It’s About Time. Engineers, Happy New Year!

Well, it’s about time. With 2018 just around the corner, it’s time to stop and look back at yet another good year at EEP. Beside publishing about 300+ technical articles... Read more

Credit- Electrical Engineering Portal. Published by Department of EEE, ADBU: tinyurl.com/eee-adbu

3 Bad Conditions That Cause False Differential Current In Power Transformer

When applying differential protection of power transformer, three bad conditions must be considered which can lead to unbalance to the currents applied to the relay (compared with the expected currents... Read more

Credit- Electrical Engineering Portal. Published by Department of EEE, ADBU: tinyurl.com/eee-adbu

10 Common Questions You Can Expect In Electrical Engineering Examination Test

This examination will focus on testing the fundamentals of electrical engineering from low voltage to high voltage. Of course, you can use huge EEP’s resources for help in calculations and... Read more

Credit- Electrical Engineering Portal. Published by Department of EEE, ADBU: tinyurl.com/eee-adbu

This Is Why HVDC Transmission System Beats HVAC In These Essential Applications

For the most part, electric power is transmitted worldwide by means of ac. However, there are certain applications where dc transmission offers distinct economic and/or performance advantages. These applications include... Read more

Credit- Electrical Engineering Portal. Published by Department of EEE, ADBU: tinyurl.com/eee-adbu

A Good Grounding Of The Power Substation And Switching Station – What Does It Really Mean?

Provision of adequate grounding in a substation and switching stations are very important for the safety of operating personnel as well a electrical devices do not rise above tolerable thresholds... Read more

Credit- Electrical Engineering Portal. Published by Department of EEE, ADBU: tinyurl.com/eee-adbu

Analyzing Power System And Equipment Performance Through Oscillographic Records

Most technically oriented people recognize the familiar 60Hz voltage and current traces that constitute the parameters of an operating power system. There are, however, transient components superimposed on the 60Hz... Read more

Credit- Electrical Engineering Portal. Published by Department of EEE, ADBU: tinyurl.com/eee-adbu

Contactor As An Important Part Of The Motor Control Gear

Motor control gear and associated circuitry are fundamental parts of electrical distribution and utilisation systems. Motor control gear in its simplest form may be a direct on-line starter consisting of... Read more

Credit- Electrical Engineering Portal. Published by Department of EEE, ADBU: tinyurl.com/eee-adbu

What is WiMAX? Difference between Broadband WiMax and WiFi

What is WiMAX GSM Broadband and WiFi

Introduction to WiMAX Broadband

WiMAX stands for Worldwide Interoperability for Microwave Access, a standard based wireless communication technology to provide high speed, long distance broadband connectivity for domestic and business purposes. It works on the principle of Orthogonal Frequency Division Modulation technique. It is a 4th generation wireless mobile access technology.WiMAX Technology

Also Read: What is ZigBee Technology and How it works?

Operating principle of WiMAX is same as that of Wi-Fi. A computer or a laptop, which is equipped with WiMAX, would receive data from the transmitting station, using encrypted data keys.

WiMAX system consists of a WiMAX tower and a WiMAX receiver. A WiMAX tower can provide coverage to a large area, whereas a WiMAX receiver can be a laptop or a Personal Computer Memory Card International Association (PCMCIA) card.

The tower station can be connected directly to internet using high bandwidth, wired connection or to another tower station using Line of Sight, Microwave link.

WiMAX connection is accessible to residential areas through interface options like RJ-4 Ethernet connection and RJ-11 telephone connection. For business applications, interface options include T1/E1 interface with a 10/100 BT Ethernet connection.

So as per definition, WiMax seems to be like Wifi, so where lies the difference? Here in this article, Let us discuss about few points which makes WiMAX different to Wi-Fi.

Also Read: An Overview of RFID Based Library Management System

IEEE Standards of WiMAX & Wifi

While Wifi is based on IEEE 802.11 standard, WiMAX is based on IEEE 802.16 standard. IEEE 802.11 standard (Wireless Local Area Network (LAN) working group) is used to provide Wireless Local Area Network (WLAN) standards for short distance wireless networks. Popular versions are IEEE 802.11b, 802.11g and 802.11n.

