Preview

PROJECT PAGE1 ABIN

Satisfactory Essays
Open Document
Open Document
595 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
PROJECT PAGE1 ABIN
ANALYSIS ON WATER COOLING OF ELECTRONIC HEAT SINK

A PROJECT REPORT
Submitted by
ABIN ELDHOSE (910413414001)

In partial fulfillment for the award of the degree of MASTER OF ENGINEERING
IN
THERMAL ENGINEERING

FATIMA MICHAEL COLLEGE OF ENGINEERING AND
TECHNOLOGY, MADURAI -20

ANNA UNIVERSITY : CHENNAI 600 025
DECEMBER 2014 i ANNA UNIVERSITY : CHENNAI 600 025

BONAFIDE CERTIFICATE

Certified that this project report “ANALYSIS ON WATER COOLING OF
ELECTRONIC HEAT SINK” is the bonafide work of “ABIN ELDHOSE” who carried out the project work under my supervision.

SIGNATURE

SIGNATURE

T.ANANTHANATESAN

Mr. JAIGURU

HEAD OF THE DEPARTMENT

SUPERVISOR

Professor & Head(PG)

Professor

Dep. of Thermal Engineering

Dep. of Thermal Engineering

FMCET

FMCET

Senkottai Village

Senkottai Village

Madurai – Sivagangai Main Road

Madurai – Sivagangai Main Road

Madurai - 625 020

Madurai - 625 020

ii

ABSTRACT

For more than a decade, investigations have been conducted to better understand the fluid flow and heat transfer characteristics in silicon-based microchannel heat sinks designed for applications in electronic cooling. These non-circular channels and silicon based microchannel heat sinks combine the attributes of high material compatibility, high surface area per unit volume ratios and large potential heat transfer performance with highly sophisticated and economic fabrication process.
These

advantages

make

these

silicon

based

microchannel

heat

sinks

extremelyattractive for a wide variety of commercial applications.
The present work addresses electronic chips cooling with forced convection of water in

silicon based

single microchannel heat sinks

by the help of

a

commercial CFD software FLUENT. The computational domain is discretized with non-uniform grids on the flow face but uniform grid along the flow. For single microchannel, the grid is generated by implementing Gambit software, which is incorporated with Cooper method for 3-dimensional grid

You May Also Find These Documents Helpful

  • Powerful Essays

    Unit 7 P3 Research Paper

    • 1234 Words
    • 5 Pages

    Virus protection – virus protection protects a computer system from malicious viruses and Trojans and worms which you can be infected by through the internet or email or downloading files or through a USB flash drive etc. virus protection usually consists of a firewall, virus scanner, virus remover and spyware. With virus protection you can perform a scan on your computer to check if you have been infected by any viruses or Trojans or worms. With some virus protections software’s you can scan your computer then it will ask you if you want the viruses removed, also if any programs have been infected the virus protection will ask you if you want the infected program deleted, most virus…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    How to handle the lease on the kitchen equipment, which as six months more to run?…

    • 1170 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Ac505 Course Project a

    • 3135 Words
    • 13 Pages

    The beginning cash balance for April, is the cash from March 31 in the Asset section of the balance sheet. In the merchandise purchases budget, in April, we need 50% of March purchases (that amount is also given to us 3/31 Accounts payable of $100,000 on page 415). Therefore, Total cash disbursements for April is (50% x $316,000 April purchases) + ($100,000 remaining March purchases to be paid) = $258,000.…

    • 3135 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Project 1

    • 300 Words
    • 2 Pages

    The purpose of this summary is to explain the changes made in the to-be diagram from the previous as-is diagram. Also, to note the protective hardware added, and the justification for the changes made. The to-be diagram has been changed or altered to reflect a defense in depth approach. This diagram is upgraded with the addition of multiple security layers. This diagram has the removal of its wireless access points and the addition of VLAN subnetting for improving network performance and reducing network congestion.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ms Project Lesson 3

    • 298 Words
    • 2 Pages

    When you do not want the duration of a certain task to change. If you have a four day review for everyone on the project, when you assign more resources to that task, the days decrease, this is when you do not want effort driven scheduling. You want it to stay at 4 days.…

