Comparision of Thermal Analysis in Mobile Phone Using Ansys

2014 ◽  
Vol 592-594 ◽  
pp. 1875-1880
Author(s):  
B. Jayachandraiah

“Necessity is the Mother of Invention”-one of the most Important and Interesting Man Made Inventions is Mobile Phone. there is a Rapid Increase in the Number of Users of Mobile Phone in the Last Decade. Today, it's Hard to Find a Cell Phone that Doesn't Offer some Sort of "smart" Technology because it's in such a High Demand. the Use of Mobile Phone has Become an Integral Part of Human Lives. in this Paper, an Attempt is Made to Study the Optimization of 3-Dimensional Heat Transfer Phenomena in Mobile Phone Using ANSYS for Three Different Models and Different Companies such as HTC Desire C, Nokia Lumia 900 and Sony Xperia Tipo. the Actual Dimensions and Materials are Chosen for above Models. the Three Models are Modelled in Pro/E, then Meshed by 3D-10 Nodded Tetrahedral Thermal Solid Elements (SOLID87) and Analysed in ANSYS Software, by Applying Boundary Conditions. the Analysis is Carried-out to Find the Nodal Temperatures, Directional Thermal Fluxes. it is Found that the Optimum Heat Transfer Occurs at HTC Desire C and Validated with the References.

Author(s):  
Maulik Desai ◽  
Swati Jaiswal

Mobile devices have upgraded from normal java-based phones whose basic functionality was calling, messaging, and storing contact information to a more adaptive operating system like Symbian, iOS, and Android, which have smart features like e-mail, audio player, camera, etc. Gradually, everyone started relying more and more on these mobile devices. This led to an increase in the number of cell phone hackers. Common ways that a hacker gets access to your phone is via phishing, shoulder surfing, piggybacking, etc. There are countermeasures to this like bookmarking your most visited sites, using VPN, using encryption algorithms. Data theft and identity theft are a new concern for today's user; this chapter is to educate the end user of different ways in which their privacy can be invaded via a mobile phone. This chapter will help the researchers to know the mindset of a cell phone hacker and what are the potential damages that can be caused by them and strategies to prevent them.


Author(s):  
Ricardo Marquez ◽  
Michael Modest

This work presents an OpenFOAM implementation of the PN approximation for radiative heat transfer, including higher orders P3, P5, and P7. Also described is a procedure which enables the sequential numerical computations of the coupled partial differential equations (PDEs) by re-expressing the boundary conditions in matrix form so that individual boundary conditions can be associated with each PDE. The implementation of the software programs are verified with derived analytical solutions for 1-D slabs with constant and variable properties, and are also tested with various orientations in order to demonstrate the geometric invariance properties of the 3-dimensional PN formulation. A few examples taken from the literature are also considered in this work and could be taken as benchmark solutions for the PN approximations.


Author(s):  
Priti Y. Umratkar ◽  
Harshali Chalfe ◽  
S. K. Totade

The continuously use of mobile phone can be attributed to it can use in any places and thus have become one of the most widely used devices in mobile communication which makes it so important in our lives. The convenience and portability of cellphones has made it possible to be carried everywhere. e.g Churches, lecture halls, medical centers etc. Its benefit can create disturbance in some places when there is continuous beeping or ringtones of cell phones which becomes annoying when such noise is disturbance in areas where silence is required or the use or of mobile phone is restricted or prohibited like Libraries and Study rooms A mobile phone jammer is an instrument used to prevent cellular phones from receiving signals from base station. It is a device that transmit signal on the same frequency at which the GSM system operates, the jamming success when the mobile phones in the area where the jammer is located are disabled. The mobile phone jammer unit is intended for blocking all mobile phone types within designated indoor areas. The mobile Phone Jammer is a 'plug and play' unit, its installation is quick and its operation is easy. Once the mobile Phone Jammer is operating, all mobile phones present within the jamming coverage area are blocked, and cellular activity in the immediate surroundings (including incoming and outgoing calls, SMS, pictures sending, etc.) is jammer. This paper focuses on the design of a cell phone jammer to prevent the usage of mobile communication in restricted areas without interfering with the communication channels outside its range.


Author(s):  
Fateme Arbabi Kalati ◽  
Tahereh Nosratzehi

Abstract Mobile phones have been increasingly used in the past decade and have become a cultural instrument. There is a great concern over the harmful effects of electromagnetic and radiofrequency waves as well as microwaves generated by mobile phones and their telecommunication stations on health. The saliva plays an important role in preserving oral homeostasis as the first defensive line against the microbial invasion which protects oral mucosa mechanically and immunologically. A search was run in Pub med, Goggle Scholar, Medline, and Web of Science databases using the following keywords: cell phone, mobile phone, antioxidant profile, saliva, oxidative stress, interleukin, and inflammation. Sixty-five published articles were identified. Studies on the use of cell phones as educational aids, the use of immune histochemistry on salivary glands, or the evaluation of saliva in individuals with specific conditions, such as the use of orthodontic brackets, were excluded. In addition, duplicate articles are eliminated, and finally, 14 articles were included in the present study. Nowadays mobile phone is very popular, causing concern about the effect it has on people’s health. Parotid salivary glands are in close contact with a cell phone while talking with the phone and the possibility of being affected by them; so this study was designed to investigate the effect of cell phone use on salivary components.