IEEE 802.16 standard (Broadband Wireless Access Working Group) is like IEEE 802.11 standard in architecture, difference being in its application to provide standards for Broadband Wireless Metropolitan Area Networks (WMAN). It employs medium access control (mac) as well as physical layer specifications, allowing multiple physical layers. Popular versions are 802.16a, 802.16d and 802.16e.

Range

WiMAX provides both line of sight as well as non-line of sight connectivity. For line of sight connectivity, with the help of strong antennas, coverage area of up to 9300 square kilometers (sq-kms) is possible. Non-line of sight connectivity is like Wi-Fi connection. WiMAX covers a radius of 50 kilometers (km).

On the other hand, Wi-Fi is a short distance wireless means of connectivity up to 30 meters for indoor applications and up to 100 meters for outdoor coverage. Unlike WiMAX, Wi-Fi provides only line of sight connectivity.

Operating Frequency Band

WiMAX technology provides two types of wireless services – Line of sight service with operating frequency band up to 66 GHz, whereas for non-line of sight service, the operating frequency is between 2 to 11 GHz.

The higher frequency range was set by the original 802.16a standard, whereas the lower frequency range was set later by the 802.16d standard, allowing less attenuation and improved performance. While 2.5 to 3.5 GHz frequency band is licensed, the 5.8 GHz frequency spectrum is unlicensed.

On the contrary, Wi-Fi operates in the unlicensed 2.4 GHz and 5 GHz bands.

Channel Bandwidth

WiMAX networks have flexible channel bandwidth range from 1.25 MHz to 20 MHz, whereas Wi-Fi networks have fixed channel bandwidth of 20 MHz.

Aslo Read: What are Industrial Communication Networks? An Overview

Communication Type

WiMAX supports full duplex communication with 256 FFT OFDM (Orthogonal Frequency Division Modulation) along with single carrier and 2048 FFTOFDM technology. On the other hand, Wi-Fi supports half duplex communication with 52 FFT OFDM technology.

Operating Forums

WiMAX spectrum is owned by WiMAX Spectrum Owners Alliance (WiSOA), which is responsible for regulating, commercialize and deploy the WiMAX spectrum in 2.3 to 2.5 GHz and 3.4 to 3.5 GHz ranges. The WiMAX standard is certified by WiMAX forum, which is an industry led, non-profit organization for promoting and certifying IEEE 802.16 compliant broadband wireless products.

On the contrary, Wi-Fi is certified by Wi-Fi Alliance, a global organization which certifies interoperability of IEEE 802.11 compliant wireless products and promotes the global wireless standards.

Data Rates

Wi-Fi can transmit data at the fastest, up to 54 Megabits per second, whereas speed for WiMAX can reach up to 70 Megabits per second. It currently provides 40 Megabits per second for one wireless channel for both fixed and mobile applications.WiMAX can deliver uplink speed of 25 Megabits per second (Mbps) and downlink speed of 63 Megabits per second (Mpbs). Updated version of WiMAX is expected to deliver speed up to 1 Gigabits per Second (Gbps).

Security

WiMAX uses encryption techniques like Triple Data Encryption Algorithm and Advanced Encryption Standards, whereas Wi-Fi uses Advanced Encryption Standards and RC4.

Wi-Fi provides security methods like Wireless Protected Access (WPA), Wireless Protected Access (WPA2) and Extended Extensible Authentication Protocol (EAP). However, it does not has any Quality of Service (QoS) management yet.

WiMAX uses security protocols like Privacy Key Management Protocol Version 2 (PKMP2), Extensible Authentication Protocol (EAP) and Advanced Encryption Standard (EAS). These protocols ensure Quality of Service (QoS) protection of both audio and video streaming services.

This feature allows service providers to manage the network traffic based on the subscriber agreement and charge the subscriber extra for Quality of Service (QoS) protection.

