1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
3 years ago
10

• Build upon the results of problem 3-85 to determine the minimum factor of safety for fatigue based on infinite life, using the

modified : Goodman criterion. The shaft CD rotates at a constant speed, has a constant diameter of 1.13 in, and is made from cold-drawn AISI 1018 steel. From problem 3-85, the critical stress element in shaft CD experiences a completely reversed bending stress due to the rotation, as well as steady torsional and axial stresses. Thus, a,bend= 12 kpsi, Om, bend= 0 kpsi, Oa,axial= 0 kpsi, om, axial= -0.9 kpsi, Ta = 0 kpsi, and Im = 10 kpsi. The minimum factor of safety for fatigue is

Engineering
1 answer:
Rudik [331]3 years ago
6 0

Answer:

minimum factor of safety for fatigue is = 1.5432

Explanation:

given data

AISI 1018 steel cold drawn as table

ultimate strength Sut = 63.800 kpsi

yield strength Syt = 53.700 kpsi

modulus of elasticity E = 29.700 kpsi

we get here

\sigma a = \sqrt{(\sigma a \times kb)^2+3\times (za\times kt)^2}    ...........1

here kb and kt = 1 combined bending and torsion fatigue factor

put here value and we get

\sigma a =  \sqrt{(12 \times 1)^2+3\times (0\times 1)^2}  

\sigma a = 12 kpsi

and

\sigma m = \sqrt{(\sigma m \times kb)^2+3\times (zm\times kt)^2}     ...........2

put here value and we get

\sigma m = \sqrt{(-0.9 \times 1)^2+3\times (10\times 1)^2}  

\sigma m = 17.34 kpsi

now we apply here goodman line equation here that is

\frac{\sigma m}{Sut} +  \frac{\sigma a}{Se} = \frac{1}{FOS}     ...................3

here Se = 0.5 × Sut

Se = 0.5 × 63.800 = 31.9 kspi

put value in equation 3 we get

\frac{17.34}{63.800} +  \frac{12}{31.9} = \frac{1}{FOS}  

solve it we get

FOS = 1.5432

You might be interested in
why can planes fly but boats cant and why can boats float but not planes and saying planes fly because of the wind or air is not
Aleksandr-060686 [28]

Answer:

Planes can fly because they have wings and jet turbines and boats cant they need wings and planes cant float because there is to much weight

4 0
3 years ago
Read 2 more answers
For this problem, calculate the following by hand and show the procedure for how you obtained the results. Subsequently, solve p
Gemiola [76]

Answer:wat

Explanation:

4 0
3 years ago
What is chemical engineering​
viktelen [127]

Answer:

Chemical engineering is the branch of engineering that deals with chemical production and the manufacture of products through chemical processes

Explanation:

8 0
4 years ago
Barries of effective <br> communication?
GarryVolchara [31]

Answer: barries

Explanation:

4 0
3 years ago
What is difference between a backdoor, a bot, a keylogger, and psyware,a nd a rootkit? Can they all present in the same malware?
Ganezh [65]

Answer:

Yes, they can all be present in the same malware because each of them perform slightly differing functions.

Explanation:

Backdoor is a software which when placed into your computer will permit hackers to easily gain reentry into your computer. This can happen even after you have already patched the flaw that they have used to hack your system before.

A bot is a program that does the same task in a continuous manner akin to when you use a blender by pressing the button to blend what you have put into it.

A keylogger is a part of a hidden software that monitors and records everything you type on your computer keyboard after which it writes it onto a file, with the hopes of capturing relevant information such as your bank account number and even passwords and other sensitive means of identification.

A Spyware is somehow similar to a keylogger just that it steals information from your computer and sends it to someone else.

A root kit is a bad software that is capable of modifying the operating system or other privileged access devices in order to gain continuous access into your system for the purpose of gathering of information and/or reducing the system’s functionality.

Yes, they can all be present in the same malware because each of them perform slightly differing functions.

6 0
3 years ago
Other questions:
  • A commercial refrigerator with refrigerant -134a as the working fluid is used to keep the refrigerated space at -30C by rejectin
    10·3 answers
  • Your new mobile phone business is now approaching its first anniversary and you are able to step back and finally take a deep br
    8·1 answer
  • The simple majority decision rule may generate results that are
    7·1 answer
  • If a heat engine has an efficiency of 30% and its power output is 600 W, what is the rate of heat input from the combustion phas
    10·1 answer
  • Hi all, could you solve this please?<br> What is the value of the resistance R
    14·1 answer
  • What are the main causes of injuries when using forklifts?
    5·1 answer
  • Which statement explains what causes the balloon to accelerate
    14·1 answer
  • There are three different types of slings. What determines which type you use?
    13·1 answer
  • Why is communication one of the most important aspects of an engineer's job?
    12·1 answer
  • All aspects of the Kirby-Bauer test are standardized to assure reliability. What might be the consequence of pouring the plates
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!