• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Investigate the elastic behaviour in a spring placed under a positive load (tension) and to calculate it's Spring Response.

Extracts from this document...

Introduction

ELASTIC BEHAVIOUR IN SPRINGS (2) Aim: To investigate the elastic behaviour in a spring placed under a positive load (tension) and to calculate it's Spring Response. Apparatus: Tension spring Micrometer screw gauge Lloyd's Tensile machine Method: A Tension spring was taken and a micrometer screw gauge was used to measure the wire diameter and the coil diameter. These readings were recorded and the number of coils in the spring was also noted. ...read more.

Middle

The extension was then reduced in 5mm stages back down to 0. At each interval the load values were recorded. The findings were tabulated and a graph was plotted for load vs extension. Results: Number of coils = 18 Wire diameter = 0.0034 m Coil diameter = 0.044 m Table 1 Extension Spring results LOADING UNLOADING Load /N Extension /mm Load /N Extension /mm 0 0 0 0 4.8 5.096 5.4 5.956 9 ...read more.

Conclusion

D3 Where S = Spring Response G = Modules of Rigidity = 79.3 Gpa d = Wire Diameter D = Coil Diameter n = Number of Coils (79.3 X109 X 0.00344) S = ---------------- = 864 Nm-1 (8 X 18 X 0.0443) Conclusion: The results obtained from the graphical method give a good approximation of the Spring Response. The errors occurring in this experiment are from the measurements of the wire diameter. 1 By Yousuf Rahmaan ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our University Degree Engineering section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Engineering essays

  1. The overall objective of this laboratory experiment is to investigate the effects of proportional, ...

    = 8.4125 103 Kgm2 J1 (from Lab 1) = 1.897x103 Kgm JTOTAL = J1 + Jm = 10.3095x103 Kgm khw = 15.184 Kgm2/s2 Now from Eq. 2.1 and using the equation 2.2 we obtain the value of kp : kp = Eq.

  2. Steel Reinforcement Tension Test

    800 800 800 800 Mass (kg) 1.9917 1.9917 1.9176 1.9367 (1) Nominal Area A=M / 0.00785L (mm2) where M is the mass of the bar in kg and L is the bar in meter. Nominal Area of bar A= 1.9917/0.00785x0.8 = 317.15mm2 Nominal Area of bar B= 1.9917/0.00785x0.8 = 317.15mm2

  1. Soil Behaviour and Geotechnical Modelling 5-6

    Hypoelastic models can be considered as modification of linear elastic models. However, it may incrementally reversible, with no coupling between volumetric and deviatoric responses and is path-independent. 5.2 Use sketches to explain the physical (geometric) meaning of all 7 parameters (only 5 independent) in a cross-anisotropic elastic soil model ().

  2. I am going to investigate if there are any relationships which link the load ...

    although the greater the sag becomes more weight will be needed to increase the sag the same distance. This is because gravity will pull down on the load putting the top of the cantilever under tension. This is when the molecules are stretched apart; the greater the stretch the greater

  1. CDMA vs GSM

    It contributes around 26% of the total GDP. 65% of Indian population lives mainly in its 600,000 villages. Agriculture is the mainstay of the majority of the villagers as they are employed in agriculture or agriculture related services. Presence of diverse agro climate zones and a variety of soil and agro-climatic conditions have made possible the cultivation of almost every item from cash crops to food grains.

  2. Voice Encryption using RSA Algorithm

    . Abstract Security has always been an issue in communication. Cryptography has been used for this purpose since ages. With the advent of technology encryption schemes have been continuously proposed and improved. But technology has also been helpful in breaking these encryption schemes.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work