Author(s):  
Vincenzo Fico ◽  
Michael J. Pekris ◽  
Christopher J. Barnes ◽  
Rakesh Kumar Jha ◽  
David Gillespie

Aero-engine gas turbine performance and efficiency can be improved through the application of compliant shaft seal types to certain sealing locations within the secondary air system. Leaf seals offer better performance than traditional labyrinth seals, giving lower leakage flows at design duties. However, for aeroengine applications, seal designs must be able to cope with relatively large off-design seal closures and closure uncertainties. The two-way coupling between temperatures of seal components and seal closures, through the frictional heat generated at the leaf-rotor interface when in contact, represents an important challenge for leaf seal analysis and design. This coupling can lead to leaf wear and loss, rotor overheating, and possibly to unstable sealing system behaviour (thermal runaway). In this paper we use CFD, FE thermal analysis, and experimental data to characterise the thermal behaviour of leaf seals. This sets the basis for a study of the coupled thermo-mechanical behaviour. CFD is used to understand the fluid-mechanics of a leaf pack. The leaf seal tested at the Oxford Osney Laboratory is used for the study. Simulations for four seal axial Reynolds number are conducted; for each value of the Reynolds number, leaf tip-rotor contact and clearance are considered. Distribution of mass flow within the leaf pack, distribution of heat transfer coefficient at the leaf surface, and swirl velocity pick-up across the pack predicted using CFD are discussed. The experimental data obtained from the Oxford rig is used to develop a set of thermal boundary conditions for the leaf pack. An FE thermal model of the rig is devised, informed by the aforementioned CFD study. Four experiments are simulated; thermal boundary conditions are calibrated to match predicted metal temperatures to those measured on the rig. A sensitivity analysis of the rotor temperature predictions to the heat transfer assumptions is carried out. The calibrated set of thermal boundary conditions is shown to accurately predict the measured rotor temperatures.


2017 ◽  
Vol 139 (7) ◽  
Author(s):  
Vincenzo Fico ◽  
Michael J. Pekris ◽  
Christopher J. Barnes ◽  
Rakesh Kumar Jha ◽  
David Gillespie

Aero-engine gas turbine performance and efficiency can be improved through the application of compliant shaft seal types to certain sealing locations within the secondary air system. Leaf seals offer better performance than traditional labyrinth seals, giving lower leakage flows at design duties. However, for aero-engine applications, seal designs must be able to cope with relatively large off-design seal closures and closure uncertainties. The two-way coupling between temperatures of seal components and seal closures, through the frictional heat generated at the leaf–rotor interface when in contact, represents an important challenge for leaf seal analysis and design. This coupling can lead to leaf wear and loss, rotor overheating, and possibly to unstable sealing system behavior (thermal runaway). In this paper, we use computational fluid dynamics (CFD), finite element (FE) thermal analysis, and experimental data to characterize the thermal behavior of leaf seals. This sets the basis for a study of the coupled thermomechanical behavior. CFD is used to understand the fluid-mechanics of a leaf pack. The leaf seal tested at the Oxford Osney Laboratory is used for the study. Simulations for four seal axial Reynolds number are conducted; for each value of the Reynolds number, leaf tip-rotor contact, and clearance are considered. Distribution of mass flow within the leaf pack, distribution of heat transfer coefficient (HTC) at the leaf surface, and swirl velocity pick-up across the pack predicted using CFD are discussed. The experimental data obtained from the Oxford rig is used to develop a set of thermal boundary conditions for the leaf pack. An FE thermal model of the rig is devised, informed by the aforementioned CFD study. Four experiments are simulated; thermal boundary conditions are calibrated to match the predicted metal temperatures to those measured on the rig. A sensitivity analysis of the rotor temperature predictions to the heat transfer assumptions is carried out. The calibrated set of thermal boundary conditions is shown to accurately predict the measured rotor temperatures.