    • 298 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Course Project 1

    • 1403 Words
    • 6 Pages

    You must show all work and calculations by typing out the longhand formula, or post a screen shot of any online calculator used, or attach an excel file showing formulas/calculations in order to earn any credit…

    • 1403 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Project Part 1

    • 1209 Words
    • 4 Pages

    Bradley, T. (2014). Password policy: password must meet complexity requirements. In about.com. Retrieved March 15, 2014, from http://netsecurity.about.com/od/secureyourwindowspc/qt/complexpw.htm…

    • 1209 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Project Part 1

    • 430 Words
    • 2 Pages

    As we enter a new age of computers and the use of the internet to conduct our business we open ourselves up to a new type of threat. Data and identity theft have become a real problem for many financial and government institutions. To combat this threat Richman Investments has implemented security measures at all seven domains in our IT structure. The seven domains include the User, Workstation, LAN, LAN to WAN, WAN, Remote Access, and System/Application layers.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Project Part I

    • 289 Words
    • 2 Pages

    You are an information technology (IT) Web specialist working for Up-North Fishing Outfitters (UNFO), a…

    • 289 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4 P3 Research Paper

    • 2638 Words
    • 11 Pages

    P2 – Explain the potential effects of five different life factors on the development of an individual…

    • 2638 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Project #1

    • 1243 Words
    • 5 Pages

    The work that I chose was an excerpt from Dr. Maya Angelou book, “Wouldn’t Take Nothing For My Journey Now” and other works from the author Maya Angelou simply because in almost all of her works whether poems, books and etcetera, she writes the same way.. In her except she talks about being a young mother of a Kindergartener. She talks also of how she worked hard to make a living for her and her child by working two jobs. The talk of how she survived and her doing what she has to is called survival of the fittest, in nature and in culture only the strong survive. Also she talks of how she is comfortable with herself and the skin she is in. Much of her work is of special interest to women, expressing Maya Angelou’s views on subjects ranging from fashion and entertainment to sensuality and pregnancy, racism, and death. “Getups,” demonstrating not only Angelou’s love of richly colorful clothing but also a painful event from her years as a single mother of a small boy; and “Extending Boundaries,” recounting an embarrassing experience from Angelou’s early days as a writer in New York City. Angelou uses each incident to draw some point, though generally she offers her moral or advice with a light hand, often with humor, despite the seriousness of some of her subject matter. Her recurrent themes include self-knowledge and the necessity of honesty, prudence, and respect in the treatment of oneself and others. A compilation of brief scenes, thoughts and situations. The collection is rather wide ranging from history to social graces to autobiography. The past and the present collide as the stories are short and end quickly, the transitions are abrupt. Maya Angelou's tendency to characterize the world as degenerating. Passages like, "we have come to a place, a time, when virtue is no longer considered a virtue. The mention of virtue is ridiculed, and even the word itself has fallen out of favor," put me off. It belies a tendency to…

    • 1243 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    project1

    • 1043 Words
    • 4 Pages

    4) Briefly describe a patent medicine. Patent medicine is a drug or an ingredient that can be purchased over-the-counter without a prescription from the doctor. It provides access to drugs that can be harmful to a person. It can cause for…

    • 1043 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Project part 1

    • 1134 Words
    • 3 Pages

    The way we perceive ourselves in relation to the rest of the world plays an important role in our choices, behaviors and beliefs. Conversely, the opinions of others also impact our behavior and the way we view ourselves. Social psychologists investigate how people view themselves and others, how they interact with and influence others, and how people act when part of a group. Given the amount of time spent thinking about and interacting with other people, it follows that much of our lives are spent with the subject matter of social psychology.…

    • 1134 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Request for Proposal

    • 377 Words
    • 2 Pages

    It is the Company’s intent to follow the following process and timetable, resulting in the selection of a firm.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Project Part 1 Task 1

    • 1367 Words
    • 6 Pages

    Federal Information Security Management Act (FISMA) compliance is required for federal agencies to protect their important information. Department of Homeland Security (DHS) compliance is to be required for protection to the United States against terrorists. There are other organizations in which standards are given for risk management projects, including: National Institute of Standards and Technology (NIST), Department of Defense (DOD) Information Assurance Certification and Accreditation Process (DAICAP), and Control Objects for Information and related Technology (COBIT).…

    • 1367 Words
    • 6 Pages
    Better Essays