Mobility

Wi-Fi currently provides the fixed version, the mobile version being in development. On the other hand, WiMAX provides both fixed and mobile versions. The fixed version (802.16d and 802.16e) is used for residential as well as business areas, whereas the mobile version is seen to replace existing mobile network technologies like GSM or CDMA.

Also Read: Internet of Things (IOT) and Its Applications in Electrical Power Industry

Future with WiMAX

WiMAX seems to be the promising next generation wireless network platform, with high speed and large coverage area capabilities. It does not require line of sight and can efficiently bandwidth intensive applications like real time video. In simple words, using WiMAX, one can listen to music and watch videos on his/her electronic device.

WiMAX is currently expected to replace existing DSL and other cable broadband technologies like various companies are employing WIMAX to provide broadband connections.

It can also be a replacement for mobile communication technologies like GSM and CDMA. Using WiMAX, point to point connections can be created, with a transmission rate which can support multiple E1 and T1 lines.

By ensuring Quality of Service and Multicasting services, WiMAX can provide Voice over Internet Protocol (VoIP) and Internet Protocol Television (IPTV) apart from fast broadband connections. Also, large banks can use WiMAX networks for connecting branches and Automated Teller Machines (ATMs) to the same network.

So, this is a basic overview about WiMAX. This might be a new technology for beginners to learn, but the implementation has already been started, even in African countries. While WiMAX is the latest step in the area network scale, the final step would be the Global Area Network (GAN) (Proposed Standard – IEEE 802.20). Any latest updates regarding WiMAX and GAN is welcome in the comments section below.

You may also read:

The post What is WiMAX? Difference between Broadband WiMax and WiFi appeared first on Electrical Technology.



December 15, 2017 at 08:06AM by Department of EEE, ADBU: http://ift.tt/2AyIRVT

Video: Things that every Electrical Engineer should know

How Does Capacitor Bank Improve Power Factor?



Things About MCBs That Every Electrical Engineers Beginners Should Know!



How to Use a Multimeter, Basics Every Electrical Engineer Need to Know



Basic Electrical Schematic Symbols That Every Electrical Engineers Beginners Should Know



The Easiest Way to Measure Ground Resistance That Every Electricians Should Know!







Video: Home Electrical Wiring

How to Layout a Home Electrical Wiring


Ceiling Fan Wiring Diagram - With Capacitor Connection


Electrical Panel Board Wiring

Primary Injection Testing Of Protection System For Wiring Errors Between VTs / CTs and Relays

This type of test involves the entire circuit – current transformer primary and secondary windings, relay coils, trip and alarm circuits, and all intervening wiring are checked. There is no... Read more

Credit- Electrical Engineering Portal. Published by Department of EEE, ADBU: tinyurl.com/eee-adbu

What is Automated Fingerprint Identification System and How it Works?

Automated Fingerprint Identification System – Modules & Applications

Introduction to Fingerprint Identification System

Fingerprint Identification system or Dactyloscopy is a unique process of identification by comparing the fingerprint impressions of individuals. It used the fact no two individuals have similar finger patterns. It is one of widely used techniques for acquiring details of a person and is an easy and convenient way to identify a person.Types of Fingerprints

Figure 1: Types of Fingerprints

Every human finger skin has pattern of dark lines (ridges) along with white lines (valleys) between them. Points at which structure of the ridge changes is known as Minutiae. Each human finger has different ridge pattern. These patterns can be Arches (where ridges enter and exit on same sides), Loops (where ridges enter on one side and exit on another) and Whorls (circles or mixtures of different patterns)

Fingerprints can be obtained using two methods – Chemical and Automatic Identification Method

In the former, a surface is sprayed with different chemicals like Cyanoacrylate, Ninhydrin, Magnetic Powder etc. and the finger print patterns can then be lifted using a clear tape. In the latter, the fingerprint images are acquired by different sensors like Capacitive Sensors (obtain pixel value based on capacitance of the fingerprint ridges), Optical Scanners (uses prisms to detect change in reflectance of light by each ridge or valley) and Thermal Scanner (measures differences in temperature over time to create a digital image).