Author(s):  
Muhammad Rustam

Cell phone or mobile phone is an electronic communications device that has same function with fixed-line telephone. This mobile phone can be taken anywhere and doesn’t need to be connected to the telephone network using a cable (wireless LAN). This study aims to describe the use of mobile phone, the average of expanse, and the use of mobile phone base on the division of the village. This survey was conducted face to face interviews with respondents using questionnaire. The selection of respondent in the household uses Kish Grid. Respondent who use mobile phone in the last three months are 39 people (81,3%). Respondent who is reported having a cell phone are 26 people (54,2%) with the detail users for smart phone are 16 people (61,5%) while non-smart phone users are 10 people (38,5%). The highest use of mobile phone in the last three months is in Ohotahit village, they are 15 people (93,8%) while the testimony of respondent who own mobile phone in Tamedan are 10 people (62,5%). Mean for the average expanse every month is Rp34.231,00. People hope that there will be a good, cheap, and affordable for network mobile phone or telephone installation and internet networks prepared as ICT infrastructure. Keywords: Use, Mobile phones, Fishermen Community     ABSTRAK Telepon genggam atau handphone (HP) merupakan perangkat telekomunikasi elektronik yang mempunyai kemampuan dasar yang sama dengan telepon konvensional saluran tetap.Mobile phone ini dapat dibawa ke mana-mana (portabel mobile) dan tidak perlu disambungkan dengan jaringan telepon menggunakan kabel (nirkabel, wireless). Penelitian ini bertujuan untuk mengetahui gambaran penggunaan telepon genggam, rata-rata pengeluaran, dan penggunaan telepon genggam berdasarkan pembagian desa. Survei ini dilakukan dengan melakukan wawancara tatap muka dengan responden menggunakan daftar pertanyaan (kuesioner). Pemilihan responden dalam rumah tangga menggunakan Kish Grid. Responden yang menggunakan telepon genggam dalam tiga bulan terakhir sebanyak 39 orang (81,3%). Responden yang menyatakan memiliki telepon genggam sebanyak 26 orang (54,2%) dengan rincian pengguna telepon genggam smartphone sebanyak 16 orang (61,5%), sedangkan pengguna telepon genggam nonsmartphone sebanyak 10 orang (38,5%). Penggunaan telepon genggam tertinggi dalam tiga bulan terakhir tertingi di Desa Ohotahit sebanyak 15 orang (93,8%), sedangkan pengakuan responden terkait kepemilikan telepon genggam tertinggi di Desa Tamedan sebanyak 10 orang (62,5%). Mean untuk rata-rata pengeluaran komunikasi setiap bulan yang dikeluarkan oleh responden Rp34.231,00. Masyarakat berharap agar ada pemasangan jaringan Telepon/HP dan Jaringan Internet yang baik, murah dan terjangkau disiapkan seperti sarana dan prasarana TIK. Kata Kunci : Penggunaan, Telepon genggam, Masyarakat Nelayan


A Thermal protection system is used to protect the rocket from the heat generated by the hot gases. A thermal boot is used as the thermal protection system at the outside of the nozzle to protect the flex seal. The objective of the present work is to design the thermal protection system for flex seal using different composite materials for single time of flight and to study the ablation of the materials. The problem is modelled using commercial ANSYS software. 3-D Axi-symmetric transient thermal analysis is performed for the flex seal along with thermal protection system made of composite materials. The initial and boundary conditions are applied to meet the industrial requirement. From this analysis, thermal protection system made of different composite materials is studied and one is suggested based on ablation and weight reduction.


2015 ◽  
Vol 17 (4) ◽  
Author(s):  
Enny Enny

Enny, in this paper explain that many mobile phone users around the us, but only a portion of the concerned about the dangers of cell phones. This paper was compiled to determine the impact and solutions of cell phone radiation. Mobile phones emit electromagnetic waves which will affect the surrounding environment. Based on existing information, cell phone radiation is thought to cause cancer. Waves emitted from mobile phones over the air is causing electromagnetic radiation. Potential disrubtion of health consequences of radiation electromagnetic field has become an issue which examined till now, so found a variety of health disorders as a result of mobile phone users that includes the impact of mild and severe impact. Experts have discovered some efforts to minimize the effects of cell phone radiation on health of mobile phone users. Every user should know the dangers of mobile phone users. Radiation caused cell phone not only arise when used, but when putting a cell phone in your Pocket can also be exposed to any radiation. Therefore, mobile users need to know how to use a cell phone. Users should pay attention to the level of radiation caused by cell phones, so that the influence of electromagnetic radiation on health can be scaled down for mobile users. Keywords: side effects of cell phone use


Author(s):  
Maulik Desai ◽  
Swati Jaiswal

Mobile devices have upgraded from normal java-based phones whose basic functionality was calling, messaging, and storing contact information to a more adaptive operating system like Symbian, iOS, and Android, which have smart features like e-mail, audio player, camera, etc. Gradually, everyone started relying more and more on these mobile devices. This led to an increase in the number of cell phone hackers. Common ways that a hacker gets access to your phone is via phishing, shoulder surfing, piggybacking, etc. There are countermeasures to this like bookmarking your most visited sites, using VPN, using encryption algorithms. Data theft and identity theft are a new concern for today's user; this chapter is to educate the end user of different ways in which their privacy can be invaded via a mobile phone. This chapter will help the researchers to know the mindset of a cell phone hacker and what are the potential damages that can be caused by them and strategies to prevent them.


Sign in / Sign up

Export Citation Format

Share Document