.

2 citations

References
More filters
Journal ArticleDOI
TL;DR: The steps in a data mining project include: integrating and cleaning or modifying the data sources, mining the data, examining and pruning the mining results, and reporting the final results.
Abstract: Data mining is such a hot topic that it has become an obscured buzzword. Data mining can be a powerful tool for extracting useful information from tons of data. But it can just as easily extract erroneous and useless information if it's not used correctly. Key to avoiding the pitfalls is a basic understanding of what data mining is and what things to consider in planning a data mining project. The steps in a data mining project include: integrating and cleaning or modifying the data sources, mining the data, examining and pruning the mining results, and reporting the final results.

89 citations

Journal ArticleDOI
TL;DR: A steganalytic approach against motion vector-based video steganography that does not depend on the detailed knowledge of embedding algorithms, which indicates that the proposed approach is suitable to be used in situations where a very limited priori knowledge is available.
Abstract: This paper presents a steganalytic approach against motion vector-based video steganography that does not depend on the detailed knowledge of embedding algorithms. In most state-of-the-art video coding standards, the motion vector is the result of block-based motion estimation using rate-distortion optimization. That is to say, each motion vector is locally optimal in a rate-distortion sense, and any modification will inevitably shift the motion vector from locally optimal to non-optimal. As a consequence, it is a very strong evidence of steganography if some motion vectors are found to be locally non-optimal. Based on this fact, the core of our method is an estimator to check the local optimality of motion vectors in a rate-distortion sense. We try to recover the necessary information used for motion vector decision that is lost during lossy compression, based on which a 36-D feature set is formed for training and classification. To demonstrate the effectiveness of the proposed approach, experiments are carried out in different settings. The corresponding results show that our approach has a wide applicability even at low embedding strengths. Particularly, the problem of cover source mismatch is largely alleviated, which indicates that the proposed approach is suitable to be used in situations where a very limited priori knowledge is available.

46 citations

Journal ArticleDOI
TL;DR: In this article, the authors analyzed six different models with different number of axial holes (7, 8, 9, 10, 11, and 12) to find out the optimum number of holes for good performance.
Abstract: Gas turbine is an important functional part of many applications. Cooling of blades has been a major concern since they are in a high temperature environment. Various techniques have been proposed for the cooling of blades and one such technique is to have axial holes along the blade span. Finite element analysis is used to analyze thermal and structural performance due to the loading condition, with material properties of Titanium- Aluminum Alloy. Six different models with different number of holes (7, 8, 9, 10, 11, and 12) were analyzed in this paper to find out the optimum number of holes for good performance. In Finite element analysis, first thermal analysis followed by structural analysis is carried out. Graphs are plotted for temperature distribution for existing design (12 holes) and for 8 holes against time. 2D and 3D model of the blade with cooling passages are shown. Using ANSYS, bending stress, deflection, temperature distribution for number of holes are analyzed. It is found that when the numbers of holes are increased in the blade, the temperature distribution falls down. For the blade configuration with 8 holes, the temperature near to the required value i.e., 800oC is obtained. Thus a turbine blade with 8 holes configuration is found to be the optimum solution. Keywords : Gas turbine blade; Stress; Deflection; Temperature distribution. DOI: http://dx.doi.org/10.3126/sw.v9i9.5514 SW 2011; 9(9): 29-33

29 citations

Proceedings ArticleDOI
01 Feb 2017
TL;DR: The aim of this work is to design an algorithm for text security as well as improve MSE and PSNR value and the data hiding capacity is also considered.
Abstract: Information security is the major concern now a day since number of internet users is increasing and secret information is getting shared every second. This has also hiked the cyber crime and threat of malicious access. The two main techniques that are used for information security are steganography and cryptography. Cryptography is basically secret writing; on the other hand Steganography is data hiding. In this paper, a hybrid technique is introduced by combining the cryptography and Steganography properties. Also for data encryption vary the block size in place of fixed block. The proposed image steganography algorithm works on spatial domain. LSB method is used for data hiding in different ways. The aim of this work is to design an algorithm for text security as well as improve MSE and PSNR value. The data hiding capacity is also considered. The technique has been designed and simulated in MATLAB 2013a using different format images. Also Qualitative and Quantitative analysis is done and compared with the existing results.

29 citations

Proceedings ArticleDOI
Jithu Vimal1, Ann Mary Alex1
10 Jul 2014
TL;DR: Dual Randomness LS B method is proposed which hides the secret message in randomlyselected samples and in randomly selected bit which provides more confidentiality compared to conventional LSB method.
Abstract: In the current internet scenario, secure data transmission is limited due to its attack made on data communication. So more robust methods are required to ensure secure data transmission. One solution to the above problem is Steganography. Audio steganography is concerned with hiding information in a cover (host) audio signal in an imperceptible way. Least Significant Bit (LSB) technique is the most simple and efficient technique used for audio steganography. But conventional LS B technique is easy to defeat. In this paper Dual Randomness LS B method is proposed which hides the secret message in randomly selected samples and in randomly selected bit. This method provides more confidentiality compared to conventional LSB method.

27 citations