Digital Image Processing in Fingerprint Identification System

The basic steps for digital image processing in Fingerprint Identification involves acquiring, storing and analyzing the fingerprint data.

The first step involves acquiring fingerprint images from different sensors like – Optical or Capacitive Sensor. The charge coupled device present in the optical scanner consists of light sensitive diodes which emit electrical signals when illuminated. These tiny dots when hit a target spot form the pixels and an array of pixels form the image. Once the finger is placed on the monitor, the image is acquired by illuminating the ridges of the finger.

The second step involves storing and processing the images using the below given steps.

  • Image Segmentation: It involves removal of unwanted features from the acquired image. Procedure followed is Thresholding, wherein the pixels having intensity (gray level value) greater than a particular threshold is considered, whereas those having intensity lesser than the threshold value are removed or deleted.
  • Image Normalization: It involves obtaining a uniform intensity pattern for the whole image. This is done so that the image pixels are in a desired range of gray values
  • Image Orientation: The image is formed by calculating the orientation at each point. The orientation is in turn determined by calculating the average of vector orthogonal to the gradient of each pixel at X and Y directions.
  • Image Filtering: This involves using various techniques like Gabor or Butterworth Filters to remove unwanted noise.
  • Image Binarization: This involves conversion of the filtered image to binary image using thresholding technique, to improve the contrast. It utilizes global thresholding technique, wherein pixel value greater than the threshold is set to 1 and pixel value less than the threshold is set to 0.
  • Image thinning: This is done to preserve connectivity of the ridges and involves eliminating foreground pixels.

The third step involves analyzing the images, by extracting minutiae details from the processed image and then comparing these details with those of the already stored templates. This is achieved by calculating the crossing number (half of sum of differences) between pair of pixels in aneight-connected neighborhood. This gives a unique identification for each characteristic of the fingerprint.

What is Automated Fingerprint Identification System and How it Works?

Fingerprint modules

To achieve fingerprint identification using microcontroller, two types of fingerprint modules can be used – SM630 and R305.

Let us have a brief idea about the two.

a.       R305:R305 Fingerprint Identification System Scanner

Figure 2: R305 Fingerprint Scanner

It is a 4 pin, Transistor Transistor Logic (TTL) compatible module, which communicated with Microcontroller through Serial UART communication.While the TD pin connects with the RXD pin of Microcontroller, RD pin connects with the TXD pin of Microcontroller. It supports semiduplex asychronous serial communication with default baud rate of 57600bps (acceptable baud rate can be between 9600 to 115200bps).

The transferred frame is a 10 bit frame with a low level start bit, 8-bit command or data and stop bit. Once powered up, it takes about 500 miliseconds for initialization. The system resources consist of a 512 bytes memory , set as a notepad and two 512 byte character file buffer.

b.      SM630:SM630 Fingerprint Scanner

Figure 3: SM630 Fingerprint Scanner

It is similar to R305 in terms of pin configuration and comunication technique used. Unique features include self developed fingerprint algorithm, self adaptive parameter adjustment mechanism, low cost and power consumption, easy to use and portable integrated design. It consists of 768 fingerprint templates.

Here we are going to use Sunrom’s R305 fingerprint sensor which is connected to an interface board, 1125. It consists of three buttons – ADD, EMPTY and SEARCH. Either these buttons can be used or external commands can be sent to the board from the microcontroller.

In the below circuit, we interface the fingerprint sensor board to the 8051 microcontroller, AT89S51 through serial communication. The result of the identification process is displayed on the LCD.

Once the ADD command is send from the microcontroller, the fingerprint is added to the database and the corresponding ID is sent back to the microcontroller and displayed on the LCD. In case of an error, a code (0xFF) is sent and the error message is displayed on the LCD.

Once the EMPTY command is send from the microcontroller, all the added fingerprints are deleted from the database. Response code of 0xCC indicates execution is successful, whereas response code of 0xFF indicates an error.

Once the SEARCH command is send from the microcontroller, the matched ID corresponding to the fingerprint is sent as response code from the microcontroller and the ID is displayed on the LCD. Incase of an error, response code of 0xFF is sent back.

Applications of Fingerprint Identification System

  1. Crime Scenes: Major application of fingerprint identification system is to identify criminals involved in any crime. One of the foremost evidence searched from the crime scenes are fingerprints on the found items. This helps in finding the criminals based on the fingerprints.
  2. Organizations: This technique is used to identify members of an organization based on their unique identity number. This makes sure only authorized persons can enter the secured area of the Organization and not any intruder. It also makes count of the attendance of the individual and the time spent inside the place.
  3. Grocery Stores: This technique is helpful in recognizing and billing an already registered user’s credit or debit card.

You may also read:

The post What is Automated Fingerprint Identification System and How it Works? appeared first on Electrical Technology.



December 13, 2017 at 05:03AM by Department of EEE, ADBU: http://ift.tt/2AyIRVT

Voltage Regulation By Transformer Off-Load Tap Changer, On-Load Tap Changer and AVR

Voltage Regulation Equipment

Almost all transformers incorporate some means of adjusting their voltage ratio, by adding or removing tapping turns.

Transformer Voltage Regulation (Off-Load Tap Changer, On-Load Tap Changer and AVR) - photo credit: ABB

This adjustment may be made by an on-load tap-changer, or by means of an off-circuit tap-changer, or by the selection of bolted link positions with the transformer disconnected and grounded.
The degree of sophistication of the system of tap selection depends on the frequency with which it is required to change taps and the size and importance of the transformer.
Let’s discuss now the following ways of voltage regulation. First two are performed on the transformer, while third way is on the relay system in the power substation.
1. Off Circuit Tap Changer

The off-circuit tap-changer is of rather simple design, giving connection to a selected tap in the winding. As the name says it is designed only to be operated only when the transformer is de-energised.

The contact pressure may occur to be retained by some kind of spring arrangement and then some vibration is possible.
In off-circuit tap-changers operating on the same tap position for years the contact resistance then may slowly increase due to local degradation and oxidation of material in the contact point. Heating will take place resulting in a build up of pyrolytic formed carbon, which will increase the contact resistance further, and also reduce the cooling.
Ultimately a runaway situation is reached and the transformer will probably trip on gas actuated protection or worse – a step short circuit occurs.

To avoid this it is vital that the tap changer is operated, off circuit, through its complete range a few times during regular routine maintenance to wipe the contact surfaces clean before returning it back to the selected tapping.

Of course the same advice is valid if an on-load tap-changer is left in service but without operation for a long period.


There is more to this article. Continue Reading .....

Credit- Electrical Engineering Portal. Published by Department of EEE, ADBU : tinyurl.com/eee-adbu


7 Bad Effects Of Corona On Transmission Lines

Corona Discharges

All the diverse ionization processes involved in producing corona discharges in the highly stressed regions near the conductors of transmission lines, as well as the creation and movement of charged particles in the electric field, require an expenditure of energy.


7 Bad Effects Of Corona On Transmission Lines (photo credit: rovdrone.eu)
This energy is supplied by the high voltage power source connected to the transmission line, which generates the high electric field near the conductors necessary to sustain corona discharges.

Most of the energy is converted to thermal energy for heating the air in the immediate vicinity of the conductors. A small proportion of the energy is converted to electromagnetic radiation including light emission, to acoustic energy, and to electrochemical energy required to produce gaseous effluents ozone and nitric oxides.

Let’s discuss now seven really bad effects on work of HV transmission lines:

1. Corona Loss

The power loss, defined by the rate at which energy is drawn by corona from the high voltage power source, is known as corona loss. Since the electromagnetic, acoustic, and electrochemical components are only a small part of the overall energy, corona loss is effectively caused by the movement of positive and negative ions in the electric field.

The lifetime of electrons created in the discharge, before they attach to neutral molecules and become negative ions, is very short, and consequently, their movement in the electric field gives rise only to short-duration current pulses, which do not contribute significantly to corona loss.

On an ac transmission line, the sinusoidal voltage applied to the conductors causes a capacitive current to be drawn from the power source.
Before the onset of corona, the power source is called upon to supply mainly the capacitive current. The capacitive current flowing in the conductor gives rise to a small amount of I2power loss.
At voltages above corona onset, however, the oscillatory movement of the ionic space charge in the alternating electric field near the conductor gives rise to an additional alternating current component.
Unlike the capacitive current, the current produced by the movement of ions is mostly in phase with the voltage and, therefore, gives rise to power loss, known as corona loss.
The corona current also contributes to a small component in phase with the capacitive current, thus causing an apparent increase in the capacitance of the conductor configuration. Analytical treatment of corona loss on ac transmission lines is very complex and requires the solution of time-varying space charge fields.

Information required for design purposes is obtained mainly through experimental studies.


There is more to this article.  Continue Reading....


Credit- Electrical Engineering Portal. Published by Department of EEE, ADBU : tinyurl.com/eee-adbu 


10 Different Duty Types (Load Cycle) Of A Three-Phase Asynchronous Motors

(photo credit: ABB)
The term duty defines the load cycle to which the machine is subjected, including, if applicable, starting, electric braking, no-load and rest de-energized periods, and including their durations and sequence... Read more

Credit- Electrical Engineering Portal. Published by Department of EEE, ADBU: tinyurl.com/eee-adbu


Protections For Medium Voltage Synchronous Machines (Generators) – IEEE C37-2 Codes

The protection system for MV generators (synchronous machines) must be carefully selected and studied for the application it is destined for and it is not normally possible to define a... Read more
By EEE, ADBU

How Bad Harmonics Influence The Work Of Rotating Machines (Induction Motors)

The presence of harmonics in the work of induction motors can be pretty bad. Why? They produce elastic deformation, that is, shaft deflection, parasitic torques, vibration noise, additional heating, and... Read more
By EEE, ADBU

Thumb Rule-12 (Quick Reference of DG Set)

 

Standard Size of The DG sets

KVA KVA KVA KVA KVA
7.5 KVA 20KVA 35 KVA 62.5 KVA 100 KVA
10 KVA 25 KVA 40 KVA 75 KVA 125 KVA
15 KVA 30 KVA 50 KVA 82.5 KVA 200 KVA

 

D.G Foundation Bar Size

Rating of D.G set Size of Bar
Up to 82.5 KVA 10MM
100 KVA To 200 KVA 12MM
250 KVA to 500KVA 16MM

 

Minimum Capacity of  Fuel Service Tank

AS per CPWD
Capacity of DG set Minimum Fuel Tank Capacity
Upto 25 KVA 100 Liters
Above 25 to 62.5 KVA 120 Liters
Above 62.5 KVA to 125 KVA 225 Liters
Above 125 KVA to 200 KVA 285 Liters
Above 200 KVA to 380 KVA 500 Liters
Above 380 KVA to 500 KVA 700 Liters
Above 500 KVA to 750 KVA 900 Liters

 

Battery Size for D.G Set

                                                           AS per CPWD

DG Set Capacity Battery Capacity (AH) Cu Cable Size (Sq. mm) Electrical System (Volts)

Up to 25 KVA

88 35

12

Above 25 KVA upto 62.5 KVA

120 50

12

Above 62.5 KVA up to 82.5 KVA

150 50

12

Above 82.5.KVA up to 125 KVA

180 50

12

Above 125 KVA up to 500 KVA

180 70

12

Above 500 KVA

360 70

24

 

Depths of PCC (Plain Cement Concrete)  for DG Set

As per CPWD

DG Set Capacity (KVA) Typical Depth of PCC Foundation (For soil bearing capacity 5000 kg/sq meter)
750-2000 600 mm
625 400 mm
320-500 400 mm
200-320 400 mm
82.5 -200 400 mm
Upto 82.5 200 mm

 

Foundation & Earthing for D.G Set

As Per CPWD

Ieam Descriptions
D.G set inside Room A PCC foundation (1:2:4, M-20 grade) of approximate depth 150 mm above the finished Generator set Room Floor level
The  length  and  breadth  of  foundation  should  be  at  least  250  mm   more on all sides than the size of the enclosure.
D.G set in Open Room A PCC (1:2:4, M-20 grade) foundation  of  weight  2.5  times  the  operating  weight  of  the  Generator set  with  enclosure  or  as recommended by the Generator set manufacturer, whichever is higher
300 mm of this foundation height should be above the ground level. The length and breadth of foundation should be at least 250 mm more on all sides than the size of enclosure.
Earthing Copper plate earthing (Neutral Grounding) shall be provided for DG Sets of capacity 500 KVA or above
whereas G.I. plate earthing (Neutral Grounding) shall be provided for DG Sets below 500 KVA capacity. The body earthing shall generally be of G.I
Numbers of earthing for each DG Sets 2No’s  earthing sets for Genset/ control panel body.
2No’s earthing sets for neutral.
In case there are more than one DG Set in one location, independent two nos. neutral earthing shall be provided for each DG set. However, two nos. earthing sets shall be common for the body earthing of DG Sets
DG Set of 500 KVA capacity or above:- Copper strip
DG Set below 500 KVA capacity:- GI strip

 

D.G Detail according to Size

D.G Size (KVA) L x W x H (Canopy) mm Approx Weight (Kg) Fuel Tank (Ltrs) Fuel Consumption (Ltr/hr) Oil Consumption (Ltr/hr)
12.5 2040 x 1230 x 1450 1050 60 2.3 0.02
15 2040 x 1230 x 1450 1050 65 2.3 0.02
20 2240 x 1230 x 1450 1300 65 3.7 0.03
30 2510 x 1130 x 1450 1300 65 6.3 0.03
40 3350 x 1180 x 1650 1500 100 7.8 0.03
50 3350 x 1180 x 1650 1500 100 8.3 0.03
62.5 3350 x 1180 x 1650 1930 150 10.5 0.03
75 3605 x 1405 x 1600 1950 150 13 0.03
100 3940 x 1700 x 1850 2500 300 15.7 0.05
125 3950 x 1700 x 1850 2700 300 19 0.05
140 4600 x 1850 x 1950 3580 300 22.6 0.06
160 4600 x 1850 x 1950 3720 450 25.9 0.14
180 4970 x 1730 x 2045 3870 450 27.7 0.14
200 4970 x 1730 x 2045 3950 450 29.8 0.14
250 4970 x 1730 x 2050 4660 450 37.7 0.15
275 5700 x 2030 x 2515 5860 450 50 0.15
320 5700 x 2030 x 2515 5860 450 57 0.3
400 5905 x 2030 x 2520 6180 990 65.1 0.3
500 6205 x 2030 x 2550 6990 990 81.3 0.3

 

FUEL CONSUMPTION  FOR DG SET:

Generator KVA Diesel consumption Liter per hour
5 1.25
15 2.91
20 4.78
25 4.78
30 6.55
40 8.11
50 10.19
62.5 10.92
75 13.52
82.5 13.52
125 19.76
140 23.4
200 30.99

 

D.G Spacing Guidance

Description DG set with Acoustic Enclosure Open DG set in room.
in Open Area in Closed Area
Free space on both sides Min. 1.5 m Min. 1.5 m Min. 2 m
Free space at front side (Radiator Hot air outlet at Front) Min. 3 m Min. 3 m N/A
Free space at front side (Radiator Hot air outlet at Top) Min. 1.0 m Min. 1.5 m N/A
Free space at rear side
(Alternator)
Min. 2 m Min. 2 m Min. 2 m
Fresh air inlet opening area N/A N/A Min 1.5 times of the Radiator area.
Hot air discharge opening area N/A N/A Min 2.5 times of the Radiator area.
Distance between two sets Min 1.5 meter between two
canopies
Min 1.5 meter between
two canopies
Min 1.5 meter between two foundations.

 




December 01, 2017 at 07:03PM

Voltage Regulators Used To Control The Voltage At The End Of a Distribution Feeder

There are three main methods used to control the voltage at the end of a distribution feeder – By using control equipment to vary the voltage at the supply end... Read more
By EEE, ADBU